CVE-2023-34147 – Trend Micro Apex One Security Agent Exposed Dangerous Function Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2023-34147
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34148. This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US https://www.zerodayinitiative.com/advisories/ZDI-23-833 • CWE-269: Improper Privilege Management •
CVE-2023-34144 – Trend Micro Apex One Security Agent Untrusted Search Path Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2023-34144
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34145. This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US https://www.zerodayinitiative.com/advisories/ZDI-23-835 • CWE-426: Untrusted Search Path •
CVE-2023-33865 – RenderDoc 1.26 Local Privilege Escalation / Remote Code Execution
https://notcve.org/view.php?id=CVE-2023-33865
RenderDoc before 1.27 allows local privilege escalation via a symlink attack. • http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html http://seclists.org/fulldisclosure/2023/Jun/2 https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html https://renderdoc.org https://security.gentoo.org/glsa/202311-10 https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2021-33223
https://notcve.org/view.php?id=CVE-2021-33223
An issue discovered in SeedDMS 6.0.15 allows an attacker to escalate privileges via the userid and role parameters in the out.UsrMgr.php file. • https://sunil-singh.notion.site/SeedDMS-6-0-15-Insecure-Direct-Object-Reference-IDOR-ff504354656b47b2b0cee0b7a82ad08c https://www.notion.so/SeedDMS-6-0-15-Incorrect-Access-Control-ff504354656b47b2b0cee0b7a82ad08c • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2023-33553
https://notcve.org/view.php?id=CVE-2023-33553
An issue in Planet Technologies WDRT-1800AX v1.01-CP21 allows attackers to bypass authentication and escalate privileges to root via manipulation of the LoginStatus cookie. • https://github.com/0xfml/poc/blob/main/PLANET/WDRT-1800AX.md https://www.planet.com.tw/en/product/wdrt-1800ax • CWE-287: Improper Authentication •