Vulnerabilities > Wondershare
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-10-02 | CVE-2024-24122 | Unspecified vulnerability in Wondershare Edraw 3.2.2 A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script. | 3.3 |
2023-05-24 | CVE-2023-31748 | Incorrect Permission Assignment for Critical Resource vulnerability in Wondershare Mobiletrans 4.0.11 Insecure permissions in MobileTrans v4.0.11 allows attackers to escalate privileges to local admin via replacing the executable file. | 7.8 |
2023-05-23 | CVE-2023-31747 | Unquoted Search Path or Element vulnerability in Wondershare Filmora 12 Wondershare Filmora 12 (Build 12.2.1.2088) was discovered to contain an unquoted service path vulnerability via the component NativePushService. | 7.8 |
2023-04-26 | CVE-2023-29835 | Unspecified vulnerability in Wondershare Dr.Fone 12.9.6 Insecure Permission vulnerability found in Wondershare Dr.Fone v.12.9.6 allows a remote attacker to escalate privileges via the service permission function. | 7.8 |
2023-03-13 | CVE-2023-27010 | Unspecified vulnerability in Wondershare Dr.Fone 12.9.6 Wondershare Dr.Fone v12.9.6 was discovered to contain weak permissions for the service WsDrvInst. | 7.8 |
2022-04-29 | CVE-2021-44595 | Missing Authorization vulnerability in Wondershare Dr.Fone 20211206 Wondershare Dr. | 8.8 |
2022-04-29 | CVE-2021-44596 | Unspecified vulnerability in Wondershare Dr.Fone 20211206 Wondershare LTD Dr. | 9.8 |
2020-11-02 | CVE-2020-27992 | Unquoted Search Path or Element vulnerability in Wondershare Dr.Fone 3.0.0 Dr.Fone 3.0.0 allows local users to gain privileges via a Trojan horse DriverInstall.exe because %PROGRAMFILES(X86)%\Wondershare\dr.fone\Library\DriverInstaller has Full Control for BUILTIN\Users. | 7.2 |