Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2017-07-17 CVE-2017-2269 Untrusted Search Path vulnerability in Resume-Next Filecapsule Deluxe Portable 1.0.4.1/1.0.5.1/2.0.9
Untrusted search path vulnerability in FileCapsule Deluxe Portable Ver.2.0.9 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
resume-next CWE-426
7.8
2017-07-17 CVE-2017-2268 Untrusted Search Path vulnerability in Resume-Next Filecapsule Deluxe Portable 1.0.4.1/1.0.5.1
Untrusted search path vulnerability in Encrypted files in self-decryption format created by FileCapsule Deluxe Portable Ver.1.0.5.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
resume-next CWE-426
7.8
2017-07-17 CVE-2017-2267 Untrusted Search Path vulnerability in Resume-Next Filecapsule Deluxe Portable 1.0.4.1/1.0.5.1
Untrusted search path vulnerability in FileCapsule Deluxe Portable Ver.1.0.5.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
resume-next CWE-426
7.8
2017-07-17 CVE-2017-2266 Untrusted Search Path vulnerability in Resume-Next Filecapsule Deluxe Portable 1.0.4.1
Untrusted search path vulnerability in Encrypted files in self-decryption format created by FileCapsule Deluxe Portable Ver.1.0.4.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
resume-next CWE-426
7.8
2017-07-17 CVE-2017-2265 Untrusted Search Path vulnerability in Resume-Next Filecapsule Deluxe Portable 1.0.4.1
Untrusted search path vulnerability in FileCapsule Deluxe Portable Ver.1.0.4.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
resume-next CWE-426
7.8
2017-07-17 CVE-2017-2253 Untrusted Search Path vulnerability in Yahoo Toolbar 8.0.0.6
Untrusted search path vulnerability in Installer of Yahoo! Toolbar (for Internet explorer) v8.0.0.6 and earlier, with its timestamp prior to June 13, 2017, 18:18:55 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
yahoo CWE-426
7.8
2017-07-17 CVE-2017-2252 Untrusted Search Path vulnerability in Sourcenext File Compact 5.09/6.01/7.01
Untrusted search path vulnerability in self-extracting archive files created by File Compact Ver.5 version 5.10 and earlier, Ver.6 version 6.02 and earlier, Ver.7 version 7.02 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
sourcenext CWE-426
7.8
2017-07-17 CVE-2017-2249 Untrusted Search Path vulnerability in Chitora Lhaz+ 3.4.0
Untrusted search path vulnerability in Self-extracting archive files created by Lhaz+ version 3.4.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
chitora CWE-426
7.8
2017-07-17 CVE-2017-2248 Untrusted Search Path vulnerability in Chitora Lhaz+ 3.4.0
Untrusted search path vulnerability in Installer of Lhaz+ version 3.4.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
chitora CWE-426
7.8
2017-07-17 CVE-2017-2247 Untrusted Search Path vulnerability in Chitora Lhaz 2.4.0
Untrusted search path vulnerability in Self-extracting archive files created by Lhaz version 2.4.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
chitora CWE-426
7.8