Total
5244 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2016-8742 | 2 Apache, Microsoft | 2 Couchdb, Windows | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service launcher, or CouchDB batch or binary files. A subsequent service or server restart will then run that binary with administrator privilege. This issue affected CouchDB 2.0.0 (Windows platform only) and was addressed in CouchDB 2.0.0.1. | |||||
CVE-2016-8657 | 1 Redhat | 2 Enterprise Linux, Jboss Enterprise Application Platform | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. | |||||
CVE-2016-8656 | 1 Redhat | 1 Jboss Enterprise Application Platform | 2024-11-21 | 4.6 MEDIUM | 7.0 HIGH |
Jboss jbossas before versions 5.2.0-23, 6.4.13, 7.0.5 is vulnerable to an unsafe file handling in the jboss init script which could result in local privilege escalation. | |||||
CVE-2016-8629 | 1 Redhat | 3 Enterprise Linux Server, Keycloak, Single Sign On | 2024-11-21 | 5.5 MEDIUM | 6.5 MEDIUM |
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm. | |||||
CVE-2016-8534 | 1 Hp | 1 Matrix Operating Environment | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
A remote privilege elevation vulnerability in HPE Matrix Operating Environment version 7.6 was found. | |||||
CVE-2016-8533 | 1 Hp | 1 Matrix Operating Environment | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
A remote priviledge escalation vulnerability in HPE Matrix Operating Environment version 7.6 was found. | |||||
CVE-2016-8528 | 1 Eucalyptus | 1 Eucalyptus | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found. | |||||
CVE-2016-8488 | 1 Google | 1 Android | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-31625756. | |||||
CVE-2016-8487 | 1 Google | 1 Android | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-28823724. | |||||
CVE-2016-8484 | 1 Google | 1 Android | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-28823575. | |||||
CVE-2016-8482 | 1 Google | 1 Android | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
An elevation of privilege vulnerability in the NVIDIA GPU driver. Product: Android. Versions: Android kernel. Android ID: A-31799863. References: N-CVE-2016-8482. | |||||
CVE-2016-7070 | 1 Redhat | 1 Ansible Tower | 2024-11-21 | 5.2 MEDIUM | 8.0 HIGH |
A privilege escalation flaw was found in the Ansible Tower. When Tower before 3.0.3 deploys a PostgreSQL database, it incorrectly configures the trust level of postgres user. An attacker could use this vulnerability to gain admin level access to the database. | |||||
CVE-2016-6564 | 7 Beeline, Bluproducts, Doogee and 4 more | 38 Pro 2, Pro 2 Firmware, Studio 6.0 Hd and 35 more | 2024-11-21 | 9.3 HIGH | 8.1 HIGH |
Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}} This binary is reported to be present in the following devices: BLU Studio G BLU Studio G Plus BLU Studio 6.0 HD BLU Studio X BLU Studio X Plus BLU Studio C HD Infinix Hot X507 Infinix Hot 2 X510 Infinix Zero X506 Infinix Zero 2 X509 DOOGEE Voyager 2 DG310 LEAGOO Lead 5 LEAGOO Lead 6 LEAGOO Lead 3i LEAGOO Lead 2S LEAGOO Alfa 6 IKU Colorful K45i Beeline Pro 2 XOLO Cube 5.0 | |||||
CVE-2016-5295 | 2 Microsoft, Mozilla | 2 Windows, Firefox | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
This vulnerability allows an attacker to use the Mozilla Maintenance Service to escalate privilege by having the Maintenance Service invoke the Mozilla Updater to run malicious local files. This vulnerability requires local system access and is a variant of MFSA2013-44. Note: this issue only affects Windows operating systems. This vulnerability affects Firefox < 50. | |||||
CVE-2016-1579 | 1 Canonical | 1 Ubuntu Download Manager | 2024-11-21 | 7.5 HIGH | 6.7 MEDIUM |
UDM provides support for running commands after a download is completed, this is currently made use of for click package installation. This functionality was not restricted to unconfined applications. Before UDM version 1.2+16.04.20160408-0ubuntu1 any confined application could make use of the UDM C++ API to run arbitrary commands in an unconfined environment as the phablet user. | |||||
CVE-2016-10935 | 1 Visser | 1 Store Exporter For Woocommerce | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The woocommerce-exporter plugin before 1.8.4 for WordPress has privilege escalation. | |||||
CVE-2016-10929 | 1 Advanced Ajax Page Loader Project | 1 Advanced Ajax Page Loader | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
The advanced-ajax-page-loader plugin before 2.7.7 for WordPress has no protection against the reading of uploaded files when not logged in. | |||||
CVE-2016-10923 | 1 Visser | 1 Store Toolkit For Woocommerce | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The woocommerce-store-toolkit plugin before 1.5.8 for WordPress has privilege escalation. | |||||
CVE-2016-10922 | 1 Visser | 1 Store Toolkit For Woocommerce | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The woocommerce-store-toolkit plugin before 1.5.7 for WordPress has privilege escalation. | |||||
CVE-2016-10886 | 1 Benjaminrojas | 1 Wp Editor | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The wp-editor plugin before 1.2.6 for WordPress has incorrect permissions. |