Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-47632

EPSS 0.06% · P18
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-47632

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Razer Synapse before 3.7.0830.081906 allows privilege escalation due to an unsafe installation path, improper privilege management, and improper certificate validation. Attackers can place malicious DLLs into %PROGRAMDATA%\Razer\Synapse3\Service\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if the malicious DLLs are unsigned, it suffices to use self-signed DLLs. The validity of the DLL signatures is not checked. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Razer Synapse 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Razer Synapse是美国雷蛇(Razer)公司的一款应用程序。旨在配置和定制 Razer 的硬件系列。 Razer Synapse 3.7.0830.081906之前的版本存在安全漏洞,该漏洞源于其不安全的安装路径、不适当的权限管理和不适当的证书验证允许本地攻击者可以滥用驱动程序安装程序来获得Windows上的管理权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-47632

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-47632

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-01-27 · 39 CVEs total

CVE-2023-05493.5 LOWYAFNET Private Message PostPrivateMessage cross site scripting
CVE-2022-48069TOTOLINK A830R 操作系统命令注入漏洞
CVE-2022-48007Piwigo 跨站脚本漏洞
CVE-2022-48008LimeSurvey 代码问题漏洞
CVE-2022-48010LimeSurvey 跨站脚本漏洞
CVE-2022-48011OpenCats SQL注入漏洞
CVE-2022-48012Opencats 跨站脚本漏洞
CVE-2022-48013OpenCats 跨站脚本漏洞
CVE-2022-48066TOTOLINK A830R 授权问题漏洞
CVE-2022-48067TOTOLINK A830R 信任管理问题漏洞
CVE-2022-46968Revenue Collection System 跨站脚本漏洞
CVE-2022-48070PHICOMM K2G A1 操作系统命令注入漏洞
CVE-2022-48071PHICOMM K2G A1 安全漏洞
CVE-2022-48072PHICOMM K2G A1 操作系统命令注入漏洞
CVE-2022-48073PHICOMM K2G A1 安全漏洞
CVE-2022-48107D-Link DIR-878 操作系统命令注入漏洞
CVE-2022-48108D-Link DIR-878 操作系统命令注入漏洞
CVE-2022-48116AyaCMS 安全漏洞
CVE-2022-48118Jorani 跨站脚本漏洞
CVE-2023-24060github haven 代码问题漏洞

Showing top 20 of 39 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-47632

No comments yet


Leave a comment