Show filters
1,213 Total Results
Displaying 21-30 of 1,213
Sort by:
Attacker Value
Unknown
CVE-2024-32942
Disclosure Date: February 12, 2025 (last updated February 27, 2025)
Incorrect default permissions for some Intel(R) DSA installer for Windows before version 24.2.19.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2023-31360
Disclosure Date: February 11, 2025 (last updated February 27, 2025)
Incorrect default permissions in the AMD Integrated Management Technology (AIM-T) Manageability Service installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
0
Attacker Value
Unknown
CVE-2024-11468
Disclosure Date: February 04, 2025 (last updated February 27, 2025)
Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a flaw in the installation process. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.
0
Attacker Value
Unknown
CVE-2025-1003
Disclosure Date: February 04, 2025 (last updated February 27, 2025)
A potential vulnerability has been identified in HP Anyware Agent for Linux which might allow for authentication bypass which may result in escalation of privilege. HP is releasing a software update to mitigate this potential vulnerability.
0
Attacker Value
Unknown
CVE-2025-24891
Disclosure Date: January 31, 2025 (last updated February 27, 2025)
Dumb Drop is a file upload application. Users with permission to upload to the service are able to exploit a path traversal vulnerability to overwrite arbitrary system files. As the container runs as root by default, there is no limit to what can be overwritten. With this, it's possible to inject malicious payloads into files ran on schedule or upon certain service actions. As the service is not required to run with authentication enabled, this may permit wholly unprivileged users root access. Otherwise, anybody with a PIN.
0
Attacker Value
Unknown
CVE-2024-46974
Disclosure Date: January 31, 2025 (last updated February 27, 2025)
Software installed and run as a non-privileged user may conduct improper read/write operations on imported/exported DMA buffers.
0
Attacker Value
Unknown
CVE-2025-24795
Disclosure Date: January 29, 2025 (last updated February 27, 2025)
The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. On Linux systems, when temporary credential caching is enabled, the Snowflake Connector for Python will cache temporary credentials locally in a world-readable file. This vulnerability affects versions 2.3.7 through 3.13.0. Snowflake fixed the issue in version 3.13.1.
0
Attacker Value
Unknown
CVE-2025-24788
Disclosure Date: January 29, 2025 (last updated February 27, 2025)
snowflake-connector-net is the Snowflake Connector for .NET. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for .NET in which files downloaded from stages are temporarily placed in a world-readable local directory, making them accessible to unauthorized users on the same machine. This vulnerability affects versions 2.0.12 through 4.2.0 on Linux and macOS. Snowflake fixed the issue in version 4.3.0.
0
Attacker Value
Unknown
CVE-2025-24790
Disclosure Date: January 29, 2025 (last updated February 27, 2025)
Snowflake JDBC provides a JDBC type 4 driver that supports core functionality, allowing Java program to connect to Snowflake. Snowflake discovered and remediated a vulnerability in the Snowflake JDBC Driver. On Linux systems, when temporary credential caching is enabled, the Snowflake JDBC Driver will cache temporary credentials locally in a world-readable file. This vulnerability affects versions 3.6.8 through 3.21.0. Snowflake fixed the issue in version 3.22.0.
0
Attacker Value
Unknown
CVE-2025-0797
Disclosure Date: January 29, 2025 (last updated February 27, 2025)
A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects unknown code of the file /var/Microworld/ of the component Quarantine Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
0