Show filters
311 Total Results
Displaying 71-80 of 311
Sort by:
Attacker Value
Unknown

CVE-2022-23410

Disclosure Date: February 14, 2022 (last updated February 23, 2025)
AXIS IP Utility before 4.18.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder.
Attacker Value
Unknown

CVE-2022-23853

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.
Attacker Value
Unknown

CVE-2022-24955

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have an Uncontrolled Search Path Element for DLL files.
Attacker Value
Unknown

CVE-2022-0483

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis VSS Doctor (Windows) before build 53
Attacker Value
Unknown

CVE-2021-33101

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Uncontrolled search path in the Intel(R) GPA software before version 21.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2021-0169

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2022-22528

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries.
Attacker Value
Unknown

CVE-2022-23202

Disclosure Date: February 08, 2022 (last updated February 23, 2025)
Adobe Creative Cloud Desktop version 2.7.0.13 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must download a malicious DLL file. The attacker has to deliver the DLL on the same folder as the installer which makes it as a high complexity attack vector.
Attacker Value
Unknown

CVE-2021-44206

Disclosure Date: February 02, 2022 (last updated February 23, 2025)
Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
Attacker Value
Unknown

CVE-2021-44205

Disclosure Date: February 02, 2022 (last updated February 23, 2025)
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287