Vulnerabilities > Uncontrolled Search Path Element
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-08-07 | CVE-2024-7061 | Uncontrolled Search Path Element vulnerability in Okta Verify Okta Verify for Windows is vulnerable to privilege escalation through DLL hijacking. | 7.8 |
2024-08-07 | CVE-2024-5290 | Uncontrolled Search Path Element vulnerability in W1.Fi WPA Supplicant An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist. | 7.8 |
2024-07-31 | CVE-2024-7326 | Uncontrolled Search Path Element vulnerability in Itopvpn Dualsafe Password Manager 1.4.0.3 A vulnerability classified as critical has been found in IObit DualSafe Password Manager 1.4.0.3. | 7.8 |
2024-07-31 | CVE-2024-7325 | Uncontrolled Search Path Element vulnerability in Iobit Driver Booster 11.0.0.0 A vulnerability was found in IObit Driver Booster 11.0.0.0. | 7.8 |
2024-07-31 | CVE-2024-32857 | Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1 Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. | 7.8 |
2024-07-31 | CVE-2024-37127 | Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1 Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. | 7.8 |
2024-07-31 | CVE-2024-37142 | Uncontrolled Search Path Element vulnerability in Dell Peripheral Manager 1.3.1 Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. | 7.8 |
2024-07-29 | CVE-2024-41817 | Uncontrolled Search Path Element vulnerability in Imagemagick ImageMagick is a free and open-source software suite, used for editing and manipulating digital images. | 7.8 |
2024-06-06 | CVE-2024-5509 | Uncontrolled Search Path Element vulnerability in Luxion Keyshot, Keyshot Network Rendering and Keyshot Viewer Luxion KeyShot BIP File Parsing Uncontrolled Search Path Element Remote Code Execution Vulnerability. | 7.8 |
2024-05-16 | CVE-2024-21777 | Uncontrolled Search Path Element vulnerability in Intel Quartus Prime Uncontrolled search path in some Intel(R) Quartus(R) Prime Pro Edition Design software before version 23.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | 7.3 |