Filtered by CWE-59
Total 1273 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-21725 1 Microsoft 1 Windows Malicious Software Removal Tool 2025-01-01 6.3 Medium
Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability
CVE-2023-21678 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 12 more 2025-01-01 7.8 High
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2023-21542 1 Microsoft 9 Windows 10 1607, Windows 7, Windows 8.1 and 6 more 2025-01-01 7 High
Windows Installer Elevation of Privilege Vulnerability
CVE-2024-43470 1 Microsoft 1 Azure Network Watcher Agent 2024-12-31 7.3 High
Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2024-38188 1 Microsoft 1 Azure Network Watcher Agent 2024-12-31 7.1 High
Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2024-21432 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2024-12-31 7 High
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-26199 1 Microsoft 1 365 Apps 2024-12-31 7.8 High
Microsoft Office Elevation of Privilege Vulnerability
CVE-2024-35254 1 Microsoft 1 Azure Monitor Agent 2024-12-31 7.1 High
Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2024-35253 1 Microsoft 1 Azure File Sync 2024-12-31 4.4 Medium
Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVE-2024-30104 1 Microsoft 2 365 Apps, Office 2024-12-31 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30093 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2024-12-31 7.3 High
Windows Storage Elevation of Privilege Vulnerability
CVE-2024-30065 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2024-12-31 5.5 Medium
Windows Themes Denial of Service Vulnerability
CVE-2024-30076 1 Microsoft 11 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 8 more 2024-12-31 6.8 Medium
Windows Container Manager Service Elevation of Privilege Vulnerability
CVE-2024-52050 1 Trendmicro 2 Apexone Op, Apexone Saas 2024-12-31 7.8 High
A LogServer arbitrary file creation vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2024-12754 2024-12-31 N/A
AnyDesk Link Following Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of AnyDesk. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of background images. By creating a junction, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-23940.
CVE-2024-21397 1 Microsoft 1 Azure File Sync 2024-12-31 5.3 Medium
Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVE-2024-21329 1 Microsoft 1 Azure Connected Machine Agent 2024-12-31 7.3 High
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2024-20656 1 Microsoft 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more 2024-12-31 7.8 High
Visual Studio Elevation of Privilege Vulnerability
CVE-2024-45770 1 Redhat 5 Enterprise Linux, Rhel Aus, Rhel E4s and 2 more 2024-12-26 4.4 Medium
A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.
CVE-2024-7234 1 Avg 2 Anti-virus, Antivirus 2024-12-19 7.8 High
AVG AntiVirus Free AVGSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of AVG AntiVirus Free. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AVG Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22260.