CVE-2021-32415
https://notcve.org/view.php?id=CVE-2021-32415
EXEMSI MSI Wrapper Versions prior to 10.0.50 and at least since version 6.0.91 will introduce a local privilege escalation vulnerability in installers it creates. • http://exemsi.com http://msi.com https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm •
CVE-2022-38628
https://notcve.org/view.php?id=CVE-2022-38628
This vulnerability allows attackers to escalate privileges via unspecified vectors. • https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt • CWE-384: Session Fixation •
CVE-2022-31696 – VMware ESXi TCP/IP Memory Corruption Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-31696
This vulnerability allows local attackers to escalate privileges on affected installations of VMware ESXi. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of kernel. • https://www.vmware.com/security/advisories/VMSA-2022-0030.html • CWE-787: Out-of-bounds Write •
CVE-2022-46383
https://notcve.org/view.php?id=CVE-2022-46383
The token can be used to escalate privileges within the Digital Rebar system and grant full administrative access. • https://docs.rackn.io/en/latest/doc/security/cve_2022_46383.html https://rackn.com/products/rebar •
CVE-2022-45771
https://notcve.org/view.php?id=CVE-2022-45771
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file. • https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE https://github.com/yuriisanin/CVE-2022-45771 https://github.com/pwndoc/pwndoc https://github.com/pwndoc/pwndoc/issues/401 •