In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise. Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus compromise the system. This issue affects Junos OS Evolved: * All versions before 22.2R3-S7-EVO, * from 22.4 before 22.4R3-S7-EVO, * from 23.2 before 23.2R2-S4-EVO, * from 23.4 before 23.4R2-S5-EVO, * from 24.2 before 24.2R2-S1-EVO * from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO.
Rapid7 Minerva Armor versions below 4.5.5 suffer from a privilege escalation vulnerability whereby an authenticated attacker can elevate privileges and execute arbitrary code with SYSTEM privilege. The vulnerability is caused by the product's implementation of OpenSSL's`OPENSSLDIR` parameter where it is set to a path accessible to low-privileged users. The vulnerability has been remediated and fixed in version 4.5.5.
In injectInputEventToInputFilter of AccessibilityManagerService.java, there is a possible arbitrary input event injection due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
In the Linux kernel, the following vulnerability has been resolved: media: rc: bpf attach/detach requires write permission Note that bpf attach/detach also requires CAP_NET_ADMIN.
A low privileged local attacker can interact with the affected service although user-interaction should not be allowed.
In ppcfw_enable of ppcfw.c, there is a possible EoP due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
A permissions issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.4. A malicious application may be able to bypass Privacy preferences. Apple is aware of a report that this issue may have been actively exploited..
A vulnerability was found in Poly Trio 8500, Trio 8800 and Trio C60. It has been classified as problematic. This affects an unknown part of the component Poly Lens Management Cloud Registration. The manipulation leads to missing authorization. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier VDB-249261 was assigned to this vulnerability.
An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.
The vulnerability allows a low privileged (untrusted) application to modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical access through USB.
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In telocom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In camera service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In engineermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In power manager, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In phasechecksercer, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In getCredentialManagerPolicy of DevicePolicyManagerService.java, there is a possible method for users to select credential managers without permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
A missing authorization vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local authenticated users to access data or perform actions that they should not be allowed to perform via unspecified vectors. QuTScloud, is not affected. We have already fixed the vulnerability in the following versions: QTS 5.2.0.2737 build 20240417 and later QuTS hero h5.2.0.2782 build 20240601 and later
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a password requirement.
In multiple files, there is a possible way to import a contact from another user due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
In phoneEx service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
In windows manager service, there is a missing permission check. This could lead to set up windows manager service with no additional execution privileges needed.