HackAndPwn
Security & Vulnerability Researcher / Professional Penetration Tester

Home

  • CVE-2021-27064 - Microsoft - Privilege Escalation

    A remote code execution vulnerability exists when the Visual Studio installer executes the feedback client in an elevated state.


  • CVE-2021-23879 - McAfee - Unquoted Search Path or Element

    Unquoted service path vulnerability in McAfee Endpoint Product Removal (EPR) Tool prior to 21.2 allows local administrators to execute arbitrary code, with higher-level privileges, via execution from a compromised folder. The tool did not enforce and protect the execution path.


  • CVE-2021-23878 - McAfee - Cleartext Storage of Sensitive Information

    Clear text storage of sensitive Information in memory vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows a local user to view ENS settings and credentials via accessing process memory after the ENS administrator has performed specific actions.


  • CVE-2021-1694 - Microsoft - Improper Privilege Management

    Windows Update Stack Elevation of Privilege Vulnerability


  • CVE-2020-26118 - SmartBear - Deserialization of Untrusted Data

    In SmartBear Collaborator Server through 13.3.13302, use of the Google Web Toolkit (GWT) API introduces a post-authentication Java deserialization vulnerability. The application’s UpdateMemento class accepts a serialized Java object directly from the user without properly sanitizing it. A malicious object can be submitted to the server via an authenticated attacker to execute commands on the underlying system.



     Page: 8 of 13     
buy me a coffee