Логотип exploitDog
bind:CVE-2024-5928
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-5928

Количество 3

Количество 3

nvd логотип

CVE-2024-5928

больше 1 года назад

VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Patch Management Agent. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22315.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-q3pq-6mcr-hp32

больше 1 года назад

VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Patch Management Agent. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22315.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-05073

около 3 лет назад

Уязвимость компонента Patch Management Agent антивирусного программного обеспечения VIPRE Advanced Security, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-5928

VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Patch Management Agent. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22315.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-q3pq-6mcr-hp32

VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Patch Management Agent. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22315.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-05073

Уязвимость компонента Patch Management Agent антивирусного программного обеспечения VIPRE Advanced Security, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
около 3 лет назад

Уязвимостей на страницу