Vulnerabilities (CVE)

Filtered by CWE-269
Total 2820 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-10939 1 Phoenixcontact 1 Pc Worx Srt 2024-11-21 4.6 MEDIUM 7.8 HIGH
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-10936 4 Canonical, Debian, Fedoraproject and 1 more 4 Ubuntu Linux, Debian Linux, Fedora and 1 more 2024-11-21 7.2 HIGH 7.8 HIGH
Sympa before 6.2.56 allows privilege escalation.
CVE-2020-10862 2 Avast, Microsoft 2 Antivirus, Windows 2024-11-21 4.6 MEDIUM 7.8 HIGH
An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Local Privilege Escalation (LPE) via RPC.
CVE-2020-10793 1 Codeigniter 1 Codeigniter 2024-11-21 6.5 MEDIUM 8.8 HIGH
CodeIgniter through 4.0.0 allows remote attackers to gain privileges via a modified Email ID to the "Select Role of the User" page. NOTE: A contributor to the CodeIgniter framework argues that the issue should not be attributed to CodeIgniter. Furthermore, the blog post reference shows an unknown website built with the CodeIgniter framework but that CodeIgniter is not responsible for introducing this issue because the framework has never provided a login screen, nor any kind of login or user management facilities beyond a Session library. Also, another reporter indicates the issue is with a custom module/plugin to CodeIgniter, not CodeIgniter itself.
CVE-2020-10787 1 Vestacp 1 Vesta Control Panel 2024-11-21 9.0 HIGH 8.8 HIGH
An elevation of privilege in Vesta Control Panel through 0.9.8-26 allows an attacker to gain root system access from the admin account via v-change-user-password (aka the user password change script).
CVE-2020-10728 1 Automationbroker 1 Apb 2024-11-21 N/A 7.8 HIGH
A flaw was found in automationbroker/apb container in versions up to and including 2.0.4-1. This container grants all users sudoer permissions allowing an unauthorized user with access to the running container the ability to escalate their own privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE-2020-10678 1 Octopus 1 Octopus Deploy 2024-11-21 6.5 MEDIUM 8.8 HIGH
In Octopus Deploy before 2020.1.5, for customers running on-premises Active Directory linked to their Octopus server, an authenticated user can leverage a bug to escalate privileges.
CVE-2020-10649 2 Asus, Microsoft 2 Device Activation, Windows 10 2024-11-21 7.2 HIGH 7.8 HIGH
DevActSvc.exe in ASUS Device Activation before 1.0.7.0 for Windows 10 notebooks and PCs could lead to unsigned code execution with no additional restrictions when a user puts an application at a particular path with a particular file name.
CVE-2020-10589 1 V2rayl Project 1 V2rayl 2024-11-21 7.2 HIGH 7.8 HIGH
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
CVE-2020-10588 1 V2rayl Project 1 V2rayl 2024-11-21 7.2 HIGH 7.8 HIGH
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/add.sh and /etc/v2rayL/remove.sh are owned by a low-privileged user but execute as root via Sudo.
CVE-2020-10565 1 Freebsd 1 Freebsd 2024-11-21 7.2 HIGH 7.8 HIGH
grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary read or write operations in the context of the grub-bhyve process, resulting in code execution as root on the host OS.
CVE-2020-10551 1 Tencent 1 Qqbrowser 2024-11-21 7.2 HIGH 7.8 HIGH
QQBrowser before 10.5.3870.400 installs a Windows service TsService.exe. This file is writable by anyone belonging to the NT AUTHORITY\Authenticated Users group, which includes all local and remote users. This can be abused by local attackers to escalate privileges to NT AUTHORITY\SYSTEM by writing a malicious executable to the location of TsService.
CVE-2020-10534 1 Mediawiki 1 Mediawiki 2024-11-21 7.5 HIGH 9.8 CRITICAL
In the GlobalBlocking extension before 2020-03-10 for MediaWiki through 1.34.0, an issue related to IP range evaluation resulted in blocked users re-gaining escalated privileges. This is related to the case in which an IP address is contained in two ranges, one of which is locally disabled.
CVE-2020-10384 1 Mbconnectline 2 Mbconnect24, Mymbconnect24 2024-11-21 7.2 HIGH 7.8 HIGH
An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.6.1. There is a local privilege escalation from the www-data account to the root account.
CVE-2020-10290 1 Sintef 1 Urx 2024-11-21 7.2 HIGH 6.8 MEDIUM
Universal Robots controller execute URCaps (zip files containing Java-powered applications) without any permission restrictions and a wide API that presents many primitives that can compromise the overall robot operations as demonstrated in our video. In our PoC we demonstrate how a malicious actor could 'cook' a custom URCap that when deployed by the user (intendedly or unintendedly) compromises the system
CVE-2020-10286 1 Ufactory 6 Xarm 5 Lite, Xarm 5 Lite Firmware, Xarm 6 and 3 more 2024-11-21 5.8 MEDIUM 8.8 HIGH
the main user account has restricted privileges but is in the sudoers group and there is not any mechanism in place to prevent sudo su or sudo -i to be run gaining unrestricted access to sensible files, encryption, or issue orders that disrupt robot operation.
CVE-2020-10129 1 Searchblox 1 Searchblox 2024-11-21 N/A 8.8 HIGH
SearchBlox before Version 9.2.1 is vulnerable to Privileged Escalation-Lower user is able to access Admin functionality.
CVE-2020-0996 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2024-11-21 7.2 HIGH 7.8 HIGH
An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory, aka 'Windows Update Stack Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0985.
CVE-2020-0985 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2024-11-21 7.2 HIGH 7.8 HIGH
An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory, aka 'Windows Update Stack Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0996.
CVE-2020-0984 1 Microsoft 1 Autoupdate 2024-11-21 4.6 MEDIUM 7.8 HIGH
An elevation of privilege vulnerability exists when the Microsoft AutoUpdate (MAU) application for Mac improperly validates updates before executing them, aka 'Microsoft (MAU) Office Elevation of Privilege Vulnerability'.