Page 150 of 2983 results (0.015 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 3

SerialiseValue in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. 0xffffffff is sign-extended to 0xffffffffffffffff (SIZE_MAX) and then there is an attempt to add 1. RenderDoc versions 1.26 and below suffer from integer underflow, integer overflow, and symlink vulnerabilities. • http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html http://seclists.org/fulldisclosure/2023/Jun/2 https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html https://renderdoc.org https://security.gentoo.org/glsa/202311-10 https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 3

RenderDoc before 1.27 allows local privilege escalation via a symlink attack. • http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html http://seclists.org/fulldisclosure/2023/Jun/2 https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html https://renderdoc.org https://security.gentoo.org/glsa/202311-10 https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An issue discovered in SeedDMS 6.0.15 allows an attacker to escalate privileges via the userid and role parameters in the out.UsrMgr.php file. • https://sunil-singh.notion.site/SeedDMS-6-0-15-Insecure-Direct-Object-Reference-IDOR-ff504354656b47b2b0cee0b7a82ad08c https://www.notion.so/SeedDMS-6-0-15-Incorrect-Access-Control-ff504354656b47b2b0cee0b7a82ad08c • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A local privilege escalation vulnerability in the ThinkPad Hybrid USB-C with USB-A Dock Firmware Update Tool could allow an attacker with local access to execute code with elevated privileges during the package upgrade or installation. • https://support.lenovo.com/us/en/product_security/LEN-103544 • CWE-276: Incorrect Default Permissions •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user. • https://advisory.splunk.com/advisories/SVD-2023-0607 • CWE-269: Improper Privilege Management •