Vulnerabilities > Uncontrolled Search Path Element

DATE CVE VULNERABILITY TITLE RISK
2024-08-07 CVE-2024-7061 Uncontrolled Search Path Element vulnerability in Okta Verify
Okta Verify for Windows is vulnerable to privilege escalation through DLL hijacking.
local
low complexity
okta CWE-427
7.8
2024-08-07 CVE-2024-5290 Uncontrolled Search Path Element vulnerability in W1.Fi WPA Supplicant
An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
local
low complexity
w1-fi CWE-427
7.8
2024-07-31 CVE-2024-7326 Uncontrolled Search Path Element vulnerability in Itopvpn Dualsafe Password Manager 1.4.0.3
A vulnerability classified as critical has been found in IObit DualSafe Password Manager 1.4.0.3.
local
low complexity
itopvpn CWE-427
7.8
2024-07-31 CVE-2024-7325 Uncontrolled Search Path Element vulnerability in Iobit Driver Booster 11.0.0.0
A vulnerability was found in IObit Driver Booster 11.0.0.0.
local
low complexity
iobit CWE-427
7.8
2024-07-31 CVE-2024-32857 Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1
Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability.
local
low complexity
dell CWE-427
7.8
2024-07-31 CVE-2024-37127 Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1
Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability.
local
low complexity
dell CWE-427
7.8
2024-07-31 CVE-2024-37142 Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1
Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability.
local
low complexity
dell CWE-427
7.8
2024-07-29 CVE-2024-41817 Uncontrolled Search Path Element vulnerability in Imagemagick
ImageMagick is a free and open-source software suite, used for editing and manipulating digital images.
local
low complexity
imagemagick CWE-427
7.8
2024-06-06 CVE-2024-5509 Uncontrolled Search Path Element vulnerability in Luxion Keyshot, Keyshot Network Rendering and Keyshot Viewer
Luxion KeyShot BIP File Parsing Uncontrolled Search Path Element Remote Code Execution Vulnerability.
local
low complexity
luxion CWE-427
7.8
2024-05-16 CVE-2024-21777 Uncontrolled Search Path Element vulnerability in Intel Quartus Prime
Uncontrolled search path in some Intel(R) Quartus(R) Prime Pro Edition Design software before version 23.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
local
low complexity
intel CWE-427
7.3