Vulnerabilities > Uncontrolled Search Path Element

DATE CVE VULNERABILITY TITLE RISK
2025-05-26 CVE-2025-5180 Uncontrolled Search Path Element vulnerability in Wondershare Filmora 14.5.16
A vulnerability, which was classified as critical, has been found in Wondershare Filmora 14.5.16.
local
low complexity
wondershare CWE-427
7.3
2025-05-13 CVE-2025-43553 Uncontrolled Search Path Element vulnerability in Adobe Substance 3D Modeler
Substance3D - Modeler versions 1.21.0 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user.
local
low complexity
adobe CWE-427
7.8
2025-05-13 CVE-2023-31358 Uncontrolled Search Path Element vulnerability in AMD Aim-T Manageability API 4.5.0.1586/5.0.0.1823
A DLL hijacking vulnerability in the AMD Manageability API could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
local
low complexity
amd CWE-427
7.8
2025-04-12 CVE-2025-29803 Uncontrolled search path element in Visual Studio Tools for Applications and SQL Server Management Studio allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
2025-04-08 CVE-2025-29802 Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
2025-03-11 CVE-2025-24998 Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
2025-03-11 CVE-2025-25003 Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
2025-03-11 CVE-2025-26631 Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally.
local
low complexity
CWE-427
7.3
2025-03-04 CVE-2020-23438 Uncontrolled Search Path Element vulnerability in Wondershare Filmora 9.2.11
Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading to privilege escalation.
local
low complexity
wondershare CWE-427
7.8
2025-02-24 CVE-2024-55898 IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to an unqualified library call.
network
high complexity
CWE-427
8.5