Vulnerabilities > Untrusted Search Path
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-08-11 | CVE-2022-43456 | Untrusted Search Path vulnerability in Intel Rapid Storage Technology Uncontrolled search path in some Intel(R) RST software before versions 16.8.5.1014.5, 17.11.3.1010.2, 18.7.6.1011.2 and 19.5.2.1049.5 may allow an authenticated user to potentially enable escalation of privilege via local access. | 7.8 |
2023-08-08 | CVE-2023-39212 | Untrusted Search Path vulnerability in Zoom Rooms Untrusted search path in Zoom Rooms for Windows before version 5.15.5 may allow an authenticated user to enable a denial of service via local access. | 5.5 |
2023-08-08 | CVE-2023-36540 | Untrusted Search Path vulnerability in Zoom Untrusted search path in the installer for Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access. | 7.8 |
2023-07-11 | CVE-2023-36536 | Untrusted Search Path vulnerability in Zoom Rooms Untrusted search path in the installer for Zoom Rooms for Windows before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access. | 7.8 |
2023-06-26 | CVE-2023-34144 | Untrusted Search Path vulnerability in Trendmicro Apex ONE An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34145. | 7.8 |
2023-06-26 | CVE-2023-34145 | Untrusted Search Path vulnerability in Trendmicro Apex ONE An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34144. | 7.8 |
2023-04-18 | CVE-2023-28143 | Untrusted Search Path vulnerability in Qualys Cloud Agent 2.5.175 Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. | 7.0 |
2023-04-04 | CVE-2023-27759 | Untrusted Search Path vulnerability in Wondershare Edrawmind 10.0.6 An issue found in Wondershare Technology Co, Ltd Edrawmind v.10.0.6 allows a remote attacker to executea arbitrary commands via the WindowsCodescs.dll file. | 7.8 |
2023-04-04 | CVE-2023-27760 | Untrusted Search Path vulnerability in Wondershare Filmora 12.0.9 An issue found in Wondershare Technology Co, Ltd Filmora v.12.0.9 allows a remote attacker to execute arbitrary commands via the filmora_setup_full846.exe. | 7.8 |
2023-04-04 | CVE-2023-27761 | Untrusted Search Path vulnerability in Wondershare Uniconverter 14.0.0 An issue found in Wondershare Technology Co., Ltd UniConverter v.14.0.0 allows a remote attacker to execute arbitrary commands via the uniconverter14_64bit_setup_full14204.exe file. | 7.8 |