Show filters
325 Total Results
Displaying 81-90 of 325
Sort by:
Attacker Value
Unknown

CVE-2022-23401

Disclosure Date: March 11, 2022 (last updated February 23, 2025)
The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
Attacker Value
Unknown

CVE-2022-26337

Disclosure Date: March 08, 2022 (last updated February 23, 2025)
Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an attacker to use a specially crafted file to exploit the vulnerability and escalate local privileges on the affected machine.
Attacker Value
Unknown

CVE-2022-26319

Disclosure Date: March 08, 2022 (last updated February 23, 2025)
An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2022-22943

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
VMware Tools for Windows (11.x.y and 10.x.y prior to 12.0.0) contains an uncontrolled search path vulnerability. A malicious actor with local administrative privileges in the Windows guest OS, where VMware Tools is installed, may be able to execute code with system privileges in the Windows guest OS due to an uncontrolled search path element.
Attacker Value
Unknown

CVE-2022-23410

Disclosure Date: February 14, 2022 (last updated February 23, 2025)
AXIS IP Utility before 4.18.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder.
Attacker Value
Unknown

CVE-2022-23853

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.
Attacker Value
Unknown

CVE-2022-24955

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have an Uncontrolled Search Path Element for DLL files.
Attacker Value
Unknown

CVE-2022-0483

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis VSS Doctor (Windows) before build 53
Attacker Value
Unknown

CVE-2021-33101

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Uncontrolled search path in the Intel(R) GPA software before version 21.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2021-0169

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.