Show filters
229 Total Results
Displaying 31-40 of 229
Sort by:
Attacker Value
Unknown
CVE-2021-20793
Disclosure Date: August 26, 2021 (last updated February 23, 2025)
Untrusted search path vulnerability in the installer of Sony Audio USB Driver V1.10 and prior and the installer of HAP Music Transfer Ver.1.3.0 and prior allows an attacker to gain privileges and execute arbitrary code via a Trojan horse DLL in an unspecified directory.
0
Attacker Value
Unknown
CVE-2021-38469
Disclosure Date: August 19, 2021 (last updated February 23, 2025)
Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
0
Attacker Value
Unknown
CVE-2021-37617
Disclosure Date: August 18, 2021 (last updated February 23, 2025)
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. The Nextcloud Desktop Client invokes its uninstaller script when being installed to make sure there are no remnants of previous installations. In versions 3.0.3 through 3.2.4, the Client searches the `Uninstall.exe` file in a folder that can be written by regular users. This could lead to a case where a malicious user creates a malicious `Uninstall.exe`, which would be executed with administrative privileges on the Nextcloud Desktop Client installation. This issue is fixed in Nextcloud Desktop Client version 3.3.0. As a workaround, do not allow untrusted users to create content in the `C:\` system folder and verify that there is no malicious `C:\Uninstall.exe` file on the system.
0
Attacker Value
Unknown
CVE-2021-3633
Disclosure Date: August 17, 2021 (last updated February 23, 2025)
A DLL preloading vulnerability was reported in Lenovo Driver Management prior to version 2.9.0719.1104 that could allow privilege escalation.
0
Attacker Value
Unknown
CVE-2021-38086
Disclosure Date: August 12, 2021 (last updated February 23, 2025)
Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking.
0
Attacker Value
Unknown
CVE-2021-36770
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
0
Attacker Value
Unknown
CVE-2021-38571
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows DLL hijacking, aka CNVD-C-2021-68000 and CNVD-C-2021-68502.
0
Attacker Value
Unknown
CVE-2021-0160
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
Uncontrolled search path in some Intel(R) NUC Pro Chassis Element AverMedia Capture Card drivers before version 3.0.64.143 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2021-32580
Disclosure Date: August 05, 2021 (last updated February 23, 2025)
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.
0
Attacker Value
Unknown
CVE-2021-1593
Disclosure Date: August 04, 2021 (last updated February 23, 2025)
A vulnerability in Cisco Packet Tracer for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path on the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow an attacker with normal user privileges to execute arbitrary code on the affected system with the privileges of another user’s account.
0