Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal.
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Security Support Provider Interface Elevation of Privilege Vulnerability
There is an unquoted service path in Sherpa Connector Service (SherpaConnectorService.exe) 2020.2.20328.2050. This might allow a local user to escalate privileges by creating a "C:\Program Files\Sherpa Software\Sherpa.exe" file.
A local privilege escalation (LPE) issue was discovered in the ransomware canaries features of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.
Windows Fax and Scan Service Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally.
Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
Windows CD-ROM Driver Elevation of Privilege Vulnerability
Double free in Windows Smart Card allows an authorized attacker to elevate privileges locally.
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is vulnerable to stack based buffer overflow, caused by improper bounds checking which could lead an attacker to execute arbitrary code. IBM X-Force ID: 140210.
Microsoft Defender for IoT Elevation of Privilege Vulnerability
Windows Inking COM Elevation of Privilege Vulnerability
SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries.
IBM InfoSphere Information Server 11.7 could allow a locally authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request.
ProtonVPN before 3.2.10 on Windows mishandles the drive installer path, which should use this: '"' + ExpandConstant('{autopf}\Proton\Drive') + '"' in Setup/setup.iss.
SQL Server for Linux Containers Elevation of Privilege Vulnerability
Microsoft OneDrive for Android Security Feature Bypass Vulnerability
Named Pipe File System Elevation of Privilege Vulnerability
Windows PDEV Elevation of Privilege Vulnerability
The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system user to read and write within restricted memory space.
Windows Hyper-V Remote Code Execution Vulnerability
Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.
Windows Installer Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
Windows User Profile Service Elevation of Privilege Vulnerability
Microsoft OfficePlus Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability
DirectX Graphics Kernel Remote Code Execution Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Fax Service Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability