Vulnerabilities > Uncontrolled Search Path Element
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-01-14 | CVE-2025-21127 | Uncontrolled Search Path Element vulnerability in Adobe Photoshop Photoshop Desktop versions 25.12, 26.1 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could lead to arbitrary code execution. | 7.8 |
2025-01-02 | CVE-2024-55540 | Uncontrolled Search Path Element vulnerability in Acronis Cyber Protect 15/16 Local privilege escalation due to DLL hijacking vulnerability. | 7.8 |
2025-01-02 | CVE-2024-55543 | Uncontrolled Search Path Element vulnerability in Acronis Cyber Protect 15/16 Local privilege escalation due to DLL hijacking vulnerability. | 7.8 |
2024-11-12 | CVE-2024-47942 | Uncontrolled Search Path Element vulnerability in Siemens Solid Edge Se2024 A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 9). | 7.3 |
2024-10-22 | CVE-2024-48605 | Uncontrolled Search Path Element vulnerability in Helakuru 1.1 An issue in Helakuru Desktop Application v1.1 allows a local attacker to execute arbitrary code via the lack of proper validation of the wow64log.dll file. | 7.8 |
2024-10-17 | CVE-2024-10093 | Uncontrolled Search Path Element vulnerability in Vso-Software Convertxtodvd 7.0.0.83 A vulnerability, which was classified as critical, was found in VSO ConvertXtoDvd 7.0.0.83. | 7.8 |
2024-10-17 | CVE-2024-49390 | Uncontrolled Search Path Element vulnerability in Acronis Cyber Files Local privilege escalation due to DLL hijacking vulnerability. | 7.3 |
2024-10-17 | CVE-2024-49391 | Uncontrolled Search Path Element vulnerability in Acronis Cyber Files Local privilege escalation due to DLL hijacking vulnerability. | 7.3 |
2024-10-16 | CVE-2024-45710 | Uncontrolled Search Path Element vulnerability in Solarwinds Platform SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. | 7.8 |
2024-10-14 | CVE-2024-30117 | Uncontrolled Search Path Element vulnerability in Hcltech Bigfix Platform A dynamic search for a prerequisite library could allow the possibility for an attacker to replace the correct file under some circumstances. | 5.3 |