Show filters
343 Total Results
Displaying 91-100 of 343
Sort by:
Attacker Value
Unknown
CVE-2022-1098
Disclosure Date: March 29, 2022 (last updated February 23, 2025)
Delta Electronics DIAEnergie (all versions prior to 1.8.02.004) are vulnerable to a DLL hijacking condition. When combined with the Incorrect Default Permissions vulnerability of 4.2.2 above, this makes it possible for an attacker to escalate privileges
0
Attacker Value
Unknown
CVE-2022-24426
Disclosure Date: March 25, 2022 (last updated February 23, 2025)
Dell Command | Update, Dell Update, and Alienware Update version 4.4.0 contains a Local Privilege Escalation Vulnerability in the Advanced Driver Restore component. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation.
0
Attacker Value
Unknown
CVE-2021-44226
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
0
Attacker Value
Unknown
CVE-2020-25182
Disclosure Date: March 18, 2022 (last updated February 23, 2025)
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.
0
Attacker Value
Unknown
CVE-2022-26511
Disclosure Date: March 17, 2022 (last updated February 23, 2025)
WPS Presentation 11.8.0.5745 insecurely load d3dx9_41.dll when opening .pps files('current directory type' DLL loading).
0
Attacker Value
Unknown
CVE-2022-26081
Disclosure Date: March 17, 2022 (last updated February 23, 2025)
The installer of WPS Office Version 10.8.0.5745 insecurely load shcore.dll, allowing an attacker to execute arbitrary code with the privilege of the user invoking the installer.
0
Attacker Value
Unknown
CVE-2022-25969
Disclosure Date: March 17, 2022 (last updated February 23, 2025)
The installer of WPS Office Version 10.8.0.6186 insecurely load VERSION.DLL (or some other DLLs), allowing an attacker to execute arbitrary code with the privilege of the user invoking the installer.
0
Attacker Value
Unknown
CVE-2022-20001
Disclosure Date: March 14, 2022 (last updated February 23, 2025)
fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs `git` commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the `fish_git_prompt` function from the prompt.
0
Attacker Value
Unknown
CVE-2022-23401
Disclosure Date: March 11, 2022 (last updated February 23, 2025)
The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
0
Attacker Value
Unknown
CVE-2022-26337
Disclosure Date: March 08, 2022 (last updated February 23, 2025)
Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an attacker to use a specially crafted file to exploit the vulnerability and escalate local privileges on the affected machine.
0