Security Hero Rotating Header Image

Posts Tagged ‘Escalation’

Dovecot Insecure ‘base_dir’ Permissions Local Privilege Escalation Vulnerability

Vuln: Dovecot Insecure ‘base_dir’ Permissions Local Privilege Escalation Vulnerability Dovecot Insecure ‘base_dir’ Permissions Local Privilege Escalation Vulnerability URL: http://www.securityfocus.com/bid/37084

nilfs-utils Multiple Local Privilege Escalation Vulnerabilities

Vuln: nilfs-utils Multiple Local Privilege Escalation Vulnerabilities nilfs-utils Multiple Local Privilege Escalation Vulnerabilities URL: http://www.securityfocus.com/bid/35796

NOS getPlus Download Manager Insecure File Permissions Local Privilege Escalation Vulnerability

Vuln: NOS getPlus Download Manager Insecure File Permissions Local Privilege Escalation Vulnerability NOS getPlus Download Manager Insecure File Permissions Local Privilege Escalation Vulnerability URL: http://www.securityfocus.com/bid/35740

SonicWALL Global VPN Client Local Privilege Escalation Vulnerability

Bugtraq: SEC Consult SA-20090525-3 :: SonicWALL Global VPN Client Local Privilege Escalation Vulnerability SEC Consult SA-20090525-3 :: SonicWALL Global VPN Client Local Privilege Escalation Vulnerability URL: http://www.securityfocus.com/archive/1/503832

SonicWALL Global Security Client Local Privilege Escalation Vulnerability

SEC Consult SA-20090525-2 :: SonicWALL Global Security Client Local Privilege Escalation Vulnerability <!– Envelope-to: email@address Delivery-date: Tue, 26 May 2009 17:49:37 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M8zqL-0003G2-4l for email@address; Tue, 26 May 2009 17:49:37 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id 4068823794B; [...]

Multiple ArcaBit ArcaVir Products Multiple IOCTL Request Local Privilege Escalation Vulnerabilities

Vuln: Multiple ArcaBit ArcaVir Products Multiple IOCTL Request Local Privilege Escalation Vulnerabilities Multiple ArcaBit ArcaVir Products Multiple IOCTL Request Local Privilege Escalation Vulnerabilities URL: http://www.securityfocus.com/bid/35100

Microsoft validates web server vulnerability

Microsoft validates web server vulnerability Microsoft on Tuesday confirmed the presence of a privilege-escalation vulnerability in its Internet Information Services web server — but said no exploits are underway. URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/MRQDeMPNzOQ/

Linux Kernel ‘exit_notify()’ CAP_KILL Verification Local Privilege Escalation Vulnerability

Vuln: Linux Kernel ‘exit_notify()’ CAP_KILL Verification Local Privilege Escalation Vulnerability Linux Kernel ‘exit_notify()’ CAP_KILL Verification Local Privilege Escalation Vulnerability URL: http://www.securityfocus.com/bid/34405

Adobe Flash Media Server privilege escalation security bulletin, (Fri, May 1st)

Adobe Flash Media Server privilege escalation security bulletin, (Fri, May 1st) >From their web site: A potential vulnerability has been identified in Flash Media Server 3.5.1 and earlier that could allow an attacker to execute remote procedures in Flash Media Interactive Server or Flash Media Streaming Server. Adobe recommends users update to the most current [...]

libvirt ‘libvirt_proxy.c’ Local Privilege Escalation Vulnerability

Vuln: libvirt ‘libvirt_proxy.c’ Local Privilege Escalation Vulnerability libvirt ‘libvirt_proxy.c’ Local Privilege Escalation Vulnerability URL: http://www.securityfocus.com/bid/33724

SLURM ‘sbcast’ and ‘strigger’ Group Permissions Local Privilege Escalation Vulnerability

Vuln: SLURM ‘sbcast’ and ‘strigger’ Group Permissions Local Privilege Escalation Vulnerability SLURM ‘sbcast’ and ‘strigger’ Group Permissions Local Privilege Escalation Vulnerability URL: http://www.securityfocus.com/bid/34638

DirectAdmin ‘/CMD_DB’ Restore Action Local Privilege Escalation Vulnerability

Vuln: DirectAdmin ‘/CMD_DB’ Restore Action Local Privilege Escalation Vulnerability DirectAdmin ‘/CMD_DB’ Restore Action Local Privilege Escalation Vulnerability URL: http://www.securityfocus.com/bid/34678

DirectAdmin lt 1.33.4 Local file overwrite amp Local root escalation

DirectAdmin lt 1.33.4 Local file overwrite amp Local root escalation Posted by anony mous on Apr 22 Author: Anonymous ReleaseID: d8253f15e447935c24ab38a215735931942a77717d7b55d84200d070d1e54d3b The issue on www.directadmin.com/features.php?id=968 is larger than the wording would… URL: http://seclists.org/fulldisclosure/2009/Apr/0227.html

New slurm-llnl packages fix privilege escalation

[SECURITY] [DSA 1776-1] New slurm-llnl packages fix privilege escalation <!– Envelope-to: email@address Delivery-date: Tue, 21 Apr 2009 17:12:57 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1LwIaf-00019I-Jw for email@address; Tue, 21 Apr 2009 17:12:57 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id EA9462377B3; Tue, 21 Apr [...]

New git-core packages fix privilege escalation

[SECURITY] [DSA 1777-1] New git-core packages fix privilege escalation <!– Envelope-to: email@address Delivery-date: Tue, 21 Apr 2009 16:47:46 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1LwICI-0000at-3h for email@address; Tue, 21 Apr 2009 16:47:46 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id 7ABFE237733; Tue, 21 Apr [...]

Bad Behavior has blocked 425 access attempts in the last 7 days.