Filtered by CWE-59
Total 1174 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-35254 1 Microsoft 1 Azure Monitor Agent 2024-08-02 7.1 High
Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2024-35235 2 Openprinting, Redhat 6 Cups, Enterprise Linux, Rhel Aus and 3 more 2024-08-02 4.4 Medium
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.
CVE-2024-32002 2 Git, Redhat 6 Git, Enterprise Linux, Rhel Aus and 3 more 2024-08-02 9.1 Critical
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
CVE-2024-30104 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-08-02 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30065 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2024-08-02 5.5 Medium
Windows Themes Denial of Service Vulnerability
CVE-2024-30076 1 Microsoft 17 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 14 more 2024-08-02 6.8 Medium
Windows Container Manager Service Elevation of Privilege Vulnerability
CVE-2024-30093 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2024-08-02 7.3 High
Windows Storage Elevation of Privilege Vulnerability
CVE-2024-30060 1 Microsoft 1 Azure Monitor Agent 2024-08-02 7.8 High
Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2024-30018 1 Microsoft 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more 2024-08-02 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-30033 1 Microsoft 4 Windows 10 21h2, Windows 10 22h2, Windows 11 21h2 and 1 more 2024-08-02 7 High
Windows Search Service Elevation of Privilege Vulnerability
CVE-2024-29989 1 Microsoft 1 Azure Monitor Agent 2024-08-02 8.4 High
Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2024-29188 2024-08-02 7.8 High
WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. The custom action behind WiX's `RemoveFolderEx` functionality could allow a standard user to delete protected directories. `RemoveFolderEx` deletes an entire directory tree during installation or uninstallation. It does so by recursing every subdirectory starting at a specified directory and adding each subdirectory to the list of directories Windows Installer should delete. If the setup author instructed `RemoveFolderEx` to delete a per-user folder from a per-machine installer, an attacker could create a directory junction in that per-user folder pointing to a per-machine, protected directory. Windows Installer, when executing the per-machine installer after approval by an administrator, would delete the target of the directory junction. This vulnerability is fixed in 3.14.1 and 4.0.5.
CVE-2024-28907 1 Microsoft 1 Windows Server 23h2 2024-08-02 7.8 High
Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-28185 2024-08-02 10 Critical
Judge0 is an open-source online code execution system. The application does not account for symlinks placed inside the sandbox directory, which can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox. When executing a submission, Judge0 writes a `run_script` to the sandbox directory. The security issue is that an attacker can create a symbolic link (symlink) at the path `run_script` before this code is executed, resulting in the `f.write` writing to an arbitrary file on the unsandboxed system. An attacker can leverage this vulnerability to overwrite scripts on the system and gain code execution outside of the sandbox.
CVE-2024-28189 1 Judge0 1 Judge0 2024-08-02 10 Critical
Judge0 is an open-source online code execution system. The application uses the UNIX chown command on an untrusted file within the sandbox. An attacker can abuse this by creating a symbolic link (symlink) to a file outside the sandbox, allowing the attacker to run chown on arbitrary files outside of the sandbox. This vulnerability is not impactful on it's own, but it can be used to bypass the patch for CVE-2024-28185 and obtain a complete sandbox escape. This vulnerability is fixed in 1.13.1.
CVE-2024-27885 1 Apple 1 Macos 2024-08-02 6.3 Medium
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. An app may be able to modify protected parts of the file system.
CVE-2024-26238 1 Microsoft 2 Windows 10 21h2, Windows 10 22h2 2024-08-02 7.8 High
Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability
CVE-2024-26216 1 Microsoft 8 Windows Server 2008 R2, Windows Server 2008 Sp2, Windows Server 2012 and 5 more 2024-08-01 7.3 High
Windows File Server Resource Management Service Elevation of Privilege Vulnerability
CVE-2024-26199 1 Microsoft 1 365 Apps 2024-08-01 7.8 High
Microsoft Office Elevation of Privilege Vulnerability
CVE-2024-26158 1 Microsoft 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more 2024-08-01 7.8 High
Microsoft Install Service Elevation of Privilege Vulnerability