Vulnerabilities > Untrusted Search Path

DATE CVE VULNERABILITY TITLE RISK
2018-11-19 CVE-2018-18519 Untrusted Search Path vulnerability in Bestxsoftware Best Free Keylogger 5.2.9
BestXsoftware Best Free Keylogger before 6.0.0 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group.
local
low complexity
bestxsoftware CWE-426
7.8
2018-11-15 CVE-2018-0692 Untrusted Search Path vulnerability in Baidu Spark Browser
Untrusted search path vulnerability in Baidu Browser Version 43.23.1000.500 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
baidu CWE-426
7.8
2018-11-09 CVE-2018-1802 Untrusted Search Path vulnerability in IBM DB2
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 binaries load shared libraries from an untrusted path potentially giving low privilege user full access to the DB2 instance account by loading a malicious shared library.
local
low complexity
ibm CWE-426
7.8
2018-10-17 CVE-2018-15974 Untrusted Search Path vulnerability in Adobe Framemaker
Adobe Framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability.
local
low complexity
adobe CWE-426
7.8
2018-10-15 CVE-2018-17980 Untrusted Search Path vulnerability in Nomachine
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is executed.
local
low complexity
nomachine CWE-426
7.8
2018-10-11 CVE-2018-12449 Untrusted Search Path vulnerability in Navercorp Whale 0.4.3.0
The Whale browser installer 0.4.3.0 and earlier versions allows DLL hijacking.
local
low complexity
navercorp CWE-426
7.8
2018-09-24 CVE-2018-6700 Untrusted Search Path vulnerability in Mcafee True KEY
DLL Search Order Hijacking vulnerability in Microsoft Windows Client in McAfee True Key (TK) before 5.1.165 allows local users to execute arbitrary code via specially crafted malware.
local
low complexity
mcafee CWE-426
7.8
2018-09-07 CVE-2018-0649 Untrusted Search Path vulnerability in Eset products
Untrusted search path vulnerability in the installers of multiple Canon IT Solutions Inc.
local
low complexity
eset CWE-426
7.8
2018-09-07 CVE-2018-0648 Untrusted Search Path vulnerability in Chatwork 2.3.0
Untrusted search path vulnerability in installer of ChatWork Desktop App for Windows 2.3.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
chatwork CWE-426
7.8
2018-09-07 CVE-2018-0624 Untrusted Search Path vulnerability in Yayoi-Kk products
Untrusted search path vulnerability in Multiple Yayoi 17 Series products (Yayoi Kaikei 17 Series Ver.23.1.1 and earlier, Yayoi Aoiro Shinkoku 17 Ver.23.1.1 and earlier, Yayoi Kyuuyo 17 Ver.20.1.4 and earlier, Yayoi Kyuuyo Keisan 17 Ver.20.1.4 and earlier, Yayoi Hanbai 17 Series Ver.20.0.2 and earlier, and Yayoi Kokyaku Kanri 17 Ver.11.0.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
yayoi-kk CWE-426
7.8