Логотип exploitDog
bind:CVE-2023-50226
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-50226

Количество 3

Количество 3

nvd логотип

CVE-2023-50226

почти 2 года назад

Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. . Was ZDI-CAN-21227.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-9285-vgjw-7xjf

почти 2 года назад

Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-21227.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-09065

больше 2 лет назад

Уязвимость службы Updater гипервизора Parallels Desktop, позволяющая нарушителю выполнить произвольный код и повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-50226

Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. . Was ZDI-CAN-21227.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-9285-vgjw-7xjf

Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-21227.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-09065

Уязвимость службы Updater гипервизора Parallels Desktop, позволяющая нарушителю выполнить произвольный код и повысить свои привилегии

CVSS3: 7.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу