Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown

CVE-2022-29022

Disclosure Date: May 20, 2022 (last updated February 23, 2025)
A buffer overflow vulnerability exists in the razeraccessory driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.
Attacker Value
Unknown

CVE-2022-29021

Disclosure Date: May 20, 2022 (last updated February 23, 2025)
A buffer overflow vulnerability exists in the razerkbd driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.
Attacker Value
Unknown

CVE-2022-29023

Disclosure Date: May 20, 2022 (last updated February 23, 2025)
A buffer overflow vulnerability exists in the razermouse driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.
Attacker Value
Unknown

CVE-2021-44226

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
Attacker Value
Unknown

CVE-2021-30494

Disclosure Date: April 14, 2021 (last updated February 22, 2025)
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations).
Attacker Value
Unknown

CVE-2021-30493

Disclosure Date: April 14, 2021 (last updated February 22, 2025)
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the ChromaBroadcast subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations).
Attacker Value
Unknown

CVE-2020-16602

Disclosure Date: September 02, 2020 (last updated February 22, 2025)
Razer Chroma SDK Rest Server through 3.12.17 allows remote attackers to execute arbitrary programs because there is a race condition in which a file created under "%PROGRAMDATA%\Razer Chroma\SDK\Apps" can be replaced before it is executed by the server. The attacker must have access to port 54236 for a registration step.
Attacker Value
Unknown

CVE-2019-13142

Disclosure Date: July 09, 2019 (last updated November 27, 2024)
The RzSurroundVADStreamingService (RzSurroundVADStreamingService.exe) in Razer Surround 1.1.63.0 runs as the SYSTEM user using an executable located in %PROGRAMDATA%\Razer\Synapse\Devices\Razer Surround\Driver\. The DACL on this folder allows any user to overwrite contents of files in this folder, resulting in Elevation of Privilege.
0
Attacker Value
Unknown

CVE-2017-14398

Disclosure Date: September 13, 2017 (last updated November 26, 2024)
rzpnk.sys in Razer Synapse 2.20.15.1104 allows local users to read and write to arbitrary memory locations, and consequently gain privileges, via a methodology involving a handle to \Device\PhysicalMemory, IOCTL 0x22A064, and ZwMapViewOfSection.
Attacker Value
Unknown

CVE-2017-11652

Disclosure Date: August 18, 2017 (last updated November 26, 2024)
Razer Synapse 2.20.15.1104 and earlier uses weak permissions for the CrashReporter directory, which allows local users to gain privileges via a Trojan horse dbghelp.dll file.