Show filters
1,197 Total Results
Displaying 31-40 of 1,197
Sort by:
Attacker Value
Unknown

CVE-2024-55542

Disclosure Date: January 02, 2025 (last updated January 03, 2025)
Local privilege escalation due to excessive permissions assigned to Tray Monitor service. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35895.
0
Attacker Value
Unknown

CVE-2024-55539

Disclosure Date: December 23, 2024 (last updated January 05, 2025)
Weak algorithm used to sign RPM package. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux) before build 39185.
0
Attacker Value
Unknown

CVE-2024-10256

Disclosure Date: December 10, 2024 (last updated December 21, 2024)
Insufficient permissions in Ivanti Patch SDK before version 9.7.703 allows a local authenticated attacker to delete arbitrary files.
0
Attacker Value
Unknown

CVE-2024-21571

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Snyk has identified a remote code execution (RCE) vulnerability in all versions of Code Agent. The vulnerability enables an attacker to execute arbitrary code within the Code Agent container. Exploiting this vulnerability would require an attacker to have network access to the Code Agent within the deployment environment. External exploitation of this vulnerability is unlikely and depends on both misconfigurations of the cluster and/or chaining with another vulnerability. However, internal exploitation (with a cluster misconfiguration) could still be possible.
0
Attacker Value
Unknown

CVE-2024-45207

Disclosure Date: December 04, 2024 (last updated December 21, 2024)
DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services
0
Attacker Value
Unknown

CVE-2024-49421

Disclosure Date: December 03, 2024 (last updated December 21, 2024)
Path traversal in Quick Share Agent prior to version 3.5.14.47 in Android 12, 3.5.19.41 in Android 13, and 3.5.19.42 in Android 14 allows adjacent attackers to write file in arbitrary location.
0
Attacker Value
Unknown

CVE-2024-9875

Disclosure Date: November 21, 2024 (last updated January 05, 2025)
Okta Privileged Access server agent (SFTD) versions 1.82.0 to 1.84.0 are affected by a privilege escalation vulnerability when the sudo command bundles feature is enabled. To remediate this vulnerability, upgrade the Okta Privileged Access server agent (SFTD) to version 1.87.1 or greater.
0
Attacker Value
Unknown

CVE-2024-3334

Disclosure Date: November 15, 2024 (last updated November 16, 2024)
A security bypass vulnerability exists in the Removable Media Encryption (RME)component of Digital Guardian Windows Agents prior to version 8.2.0. This allows a user to circumvent encryption controls by modifying metadata on the USB device thereby compromising the confidentiality of the stored data.
0
Attacker Value
Unknown

CVE-2024-49521

Disclosure Date: November 12, 2024 (last updated November 19, 2024)
Adobe Commerce versions 3.2.5 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to a security feature bypass. A low privileged attacker could exploit this vulnerability to send crafted requests from the vulnerable server to internal systems, which could result in the bypassing of security measures such as firewalls. Exploitation of this issue does not require user interaction.
Attacker Value
Unknown

CVE-2024-47595

Disclosure Date: November 12, 2024 (last updated November 15, 2024)
An attacker who gains local membership to sapsys group could replace local files usually protected by privileged access. On successful exploitation the attacker could cause high impact on confidentiality and integrity of the application.