Michael Orlitzky

3 exploits Active since Aug 2017
CVE-2017-12847 WRITEUP MEDIUM WRITEUP
Nagios Core <4.3.3 - Privilege Escalation
Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command.
CVSS 6.3
CVE-2024-43199 WRITEUP HIGH WRITEUP
Nagios NDOUtils <2.1.4 - Privilege Escalation
Nagios NDOUtils before 2.1.4 allows privilege escalation from nagios to root because certain executable files are owned by the nagios user.
CVSS 7.8
CVE-2017-18078 EXPLOITDB HIGH text WRITEUP
Systemd < 237 - Symlink Following
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
CVSS 7.8