

If the attacker uploads a Python script to the right location, they can execute arbitrary code within the container. With some self-hosted configurations in versions prior to, attackers can register new accounts and upload files to arbitrary directories within the container. GrowthBook is an open-source platform for feature flagging and A/B testing. In JetBrains IntelliJ IDEA before 2022.2 local code execution via a Vagrant executable was possible This could result in the user gaining elevated permissions and being able to execute arbitrary code due to lack of an integrity check of the configuration file.
#Bochs meanger 2.4.7 plus
Weak permissions on the configuration file in the PAM module in Grommunio Gromox 0.5 through 1.x before 1.28 allow a local unprivileged user in the gromox group to have the PAM stack execute arbitrary code upon loading the Gromox PAM module.Īn improper privilege management vulnerability in McAfee Security Scan Plus (MSS+) before 4.1.262.1 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack.

In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.Īn origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.Ī security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2022-40708.Ī link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities.
#Bochs meanger 2.4.7 windows
This vulnerability is similar to, but not identical to CVE-2022-40707.Īn Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations.

This vulnerability is similar to, but not identical to CVE-2022-4078.Īn Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.Īn Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. A link following vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to escalate privileges on affected installations.
