Vulnerabilities > Untrusted Search Path

DATE CVE VULNERABILITY TITLE RISK
2017-06-09 CVE-2017-2193 Untrusted Search Path vulnerability in Tera Term Project Tera Term
Untrusted search path vulnerability in the installer of Tera Term 4.94 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
tera-term-project CWE-426
7.8
2017-06-09 CVE-2017-2192 Untrusted Search Path vulnerability in Sharp Rw-5100 1.1.0.0/1.2.0.0
Untrusted search path vulnerability in RW-5100 tool to verify execution environment for Windows 7 version 1.1.0.0 and RW-5100 tool to verify execution environment for Windows 8.1 version 1.2.0.0 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
sharp CWE-426
7.8
2017-06-09 CVE-2017-2191 Untrusted Search Path vulnerability in Sharp products
Untrusted search path vulnerability in RW-5100 driver installer for Windows 7 version 1.0.0.9 and RW-5100 driver installer for Windows 8.1 version 1.0.1.0 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
sharp CWE-426
7.8
2017-06-09 CVE-2017-2190 Untrusted Search Path vulnerability in Sharp Rw-4040 1.2.0.0
Untrusted search path vulnerability in RW-4040 tool to verify execution environment for Windows 7 version 1.2.0.0 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
sharp CWE-426
7.8
2017-06-09 CVE-2017-2189 Untrusted Search Path vulnerability in Sharp Rw-4040 2.27
Untrusted search path vulnerability in RW-4040 driver installer for Windows 7 version 2.27 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
sharp CWE-426
7.8
2017-06-09 CVE-2017-2178 Untrusted Search Path vulnerability in Atla Electronic Tendering and BID Opening System
Untrusted search path vulnerability in Installer of electronic tendering and bid opening system available prior to May 25, 2017 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
network
low complexity
atla CWE-426
8.8
2017-06-09 CVE-2017-2177 Untrusted Search Path vulnerability in Shogyo Touki Denshi 1.7
Untrusted search path vulnerability in Installer of Shogyo Touki Denshi Ninsho Software Ver 1.7 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
network
low complexity
shogyo CWE-426
8.8
2017-06-09 CVE-2017-2176 Untrusted Search Path vulnerability in Jasdf Screensavers
Untrusted search path vulnerability in screensaver installers (jasdf_01.exe, jasdf_02.exe, jasdf_03.exe, jasdf_04.exe, jasdf_05.exe, scramble_setup.exe, clock_01_setup.exe, clock_02_setup.exe) available prior to May 25, 2017 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
jasdf CWE-426
7.8
2017-06-09 CVE-2016-7838 Untrusted Search Path vulnerability in Winsparkle
Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory.
local
low complexity
winsparkle CWE-426
7.8
2017-06-09 CVE-2016-4902 Untrusted Search Path vulnerability in Jpki products
Untrusted search path vulnerability in The Public Certification Service for Individuals "The JPKI user's software (for Windows 7 and later)" Ver3.0.1 and earlier, The Public Certification Service for Individuals "The JPKI user's software (for Windows Vista)" Ver3.0.1 and earlier and The Public Certification Service for Individuals "The JPKI user's software" Ver2.6 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
jpki CWE-426
7.8