Vulnerabilities (CVE)

Filtered by CWE-59
Total 1268 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-38081 1 Microsoft 16 .net, .net Framework, Visual Studio 2022 and 13 more 2024-11-21 N/A 7.3 HIGH
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
CVE-2024-38022 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2024-11-21 N/A 7.0 HIGH
Windows Image Acquisition Elevation of Privilege Vulnerability
CVE-2024-38013 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2024-11-21 N/A 6.7 MEDIUM
Microsoft Windows Server Backup Elevation of Privilege Vulnerability
CVE-2024-35261 1 Microsoft 1 Azure Network Watcher Agent 2024-11-21 N/A 7.8 HIGH
Azure Network Watcher VM Extension Elevation of Privilege Vulnerability
CVE-2024-35254 1 Microsoft 1 Azure Monitor Agent 2024-11-21 N/A 7.1 HIGH
Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2024-35253 1 Microsoft 1 Azure File Sync 2024-11-21 N/A 4.4 MEDIUM
Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVE-2024-32002 1 Git 1 Git 2024-11-21 N/A 9.0 CRITICAL
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
CVE-2024-30104 1 Microsoft 2 365 Apps, Office 2024-11-21 N/A 7.8 HIGH
Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30093 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2024-11-21 N/A 7.3 HIGH
Windows Storage Elevation of Privilege Vulnerability
CVE-2024-30076 1 Microsoft 11 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 8 more 2024-11-21 N/A 6.8 MEDIUM
Windows Container Manager Service Elevation of Privilege Vulnerability
CVE-2024-30065 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2024-11-21 N/A 5.5 MEDIUM
Windows Themes Denial of Service Vulnerability
CVE-2024-29188 2024-11-21 N/A 7.9 HIGH
WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. The custom action behind WiX's `RemoveFolderEx` functionality could allow a standard user to delete protected directories. `RemoveFolderEx` deletes an entire directory tree during installation or uninstallation. It does so by recursing every subdirectory starting at a specified directory and adding each subdirectory to the list of directories Windows Installer should delete. If the setup author instructed `RemoveFolderEx` to delete a per-user folder from a per-machine installer, an attacker could create a directory junction in that per-user folder pointing to a per-machine, protected directory. Windows Installer, when executing the per-machine installer after approval by an administrator, would delete the target of the directory junction. This vulnerability is fixed in 3.14.1 and 4.0.5.
CVE-2024-29069 1 Canonical 1 Snapd 2024-11-21 N/A 4.8 MEDIUM
In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squashfs file-system image and so can contain symbolic links and other file types. Various file entries within the snap squashfs image (such as icons and desktop files etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained symbolic links at these paths could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow an unprivileged user to gain access to privileged information.
CVE-2024-28189 2024-11-21 N/A 10.0 CRITICAL
Judge0 is an open-source online code execution system. The application uses the UNIX chown command on an untrusted file within the sandbox. An attacker can abuse this by creating a symbolic link (symlink) to a file outside the sandbox, allowing the attacker to run chown on arbitrary files outside of the sandbox. This vulnerability is not impactful on it's own, but it can be used to bypass the patch for CVE-2024-28185 and obtain a complete sandbox escape. This vulnerability is fixed in 1.13.1.
CVE-2024-28185 2024-11-21 N/A 10.0 CRITICAL
Judge0 is an open-source online code execution system. The application does not account for symlinks placed inside the sandbox directory, which can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox. When executing a submission, Judge0 writes a `run_script` to the sandbox directory. The security issue is that an attacker can create a symbolic link (symlink) at the path `run_script` before this code is executed, resulting in the `f.write` writing to an arbitrary file on the unsandboxed system. An attacker can leverage this vulnerability to overwrite scripts on the system and gain code execution outside of the sandbox.
CVE-2024-23459 2024-11-21 N/A 7.1 HIGH
An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Mac allows a system file to be overwritten.This issue affects Zscaler Client Connector on Mac : before 3.7.
CVE-2024-21397 1 Microsoft 1 Azure File Sync 2024-11-21 N/A 5.3 MEDIUM
Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVE-2024-21329 1 Microsoft 1 Azure Connected Machine Agent 2024-11-21 N/A 7.3 HIGH
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2024-20656 1 Microsoft 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more 2024-11-21 N/A 7.8 HIGH
Visual Studio Elevation of Privilege Vulnerability
CVE-2024-1329 1 Hashicorp 1 Nomad 2024-11-21 N/A 7.7 HIGH
HashiCorp Nomad and Nomad Enterprise 1.5.13 up to 1.6.6, and 1.7.3 template renderer is vulnerable to arbitrary file write on the host as the Nomad client user through symlink attacks. This vulnerability, CVE-2024-1329, is fixed in Nomad 1.7.4, 1.6.7, and 1.5.14.