Vulnerabilities > Untrusted Search Path

DATE CVE VULNERABILITY TITLE RISK
2023-08-11 CVE-2022-43456 Untrusted Search Path vulnerability in Intel Rapid Storage Technology
Uncontrolled search path in some Intel(R) RST software before versions 16.8.5.1014.5, 17.11.3.1010.2, 18.7.6.1011.2 and 19.5.2.1049.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
local
low complexity
intel CWE-426
7.8
2023-08-08 CVE-2023-39212 Untrusted Search Path vulnerability in Zoom Rooms
Untrusted search path in Zoom Rooms for Windows before version 5.15.5 may allow an authenticated user to enable a denial of service via local access.
local
low complexity
zoom CWE-426
5.5
2023-08-08 CVE-2023-36540 Untrusted Search Path vulnerability in Zoom
Untrusted search path in the installer for Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.
local
low complexity
zoom CWE-426
7.8
2023-07-11 CVE-2023-36536 Untrusted Search Path vulnerability in Zoom Rooms
Untrusted search path in the installer for Zoom Rooms for Windows before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access.
local
low complexity
zoom CWE-426
7.8
2023-06-26 CVE-2023-34144 Untrusted Search Path vulnerability in Trendmicro Apex ONE
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34145.
local
low complexity
trendmicro CWE-426
7.8
2023-06-26 CVE-2023-34145 Untrusted Search Path vulnerability in Trendmicro Apex ONE
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34144.
local
low complexity
trendmicro CWE-426
7.8
2023-04-18 CVE-2023-28143 Untrusted Search Path vulnerability in Qualys Cloud Agent 2.5.175
Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host.
local
high complexity
qualys CWE-426
7.0
2023-04-04 CVE-2023-27759 Untrusted Search Path vulnerability in Wondershare Edrawmind 10.0.6
An issue found in Wondershare Technology Co, Ltd Edrawmind v.10.0.6 allows a remote attacker to executea arbitrary commands via the WindowsCodescs.dll file.
local
low complexity
wondershare CWE-426
7.8
2023-04-04 CVE-2023-27760 Untrusted Search Path vulnerability in Wondershare Filmora 12.0.9
An issue found in Wondershare Technology Co, Ltd Filmora v.12.0.9 allows a remote attacker to execute arbitrary commands via the filmora_setup_full846.exe.
local
low complexity
wondershare CWE-426
7.8
2023-04-04 CVE-2023-27761 Untrusted Search Path vulnerability in Wondershare Uniconverter 14.0.0
An issue found in Wondershare Technology Co., Ltd UniConverter v.14.0.0 allows a remote attacker to execute arbitrary commands via the uniconverter14_64bit_setup_full14204.exe file.
local
low complexity
wondershare CWE-426
7.8