Privilege Escalation

Privilege Escalation vulnerabilities allow an attacker to gain elevated access rights beyond their authorized level. This can enable unauthorized access to sensitive resources and system functions.

Total CVEs

49

Typical Severity

HIGH

Category

General

Understanding Privilege Escalation

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Privilege Escalation CVEs (49)

DescriptionVendor / ProductExploit Status
CVE-2026-231110.0

This vulnerability allows an attacker to escalate their privileges on a Linux system by exploiting a flaw in the nftables framework, which could let them access restricted resources. It requires the attacker to be an unprivileged user with access to user namespaces and nftables on systems that have certain kernel configurations enabled.

Unknown
Exploit Available
about 2 months agoFeb 13, 2026
CVE-2026-16188.8

This vulnerability allows an attacker to gain higher access privileges in the FlexCity/Kiosk software, potentially letting them control the system without proper authentication. It affects versions before 1.0.36, meaning anyone using an older version is at risk.

Unknown
Exploit Available
about 2 months agoFeb 13, 2026
CVE-2025-143498.8

This vulnerability allows an attacker to gain higher access privileges within the FlexCity/Kiosk software, potentially letting them perform unauthorized actions. It affects versions before 1.0.36 and occurs because the software doesn't properly restrict access to critical functions.

Unknown
Exploit Available
about 2 months agoFeb 13, 2026
CVE-2025-545197.3

This vulnerability allows a local attacker to run their own code with higher privileges on a system, which could lead to full control over the affected machine. To exploit this, the attacker needs to place a malicious file in a specific location where the software looks for its necessary files.

Unknown
Exploit Available
about 2 months agoFeb 12, 2026
CVE-2023-442097.8

This vulnerability allows an attacker with local access to a system to gain higher privileges than they should have, potentially letting them control the system or access sensitive data. It affects specific versions of Acronis Cyber Protect products before certain builds, meaning attackers need to be able to log into the system first to exploit it.

acronisagent
Theoretical
over 2 years agoOct 4, 2023
CVE-2022-26378.8

This vulnerability allows a remote user with valid login credentials to gain higher privileges than intended within the Hitachi Storage Plug-in for VMware vCenter, potentially giving them unauthorized access to sensitive functions or data. It affects versions from 04.8.0 up to, but not including, 04.9.0, meaning users on these versions are at risk if they have authenticated access.

hitachistorage plug-in
Exploit Available
over 3 years agoOct 6, 2022
CVE-2021-318547.8

This vulnerability allows an attacker to run their own commands on a Windows system by tricking McAfee Agent into executing a malicious file. To exploit it, the attacker needs local access to the machine and must place a specially crafted file in the right folder, which can then lead to gaining higher privileges on the system.

mcafeeagent
Exploit Available
about 4 years agoJan 19, 2022
CVE-2021-413727.6

An attacker can upload a malicious Power BI template that includes harmful HTML files, which can then execute scripts in the context of a user’s session, potentially allowing the attacker to gain higher privileges if the victim has admin rights. This requires the victim to be tricked into accessing the malicious HTML files while logged into the Power BI Report Server.

microsoftpower bi report server
Theoretical
over 4 years agoNov 10, 2021
CVE-2021-238927.0

This vulnerability allows a local user to gain administrator privileges on a system running McAfee's Endpoint Security for Linux, enabling them to execute any code they want. It occurs during the installation process due to a timing issue that lets the attacker exploit temporary files that are not securely managed.

mcafeeendpoint security for linux threat prevention
Exploit Available
almost 5 years agoMay 12, 2021
Showing 41 to 49 of 49 results