Show filters
201 Total Results
Displaying 21-30 of 201
Sort by:
Attacker Value
Unknown
CVE-2020-29157
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
An issue in RAONWIZ K Editor v2018.0.0.10 allows attackers to perform a DLL hijacking attack when the service or system is restarted.
0
Attacker Value
Unknown
CVE-2021-3042
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent.
0
Attacker Value
Unknown
CVE-2021-28636
Disclosure Date: July 13, 2021 (last updated February 23, 2025)
Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. An attacker with access to the victim's C:/ folder could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
0
Attacker Value
Unknown
CVE-2021-28595
Disclosure Date: July 13, 2021 (last updated February 23, 2025)
Adobe Dimension version 3.4 (and earlier) is affected by an Uncontrolled Search Path Element element. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
0
Attacker Value
Unknown
CVE-2021-22000
Disclosure Date: July 13, 2021 (last updated February 23, 2025)
VMware Thinapp version 5.x prior to 5.2.10 contain a DLL hijacking vulnerability due to insecure loading of DLLs. A malicious actor with non-administrative privileges may exploit this vulnerability to elevate privileges to administrator level on the Windows operating system having VMware ThinApp installed on it.
0
Attacker Value
Unknown
CVE-2021-35957
Disclosure Date: July 13, 2021 (last updated February 23, 2025)
Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\system32) with malicious ones.
0
Attacker Value
Unknown
CVE-2021-36376
Disclosure Date: July 13, 2021 (last updated February 23, 2025)
dandavison delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory.
0
Attacker Value
Unknown
CVE-2021-3613
Disclosure Date: July 02, 2021 (last updated February 22, 2025)
OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe).
0
Attacker Value
Unknown
CVE-2021-3606
Disclosure Date: July 02, 2021 (last updated February 22, 2025)
OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe).
0
Attacker Value
Unknown
CVE-2021-29949
Disclosure Date: June 24, 2021 (last updated February 22, 2025)
When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.
0