Vulnerabilities > Untrusted Search Path

DATE CVE VULNERABILITY TITLE RISK
2018-09-07 CVE-2018-0623 Untrusted Search Path vulnerability in Yayoi-Kk products
Untrusted search path vulnerability in Multiple Yayoi 17 Series products (Yayoi Kaikei 17 Series Ver.23.1.1 and earlier, Yayoi Aoiro Shinkoku 17 Ver.23.1.1 and earlier, Yayoi Kyuuyo 17 Ver.20.1.4 and earlier, Yayoi Kyuuyo Keisan 17 Ver.20.1.4 and earlier, Yayoi Hanbai 17 Series Ver.
local
low complexity
yayoi-kk CWE-426
7.8
2018-09-04 CVE-2018-10904 Untrusted Search Path vulnerability in multiple products
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator.
network
low complexity
gluster redhat debian opensuse CWE-426
8.8
2018-09-04 CVE-2018-0656 Untrusted Search Path vulnerability in Sony Digital Paper APP 1.4.0.16050
Untrusted search path vulnerability in The installer of Digital Paper App version 1.4.0.16050 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
sony CWE-426
7.8
2018-08-29 CVE-2018-5003 Untrusted Search Path vulnerability in Adobe Creative Cloud
Adobe Creative Cloud Desktop Application before 4.5.5.342 (installer) has an insecure library loading (dll hijacking) vulnerability.
local
low complexity
adobe CWE-426
7.8
2018-07-26 CVE-2018-0621 Untrusted Search Path vulnerability in Logitech Connection Utility Software 2.00.3/2.20.28/2.30.6
Untrusted search path vulnerability in LOGICOOL CONNECTION UTILITY SOFTWARE versions before 2.30.9 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
logitech CWE-426
7.8
2018-07-26 CVE-2018-0620 Untrusted Search Path vulnerability in Logitech Game Software
Untrusted search path vulnerability in LOGICOOL Game Software versions before 8.87.116 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
logitech CWE-426
7.8
2018-07-26 CVE-2018-0619 Untrusted Search Path vulnerability in Glarysoft Glary Utilities 5.99
Untrusted search path vulnerability in the installer of Glarysoft Glary Utilities (Glary Utilities 5.99 and earlier and Glary Utilities Pro 5.99 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
glarysoft CWE-426
7.8
2018-07-13 CVE-2018-10875 Untrusted Search Path vulnerability in multiple products
A flaw was found in ansible.
local
low complexity
redhat debian suse canonical CWE-426
7.8
2018-07-10 CVE-2018-1487 Untrusted Search Path vulnerability in IBM DB2
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5 and 11.1 binaries load shared libraries from an untrusted path potentially giving low privilege users full access to the DB2 instance account by loading a malicious shared library.
local
low complexity
ibm CWE-426
7.8
2018-07-10 CVE-2018-1458 Untrusted Search Path vulnerability in IBM DB2
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10,1, 10.5 and 11.1 could allow a local user to execute arbitrary code and conduct DLL hijacking attacks.
local
low complexity
ibm CWE-426
7.8