Total
880 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-41780 | 1 Zte | 1 Zxcloud Irai | 2025-01-28 | N/A | 6.4 MEDIUM |
There is an unsafe DLL loading vulnerability in ZTE ZXCLOUD iRAI. Due to the program failed to adequately validate the user's input, an attacker could exploit this vulnerability to escalate local privileges. | |||||
CVE-2023-25005 | 1 Autodesk | 1 Infraworks | 2025-01-27 | N/A | 7.8 HIGH |
A maliciously crafted DLL file can be forced to read beyond allocated boundaries in Autodesk InfraWorks 2023, and 2021 when parsing the DLL files could lead to a resource injection vulnerability. | |||||
CVE-2024-53588 | 2025-01-24 | N/A | 7.8 HIGH | ||
A DLL hijacking vulnerability in iTop VPN v16.0 allows attackers to execute arbitrary code via placing a crafted DLL file into the path \ProgramData\iTop VPN\Downloader\vpn6. | |||||
CVE-2023-25428 | 1 Soft-o | 1 Free Password Manager | 2025-01-24 | N/A | 7.8 HIGH |
A DLL Hijacking issue discovered in Soft-o Free Password Manager 1.1.20 allows attackers to create arbitrary DLLs leading to code execution. | |||||
CVE-2024-9497 | 2025-01-24 | N/A | 8.6 HIGH | ||
DLL hijacking vulnerabilities, caused by an uncontrolled search path in the USBXpress 4 SDK installer can lead to privilege escalation and arbitrary code execution when running the impacted installer. | |||||
CVE-2024-9495 | 2025-01-24 | N/A | 8.6 HIGH | ||
DLL hijacking vulnerabilities, caused by an uncontrolled search path in the CP210x VCP Windows installer can lead to privilege escalation and arbitrary code execution when running the impacted installer. | |||||
CVE-2024-9494 | 2025-01-24 | N/A | 8.6 HIGH | ||
DLL hijacking vulnerabilities, caused by an uncontrolled search path in the CP210 VCP Win 2k installer can lead to privilege escalation and arbitrary code execution when running the impacted installer. | |||||
CVE-2024-9493 | 2025-01-24 | N/A | 8.6 HIGH | ||
DLL hijacking vulnerabilities, caused by an uncontrolled search path in the ToolStick installer can lead to privilege escalation and arbitrary code execution when running the impacted installer. | |||||
CVE-2024-9492 | 2025-01-24 | N/A | 8.6 HIGH | ||
DLL hijacking vulnerabilities, caused by an uncontrolled search path in Flash Programming Utility installer can lead to privilege escalation and arbitrary code execution when running the impacted installer. | |||||
CVE-2024-9491 | 2025-01-24 | N/A | 8.6 HIGH | ||
DLL hijacking vulnerabilities, caused by an uncontrolled search path in Configuration Wizard 2 installer can lead to privilege escalation and arbitrary code execution when running the impacted installer. | |||||
CVE-2024-9490 | 2025-01-24 | N/A | 8.6 HIGH | ||
DLL hijacking vulnerabilities, caused by an uncontrolled search path in Silicon Labs (8-bit) IDE installer can lead to privilege escalation and arbitrary code execution when running the impacted installer. | |||||
CVE-2024-41739 | 2025-01-24 | N/A | 8.8 HIGH | ||
IBM Cognos Dashboards 4.0.7 and 5.0.0 on Cloud Pak for Data could allow a remote attacker to perform unauthorized actions due to dependency confusion. | |||||
CVE-2024-21861 | 1 Intel | 1 Graphics Performance Analyzers Framework | 2025-01-23 | N/A | 6.7 MEDIUM |
Uncontrolled search path in some Intel(R) GPA Framework software before version 2023.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-21788 | 1 Intel | 1 Graphics Performance Analyzers | 2025-01-23 | N/A | 6.7 MEDIUM |
Uncontrolled search path in some Intel(R) GPA software before version 2023.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2023-41961 | 1 Intel | 1 Graphics Performance Analyzers | 2025-01-23 | N/A | 6.7 MEDIUM |
Uncontrolled search path in some Intel(R) GPA software before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2023-35192 | 1 Intel | 1 Graphics Performance Analyzers Framework | 2025-01-23 | N/A | 6.7 MEDIUM |
Uncontrolled search path in some Intel(R) GPA Framework software before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2023-0142 | 1 Synology | 3 Diskstation Manager, Diskstation Manager Unified Controller, Router Manager | 2025-01-14 | N/A | 6.5 MEDIUM |
Uncontrolled search path element vulnerability in Backup Management functionality in Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.0.1-42218-7 and 7.1-42661 allows remote authenticated users with administrator privileges to read or write arbitrary files via unspecified vectors. | |||||
CVE-2025-0069 | 2025-01-14 | N/A | 7.8 HIGH | ||
Due to DLL injection vulnerability in SAPSetup, an attacker with either local user privileges or with access to a compromised corporate user�s Windows account could gain higher privileges. With this, he could move laterally within the network and further compromise the active directory of a company. This leads to high impact on confidentiality, integrity and availability of the Windows server. | |||||
CVE-2024-7886 | 2025-01-10 | 6.8 MEDIUM | 7.8 HIGH | ||
A vulnerability has been found in Scooter Software Beyond Compare up to 3.3.5.15075 and classified as critical. Affected by this vulnerability is an unknown functionality in the library 7zxa.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The real existence of this vulnerability is still doubted at the moment. The vendor explains that a system must be breached before exploiting this issue. They are not planning on making any changes to address it. | |||||
CVE-2024-37130 | 1 Dell | 1 Openmanage Server Administrator | 2025-01-09 | N/A | 7.3 HIGH |
Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains a Local Privilege Escalation vulnerability via XSL Hijacking. A local low-privileged malicious user could potentially exploit this vulnerability and escalate their privilege to the admin user and gain full control of the machine. Exploitation may lead to a complete system compromise. |