Логотип exploitDog
bind:CVE-2024-6153
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6153

Количество 3

Количество 3

nvd логотип

CVE-2024-6153

больше 1 года назад

Parallels Desktop Updater Protection Mechanism Failure Software Downgrade Vulnerability. This vulnerability allows local attackers to downgrade Parallels software on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. The issue results from the lack of proper validation of version information before performing an update. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-19481.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-6r7r-h64q-j8pj

больше 1 года назад

Parallels Desktop Updater Protection Mechanism Failure Software Downgrade Vulnerability. This vulnerability allows local attackers to downgrade Parallels software on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. The issue results from the lack of proper validation of version information before performing an update. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-19481.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-05182

около 3 лет назад

Уязвимость службы Updater гипервизора Parallels Desktop, позволяющая нарушителю понизить версию программного обеспечения

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6153

Parallels Desktop Updater Protection Mechanism Failure Software Downgrade Vulnerability. This vulnerability allows local attackers to downgrade Parallels software on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. The issue results from the lack of proper validation of version information before performing an update. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-19481.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-6r7r-h64q-j8pj

Parallels Desktop Updater Protection Mechanism Failure Software Downgrade Vulnerability. This vulnerability allows local attackers to downgrade Parallels software on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. The issue results from the lack of proper validation of version information before performing an update. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-19481.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-05182

Уязвимость службы Updater гипервизора Parallels Desktop, позволяющая нарушителю понизить версию программного обеспечения

CVSS3: 7.8
0%
Низкий
около 3 лет назад

Уязвимостей на страницу