VUMETRIC
CYBER PORTAL
Dashboard
Security News
Latest Vulnerabilities
Browse Vulnerabilities
by Vendors
by Products
by Categories
Weekly Reports
Vulnerabilities
> Uncontrolled Search Path Element
Exclude new CVEs:
DATE
CVE
VULNERABILITY TITLE
RISK
2025-04-12
CVE-2025-29803
Uncontrolled search path element in Visual Studio Tools for Applications and SQL Server Management Studio allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
7.3
2025-04-08
CVE-2025-29802
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
7.3
2025-03-11
CVE-2025-24998
Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
7.3
2025-03-11
CVE-2025-25003
Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
7.3
2025-03-11
CVE-2025-26631
Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
7.3
2025-03-04
CVE-2020-23438
Uncontrolled Search Path Element vulnerability in Wondershare Filmora 9.2.11
Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading to privilege escalation.
local
low complexity
wondershare
CWE-427
7.8
7.8
2025-02-24
CVE-2024-55898
IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to an unqualified library call.
network
high complexity
CWE-427
8.5
8.5
2025-02-11
CVE-2025-24039
Visual Studio Code Elevation of Privilege Vulnerability
local
low complexity
CWE-427
7.3
7.3
2025-02-11
CVE-2024-53977
A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1).
local
high complexity
CWE-427
6.7
6.7
2025-01-24
CVE-2024-41739
IBM Cognos Dashboards 4.0.7 and 5.0.0 on Cloud Pak for Data could allow a remote attacker to perform unauthorized actions due to dependency confusion.
network
low complexity
CWE-427
8.8
8.8
«
1
(current)
2
3
4
5
...
62
63
»
Next