Show filters
1,197 Total Results
Displaying 141-150 of 1,197
Sort by:
Attacker Value
Unknown
CVE-2024-3291
Disclosure Date: May 17, 2024 (last updated May 18, 2024)
When installing Nessus Agent to a directory outside of the default location on a Windows host, Nessus Agent versions prior to 10.6.4 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
0
Attacker Value
Unknown
CVE-2024-30060
Disclosure Date: May 16, 2024 (last updated January 30, 2025)
Azure Monitor Agent Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2023-37244
Disclosure Date: May 02, 2024 (last updated May 03, 2024)
The affected AutomationManager.AgentService.exe application contains a TOCTOU race condition vulnerability that allows standard users to create a pseudo-symlink at C:\ProgramData\N-Able Technologies\AutomationManager\Temp, which could be leveraged by an attacker to manipulate the process into performing arbitrary file deletions. We recommend upgrading to version 2.91.0.0
0
Attacker Value
Unknown
CVE-2024-34011
Disclosure Date: April 29, 2024 (last updated April 30, 2024)
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 37758.
0
Attacker Value
Unknown
CVE-2024-34010
Disclosure Date: April 29, 2024 (last updated October 15, 2024)
Local privilege escalation due to unquoted search path vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 37758, Acronis Cyber Protect 16 (Windows) before build 38690.
0
Attacker Value
Unknown
CVE-2023-48684
Disclosure Date: April 29, 2024 (last updated April 30, 2024)
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 37758.
0
Attacker Value
Unknown
CVE-2023-48683
Disclosure Date: April 29, 2024 (last updated January 06, 2025)
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 37758, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169.
0
Attacker Value
Unknown
CVE-2024-28241
Disclosure Date: April 25, 2024 (last updated January 23, 2025)
The GLPI Agent is a generic management agent. Prior to version 1.7.2, a local user can modify GLPI-Agent code or used DLLs to modify agent logic and even gain higher privileges. Users should upgrade to GLPI-Agent 1.7.2 to receive a patch. As a workaround, use the default installation folder which involves installed folder is automatically secured by the system.
0
Attacker Value
Unknown
CVE-2024-28240
Disclosure Date: April 25, 2024 (last updated January 23, 2025)
The GLPI Agent is a generic management agent. A vulnerability that only affects GLPI-Agent installed on windows via MSI packaging can allow a local user to cause denial of agent service by replacing GLPI server url with a wrong url or disabling the service. Additionally, in the case the Deploy task is installed, a local malicious user can trigger privilege escalation configuring a malicious server providing its own deploy task payload. GLPI-Agent 1.7.2 contains a patch for this issue. As a workaround, edit GLPI-Agent related key under `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall` and add `SystemComponent` DWORD value setting it to `1` to hide GLPI-Agent from installed applications.
0
Attacker Value
Unknown
CVE-2024-3185
Disclosure Date: April 23, 2024 (last updated April 23, 2024)
A key used in logging.json does not follow the least privilege principle by default and is exposed to local users in the Rapid7 Platform. This allows an attacker with local access to a machine with the logging.json file to use that key to authenticate to the platform with high privileges. This was fixed in the Rapid7 platform starting 3 April 2024 via the introduction of a restricted role and the removal of automatic API key generation on installation of an agent.
0