CWE:
 

Topic
Date
Author
Med.
Microsoft Windows UAC Privilege Escalation
02.05.2021
Stefan Kanthak
Med.
Microsoft SAFER Bypass
30.04.2021
Stefan Kanthak


CVEMAP Search Results

CVE
Details
Description
2024-10-09
Waiting for details
CVE-2024-47422

Updating...
 

 
Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious path into the search directories, which the application could unknowingly execute. This could allow the attacker to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction.

 
2024-10-08
Waiting for details
CVE-2024-43576

Updating...
 

 
Microsoft Office Remote Code Execution Vulnerability

 
Waiting for details
CVE-2024-43616

Updating...
 

 
Microsoft Office Remote Code Execution Vulnerability

 
2024-09-10
Waiting for details
CVE-2024-45281

Updating...
 

 
SAP BusinessObjects Business Intelligence Platform allows a high privilege user to run client desktop applications even if some of the DLLs are not digitally signed or if the signature is broken. The attacker needs to have local access to the vulnerable system to perform DLL related tasks. This could result in a high impact on confidentiality and integrity of the application.

 
2024-08-21
Waiting for details
CVE-2024-38305

Updating...
 

 
Dell SupportAssist for Home PCs Installer exe version 4.0.3 contains a privilege escalation vulnerability in the installer. A local low-privileged authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary executables on the operating system with elevated privileges.

 
2024-08-14
Waiting for details
CVE-2024-41865

Updating...
 

 
Dimension versions 3.4.11 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur if the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction.

 
2024-07-09
Waiting for details
CVE-2024-34123

Updating...
 

 
Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur when the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction, attack complexity is high.

 
2024-05-14
Waiting for details
CVE-2024-28133

Updating...
 

 
A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root privileges. 

 
2024-03-18
Waiting for details
CVE-2024-20754

Updating...
 

 
Lightroom Desktop versions 7.1.2 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

 
2024-02-07
Waiting for details
CVE-2024-24810

Updating...
 

 
WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. The .be TEMP folder is vulnerable to DLL redirection attacks that allow the attacker to escalate privileges. This impacts any installer built with the WiX installer framework. This issue has been patched in version 4.0.4.

 

 


Copyright 2024, cxsecurity.com

 

Back to Top