Filtered by vendor Capmon
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-18256 | 1 Capmon | 1 Access Manager | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
An issue was discovered in CapMon Access Manager 5.4.1.1005. A regular user can obtain local administrator privileges if they run any whitelisted application through the Custom App Launcher. | |||||
CVE-2018-18255 | 1 Capmon | 1 Access Manager | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
An issue was discovered in CapMon Access Manager 5.4.1.1005. The client applications of AccessManagerCoreService.exe communicate with this server through named pipes. A user can initiate communication with the server by creating a named pipe and sending commands to achieve elevated privileges. | |||||
CVE-2018-18254 | 1 Capmon | 1 Access Manager | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
An issue was discovered in CapMon Access Manager 5.4.1.1005. An unprivileged user can read the cal_whitelist table in the Custom App Launcher (CAL) database, and potentially gain privileges by placing a Trojan horse program at an app pathname. | |||||
CVE-2018-18253 | 1 Capmon | 1 Access Manager | 2024-11-21 | 6.9 MEDIUM | 7.0 HIGH |
An issue was discovered in CapMon Access Manager 5.4.1.1005. CALRunElevated.exe attempts to enforce access control by adding an unprivileged user to the local Administrators group for a very short time to execute a single command. However, the user is left in that group if the command crashes, and there is also a race condition in all cases. | |||||
CVE-2018-18252 | 1 Capmon | 1 Access Manager | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
An issue was discovered in CapMon Access Manager 5.4.1.1005. CALRunElevated.exe provides "NT AUTHORITY\SYSTEM" access to unprivileged users via the --system option. |