Vulnerabilities > Untrusted Search Path
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-11-19 | CVE-2018-18519 | Untrusted Search Path vulnerability in Bestxsoftware Best Free Keylogger 5.2.9 BestXsoftware Best Free Keylogger before 6.0.0 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group. | 7.8 |
2018-11-15 | CVE-2018-0692 | Untrusted Search Path vulnerability in Baidu Spark Browser Untrusted search path vulnerability in Baidu Browser Version 43.23.1000.500 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.8 |
2018-11-09 | CVE-2018-1802 | Untrusted Search Path vulnerability in IBM DB2 IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 binaries load shared libraries from an untrusted path potentially giving low privilege user full access to the DB2 instance account by loading a malicious shared library. | 7.8 |
2018-10-17 | CVE-2018-15974 | Untrusted Search Path vulnerability in Adobe Framemaker Adobe Framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. | 7.8 |
2018-10-15 | CVE-2018-17980 | Untrusted Search Path vulnerability in Nomachine NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is executed. | 7.8 |
2018-10-11 | CVE-2018-12449 | Untrusted Search Path vulnerability in Navercorp Whale 0.4.3.0 The Whale browser installer 0.4.3.0 and earlier versions allows DLL hijacking. | 7.8 |
2018-09-24 | CVE-2018-6700 | Untrusted Search Path vulnerability in Mcafee True KEY DLL Search Order Hijacking vulnerability in Microsoft Windows Client in McAfee True Key (TK) before 5.1.165 allows local users to execute arbitrary code via specially crafted malware. | 7.8 |
2018-09-07 | CVE-2018-0649 | Untrusted Search Path vulnerability in Eset products Untrusted search path vulnerability in the installers of multiple Canon IT Solutions Inc. | 7.8 |
2018-09-07 | CVE-2018-0648 | Untrusted Search Path vulnerability in Chatwork 2.3.0 Untrusted search path vulnerability in installer of ChatWork Desktop App for Windows 2.3.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.8 |
2018-09-07 | CVE-2018-0624 | Untrusted Search Path vulnerability in Yayoi-Kk products Untrusted search path vulnerability in Multiple Yayoi 17 Series products (Yayoi Kaikei 17 Series Ver.23.1.1 and earlier, Yayoi Aoiro Shinkoku 17 Ver.23.1.1 and earlier, Yayoi Kyuuyo 17 Ver.20.1.4 and earlier, Yayoi Kyuuyo Keisan 17 Ver.20.1.4 and earlier, Yayoi Hanbai 17 Series Ver.20.0.2 and earlier, and Yayoi Kokyaku Kanri 17 Ver.11.0.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.8 |