Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-1299 | 2024-10-03 | N/A | 6.5 MEDIUM | ||
A privilege escalation vulnerability was discovered in GitLab affecting versions 16.8 prior to 16.8.4 and 16.9 prior to 16.9.2. It was possible for a user with custom role of `manage_group_access_tokens` to rotate group access tokens with owner privileges. | |||||
CVE-2024-1250 | 1 Gitlab | 1 Gitlab | 2024-10-03 | N/A | 6.5 MEDIUM |
An issue has been discovered in GitLab EE affecting all versions starting from 16.8 before 16.8.2. When a user is assigned a custom role with manage_group_access_tokens permission, they may be able to create group access tokens with Owner privileges, which may lead to privilege escalation. | |||||
CVE-2023-0971 | 1 Silabs | 1 Z\/ip Gateway Sdk | 2024-09-27 | N/A | 8.8 HIGH |
A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered. | |||||
CVE-2024-47045 | 2024-09-26 | N/A | 7.8 HIGH | ||
Privilege chaining issue exists in the installer of e-Tax software(common program). If this vulnerability is exploited, a malicious DLL prepared by an attacker may be executed with higher privileges than the application privilege. | |||||
CVE-2023-5839 | 1 Hestiacp | 1 Control Panel | 2024-02-28 | N/A | 7.8 HIGH |
Privilege Chaining in GitHub repository hestiacp/hestiacp prior to 1.8.9. | |||||
CVE-2023-0759 | 1 Agentejo | 1 Cockpit | 2024-02-28 | N/A | 8.8 HIGH |
Privilege Chaining in GitHub repository cockpit-hq/cockpit prior to 2.3.8. | |||||
CVE-2019-3844 | 3 Canonical, Netapp, Systemd Project | 7 Ubuntu Linux, Cn1610, Cn1610 Firmware and 4 more | 2024-02-28 | 4.6 MEDIUM | 7.8 HIGH |
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled. |