Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-38410

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-27 Jul, 2022 | 20:23
Updated At-17 Apr, 2025 | 15:49
Rejected At-
Credits

AVEVA PCS Portal Uncontrolled Search Path Element

AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:27 Jul, 2022 | 20:23
Updated At:17 Apr, 2025 | 15:49
Rejected At:
▼CVE Numbering Authority (CNA)
AVEVA PCS Portal Uncontrolled Search Path Element

AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.

Affected Products
Vendor
AVEVAAVEVA
Product
Platform Common Services (PCS) Portal
Versions
Affected
  • 4.5.2
  • 4.5.1
  • 4.5.0
  • 4.4.6
Problem Types
TypeCWE IDDescription
textN/ACVE-427
Type: text
CWE ID: N/A
Description: CVE-427
Metrics
VersionBase scoreBase severityVector
3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

AVEVA recommends organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation. Users of affected versions of the products should apply the corresponding security update as soon as possible. Security update PCS 4.5.3 is available for the following versions: AVEVA Mobile Operator 2020 AVEVA Enterprise Data Management 2021 AVEVA System Platform 2020 R2 P01 AVEVA System Platform 2020 R2 AVEVA Work Tasks 2020 Update 1 Security update PCS 4.4.7 is available for the following versions: AVEVA System Platform 2020 AVEVA Work Tasks 2020 AVEVA Manufacturing Execution System 2020 AVEVA Batch Management 2020 For more information on this issue, including security updates, please see Security Bulletin AVEVA-2021-008.

Configurations

Workarounds

Exploits

Credits

Noam Moshe of Claroty discovered and disclosed the vulnerability to the AVEVA Software Security Response Center.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01
x_refsource_CONFIRM
https://www.aveva.com/en/support-and-success/cyber-security-updates/
x_refsource_CONFIRM
Hyperlink: https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.aveva.com/en/support-and-success/cyber-security-updates/
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01
x_refsource_CONFIRM
x_transferred
https://www.aveva.com/en/support-and-success/cyber-security-updates/
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.aveva.com/en/support-and-success/cyber-security-updates/
Resource:
x_refsource_CONFIRM
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-427CWE-427 Uncontrolled Search Path Element
Type: CWE
CWE ID: CWE-427
Description: CWE-427 Uncontrolled Search Path Element
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:27 Jul, 2022 | 21:15
Updated At:17 Apr, 2025 | 16:15

AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CPE Matches

AVEVA
aveva
>>batch_management>>2020
cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:*
AVEVA
aveva
>>enterprise_data_management>>2020
cpe:2.3:a:aveva:enterprise_data_management:2020:*:*:*:*:*:*:*
AVEVA
aveva
>>manufacturing_execution_system>>2020
cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*
AVEVA
aveva
>>mobile_operator>>2020
cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*
AVEVA
aveva
>>platform_common_services>>4.4.6
cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:*
AVEVA
aveva
>>platform_common_services>>4.5.0
cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:*
AVEVA
aveva
>>platform_common_services>>4.5.1
cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:*
AVEVA
aveva
>>platform_common_services>>4.5.2
cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:*
AVEVA
aveva
>>system_platform>>2020
cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*
AVEVA
aveva
>>system_platform>>2020
cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*
AVEVA
aveva
>>system_platform>>2020
cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*
AVEVA
aveva
>>work_tasks>>2020
cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*
AVEVA
aveva
>>work_tasks>>2020
cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-427Primarynvd@nist.gov
CWE-427Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-427
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-427
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.aveva.com/en/support-and-success/cyber-security-updates/ics-cert@hq.dhs.gov
Vendor Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01ics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
https://www.aveva.com/en/support-and-success/cyber-security-updates/af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
Hyperlink: https://www.aveva.com/en/support-and-success/cyber-security-updates/
Source: ics-cert@hq.dhs.gov
Resource:
Vendor Advisory
Hyperlink: https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.aveva.com/en/support-and-success/cyber-security-updates/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource

Change History

0
Information is not available yet

Similar CVEs

373Records found

CVE-2019-3745
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.60%
||
7 Day CHG~0.00%
Published-07 Oct, 2019 | 18:21
Updated-17 Sep, 2024 | 04:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vulnerability is limited to the installers of Dell Encryption Enterprise versions prior to 10.4.0 and Dell Endpoint Security Suite Enterprise versions prior to 2.4.0. This issue is exploitable only during the installation of the product by an administrator. A local authenticated low privileged user potentially could exploit this vulnerability by staging a malicious DLL in the search path of the installer prior to its execution by a local administrator. This would cause loading of the malicious DLL, which would allow the attacker to execute arbitrary code in the context of an administrator.

Action-Not Available
Vendor-Dell Inc.
Product-encryptionendpoint_security_suite_enterpriseDell Encryption EnterpriseDell Endpoint Security Suite Enterprise
CWE ID-CWE-427
Uncontrolled Search Path Element
CWE ID-CWE-426
Untrusted Search Path
CVE-2013-0725
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.41%
||
7 Day CHG~0.00%
Published-30 Jan, 2020 | 13:03
Updated-06 Aug, 2024 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ERDAS ER Viewer 13.0 has dwmapi.dll and irml.dll libraries arbitrary code execution vulnerabilities

Action-Not Available
Vendor-hexagongeospatialERDAS
Product-erdas_er_viewerER Viewer
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-3613
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 8.79%
||
7 Day CHG~0.00%
Published-10 Jun, 2020 | 11:12
Updated-16 Sep, 2024 | 19:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL search order hijacking in MA

DLL Search Order Hijacking vulnerability in McAfee Agent (MA) prior to 5.6.4 allows attackers with local access to execute arbitrary code via execution from a compromised folder.

Action-Not Available
Vendor-McAfee, LLC
Product-agentMcAfee Agent (MA)
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-3667
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-6.6||MEDIUM
EPSS-0.10% / 28.86%
||
7 Day CHG~0.00%
Published-11 Dec, 2019 | 06:25
Updated-04 Aug, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL Search Order Hijacking

DLL Search Order Hijacking vulnerability in the Microsoft Windows client in McAfee Tech Check 3.0.0.17 and earlier allows local users to execute arbitrary code via the local folder placed there by an attacker.

Action-Not Available
Vendor-McAfee, LLC
Product-techcheckMcAfee TechCheck
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20358
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-3.62% / 87.36%
||
7 Day CHG~0.00%
Published-30 Jan, 2020 | 21:10
Updated-05 Aug, 2024 | 02:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed. Another attack vector similar to CVE-2019-9491 was idenitfied and resolved in version 1.62.0.1228 of the tool.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowsanti-threat_toolkitTrend Micro Anti-Threat Toolkit (ATTK)
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-427
Uncontrolled Search Path Element
CWE ID-CWE-426
Untrusted Search Path
CVE-2019-8062
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-7.87% / 91.67%
||
7 Day CHG~0.00%
Published-14 Aug, 2019 | 14:41
Updated-05 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe After Effects versions 16 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to arbitrary code execution.

Action-Not Available
Vendor-Adobe Inc.
Product-after_effectsAdobe After Effects
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20400
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.8||HIGH
EPSS-0.14% / 35.44%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 03:10
Updated-16 Sep, 2024 | 22:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The usage of Tomcat in Jira before version 8.5.2 allows local attackers with permission to write a dll file to a directory in the global path environmental variable can inject code into via a DLL hijacking vulnerability.

Action-Not Available
Vendor-Atlassian
Product-jira_serverJira Server
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20769
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.11%
||
7 Day CHG~0.00%
Published-17 Apr, 2020 | 13:32
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in LG PC Suite for LG G3 and earlier (aka LG PC Suite v5.3.27 and earlier). DLL Hijacking can occur via a Trojan horse DLL in the current working directory. The LG ID is LVE-MOT-190001 (November 2019).

Action-Not Available
Vendor-n/aLG Electronics Inc.
Product-pc_suiteg3n/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20406
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.8||HIGH
EPSS-0.14% / 35.44%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 03:10
Updated-16 Sep, 2024 | 23:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.

Action-Not Available
Vendor-Microsoft CorporationAtlassian
Product-windowsconfluence_serverconfluenceConfluence Data Center
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20781
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.11%
||
7 Day CHG~0.00%
Published-29 Apr, 2020 | 13:08
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in LG Bridge before April 2019 on Windows. DLL Hijacking can occur.

Action-Not Available
Vendor-n/aLG Electronics Inc.
Product-bridgen/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-19689
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.20% / 42.44%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 18:30
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro HouseCall for Home Networks (versions below 5.3.0.1063) could be exploited via a DLL Hijack related to a vulnerability on the packer that the program uses.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowshousecall_for_home_networksTrend Micro HouseCall for Home Networks
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-18670
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 36.10%
||
7 Day CHG~0.00%
Published-17 Dec, 2019 | 15:10
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Quick Access Service (QAAdminAgent.exe) in Acer Quick Access V2.01.3000 through 2.01.3027 and V3.00.3000 through V3.00.3008, a REGULAR user can load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\SYSTEM. This is a DLL Hijacking vulnerability (including search order hijacking, which searches for the missing DLL in the PATH environment variable), which is caused by an uncontrolled search path element for nvapi.dll, atiadlxx.dll, or atiadlxy.dll.

Action-Not Available
Vendor-n/aAcer Inc.
Product-quick_accessn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-1745
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.04%
||
7 Day CHG~0.00%
Published-30 Mar, 2023 | 23:00
Updated-02 Aug, 2024 | 05:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
KMPlayer SHFOLDER.dll uncontrolled search path

A vulnerability, which was classified as problematic, has been found in KMPlayer 4.2.2.73. This issue affects some unknown processing in the library SHFOLDER.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224633 was assigned to this vulnerability.

Action-Not Available
Vendor-n/aPandora Media, LLC
Product-kmplayerKMPlayer
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-1855
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.3||HIGH
EPSS-0.70% / 71.00%
||
7 Day CHG~0.00%
Published-04 Jul, 2019 | 19:50
Updated-20 Nov, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Jabber for Windows DLL Preloading Vulnerability

A vulnerability in the loading mechanism of specific dynamic link libraries in Cisco Jabber for Windows could allow an authenticated, local attacker to perform a DLL preloading attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of the resources loaded by the application at run time. An attacker could exploit this vulnerability by crafting a malicious DLL file and placing it in a specific location on the targeted system. The malicious DLL file would execute when the Jabber application launches. A successful exploit could allow the attacker to execute arbitrary code on the target machine with the privileges of another user's account.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-jabberCisco Jabber for Windows
CWE ID-CWE-264
Not Available
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-18215
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.70%
||
7 Day CHG~0.00%
Published-18 Nov, 2019 | 20:00
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.

Action-Not Available
Vendor-comodon/a
Product-comodo_internet_securityn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-6692
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.21%
||
7 Day CHG~0.00%
Published-24 Oct, 2019 | 13:46
Updated-25 Oct, 2024 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious DLL preload vulnerability in Fortinet FortiClient for Windows 6.2.0 and below allows a privileged attacker to perform arbitrary code execution via forging that DLL.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-forticlientFortinet FortiClient for Windows
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-6564
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.81%
||
7 Day CHG~0.00%
Published-09 May, 2019 | 14:27
Updated-04 Aug, 2024 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to place malicious files within the installer file directory, which may allow an attacker to gain administrative privileges on a system during installation or upgrade.

Action-Not Available
Vendor-gen/a
Product-ge_communicatorGE Communicator
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-15638
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.67%
||
7 Day CHG~0.00%
Published-04 Dec, 2019 | 14:50
Updated-05 Aug, 2024 | 00:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

COPA-DATA zenone32 zenon Editor through 8.10 has an Uncontrolled Search Path Element.

Action-Not Available
Vendor-copadatan/a
Product-zenonn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-32780
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.03% / 5.47%
||
7 Day CHG~0.00%
Published-15 Apr, 2025 | 16:32
Updated-15 Apr, 2025 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BleachBit for Windows Has DLL Untrusted Path Vulnerability

BleachBit cleans files to free disk space and to maintain privacy. BleachBit for Windows up to version 4.6.2 is vulnerable to a DLL Hijacking vulnerability. By placing a malicious DLL with the name uuid.dll in the folder C:\Users\<username>\AppData\Local\Microsoft\WindowsApps\, an attacker can execute arbitrary code every time BleachBit is run. This issue has been patched in version 4.9.0.

Action-Not Available
Vendor-bleachbit
Product-bleachbit
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2016-5311
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-7.8||HIGH
EPSS-0.29% / 51.90%
||
7 Day CHG~0.00%
Published-09 Jan, 2020 | 19:30
Updated-06 Aug, 2024 | 01:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Privilege Escalation vulnerability exists in Symantec Norton Antivirus, Norton AntiVirus with Backup, Norton Security, Norton Security with Backup, Norton Internet Security, Norton 360, Endpoint Protection Small Business Edition Cloud, and Endpoint Protection Cloud Client due to a DLL-preloading without path restrictions, which could let a local malicious user obtain system privileges.

Action-Not Available
Vendor-Symantec Corporation
Product-norton_360norton_internet_securitynorton_antivirus_with_backupnorton_familyendpoint_protectionendpoint_protection_cloudnorton_securitynorton_antivirusnorton_security_with_backupNorton Antivirus, Norton AntiVirus with Backup, Norton Security, Norton Security with Backup, Norton Internet Security, Norton 360Endpoint Protection Small Business Edition Cloud, and Endpoint Protection Cloud Client
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-46330
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.99%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-16 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Squirrel.Windows is both a toolset and a library that provides installation and update functionality for Windows desktop applications. Installers generated by Squirrel.Windows 2.0.1 and earlier contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with the privilege of the user invoking the installer.

Action-Not Available
Vendor-squirrel.windows_projectSquirrel
Product-squirrel.windowsInstallers generated by Squirrel.Windows
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-34606
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-7.3||HIGH
EPSS-0.06% / 17.77%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 14:25
Updated-16 Sep, 2024 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XINJE XD/E Series PLC Program Tool DLL Hijacking

A vulnerability exists in XINJE XD/E Series PLC Program Tool in versions up to v3.5.1 that can allow an authenticated, local attacker to load a malicious DLL. Local access is required to successfully exploit this vulnerability. This means the potential attacker must have access to the system and sufficient file-write privileges. If exploited, the attacker could place a malicious DLL file on the system, that when running XINJE XD/E Series PLC Program Tool will allow the attacker to execute arbitrary code with the privileges of another user's account.

Action-Not Available
Vendor-xinjeXINJE
Product-xd\/e_series_plc_program_toolXD/E Series PLC Program Tool
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-30167
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.01% / 1.81%
||
7 Day CHG~0.00%
Published-03 Jun, 2025 | 16:42
Updated-04 Jun, 2025 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Jupyter Core on Windows Has Uncontrolled Search Path Element Local Privilege Escalation Vulnerability

Jupyter Core is a package for the core common functionality of Jupyter projects. When using Jupyter Core prior to version 5.8.0 on Windows, the shared `%PROGRAMDATA%` directory is searched for configuration files (`SYSTEM_CONFIG_PATH` and `SYSTEM_JUPYTER_PATH`), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected `%PROGRAMDATA%` are affected. Users should upgrade to Jupyter Core version 5.8.0 or later to receive a patch. Some other mitigations are available. As administrator, modify the permissions on the `%PROGRAMDATA%` directory so it is not writable by unauthorized users; or as administrator, create the `%PROGRAMDATA%\jupyter` directory with appropriately restrictive permissions; or as user or administrator, set the `%PROGRAMDATA%` environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators _or_ the current user).

Action-Not Available
Vendor-jupyter
Product-jupyter_core
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-30033
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.5||HIGH
EPSS-0.02% / 2.35%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:16
Updated-12 Aug, 2025 | 20:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component.

Action-Not Available
Vendor-Siemens AG
Product-SIMATIC PCS 7/OPEN OS V9.1SIMATIC S7-PLCSIM V20SIMATIC PCS 7 Advanced Process Functions V2.2TIA Portal Test Suite V19SIMATIC NET PC Software V17SIMATIC WinCC flexible ESSIMATIC PCS 7 PowerControlSIMATIC WinCC Visualization Architect (SiVArc) V20SIMATIC WinCC Visualization Architect (SiVArc) V18SIMATIC NET PC Software V19SIMATIC PCS 7 V10.0SIMATIC ProSave V20SIMATIC WinCC Runtime Professional V20SIMATIC S7-1500 Software Controller V2SIMATIC Process Historian 2024SIMIT Rapid TesterStandard PID CTRL ToolSIMATIC PCS 7 Basis Faceplates V9.1SIMATIC WinCC TeleControlSIMATIC WinCC Unified PC Runtime V18SIMATIC PDM V9.2SIMATIC S7-PLCSIM AdvancedSIMATIC eaSie Document SkillsSIMATIC WinCC Unified PC Runtime V19SIMATIC MTP CREATOR V3.xSIMATIC S7-PLCSIM V18SIMATIC PCS 7 Standard Chemical Library V9.1SIMATIC PCS neo V6.0SIMATIC Automation ToolSINAMICS Startdrive V19SIMATIC Safety MatrixSIMATIC MTP CREATOR V5.xSIMATIC S7-PCTModular PID CTRL ToolTeleControl Server Basic V3.1Automation License Manager V6.2SIMATIC S7-1500 Software Controller V3OpenPCS 7 V9.1SIMATIC D7-SYSSIMATIC WinCC Visualization Architect (SiVArc) V19SIMATIC NET PC Software V20SIMATIC Process Function Library (PFL) V4.0TIA Portal Test Suite V20SIMATIC ProSave V19SIMATIC WinCC Unified Line CoordinationSIMATIC PCS 7 Industry Library V9.1SIMATIC NET PC Software V18SIMATIC STEP 7 CFC V19SIMIT Simulation PlatformSIMATIC MTP CREATOR V4.xSIMATIC Logon V1.6SINEMA Remote Connect ClientSIMATIC Management AgentSIMATIC WinCC Visualization Architect (SiVArc) V17SIMATIC Route Control V10.0SIMATIC Management ConsoleSIMATIC PCS 7 TeleControlSIMATIC eaSie PCS 7 Skill PackageSINEC NMSAutomation License Manager V6.0SIMATIC S7-Fail-safe Configuration Tool (S7-FCT)SIMATIC PCS 7 Advanced Process Functions V2.1Create MyConfig (CMC)SIMATIC eaSie Workflow SkillsSIMATIC MTP Integrator V1.xSIMATIC PCS 7 Advanced Process Graphics V10.0OpenPCS 7 V10.0SIMATIC PCS 7 Advanced Process Library incl. Faceplates V10.0WinCC Panel Image SetupSIMATIC ODK 1500SSIMATIC ProSave V17SIMATIC MTP CREATOR V2.xSIMATIC STEP 7 V5.7FM Configuration PackageSIMATIC STEP 7 CFC V20TIA Portal Test Suite V17SIMATIC eaSie Core PackageCP PtP Param configuring interfaceSIMATIC PCS 7 V9.1MultiFieldbus Configuration Tool (MFCT)SIMATIC Logon V2.0SIMATIC Process Historian 2020TIA Portal Cloud ConnectorTIA AdministratorSIMATIC NET PC Software V16SIMATIC WinCC Unified SequenceSIMATIC BATCH V10.0SIMATIC Route Control V9.1SIMATIC TargetSIMATIC WinCC V7.5SINAMICS Startdrive V18SIMATIC PCS neo V5.0SIMATIC WinCC V8.1SIMATIC Control Function Library (CFL) V4.0SIMATIC Control Function Library (CFL) V2.0SIMATIC S7-PLCSIM V19SIMATIC Automation Tool SDK WindowsSINAMICS Startdrive V20SIMATIC PCS 7 Basis Library V9.1SIMATIC PCS 7 MPC ConfiguratorSIMATIC S7 F Systems V6.3Energy Support Library (EnSL)SINAMICS Startdrive V17SIMATIC Control Function Library (CFL) V3.0SIMATIC MTP Integrator V2.xSIMATIC PCS 7 Advanced Process Graphics V9.1SIMATIC PDM V9.3SIMATIC ProSave V18SIMATIC Energy Suite V18SIMATIC Control Function Library (CFL) V1.0.0SIMATIC WinCC Unified PC Runtime V20SIMATIC WinCC V8.0TIA Portal Test Suite V18SIMATIC BATCH V9.1SIMATIC Energy Suite V17SIMATIC PCS 7 Advanced Process Faceplates V9.1TIA Project-ServerCEMAT V10.0SIMATIC PCS 7 Industry Library V10.0SIMATIC PCS 7 Advanced Process Library V9.1SIMATIC PCS 7 Standard Chemical Library V10.0SIMATIC PCS 7 Industry Library V9.0SIMATIC WinCC Runtime ProfessionalTIA Project-Server V17SIMATIC S7-PLCSIM V17SIMATIC S7 F Systems V6.4SIMATIC PCS 7 Logic Matrix V9.1Siemens Network Planner (SINETPLAN)SIMATIC WinCC Runtime AdvancedSIMATIC PDM Maintenance Station V5.0SITRANSSIMATIC PCS 7 Basis Library V10.0SIMATIC PCS 7 Logic Matrix V10.0SIMATIC Process Historian 2022SIMATIC Energy Suite V19
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-29802
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.3||HIGH
EPSS-0.13% / 33.22%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 17:24
Updated-10 Jul, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visual Studio Elevation of Privilege Vulnerability

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_2022Microsoft Visual Studio 2022 version 17.10Microsoft Visual Studio 2022 version 17.8Microsoft Visual Studio 2022 version 17.12
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-29803
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.3||HIGH
EPSS-0.13% / 33.22%
||
7 Day CHG~0.00%
Published-12 Apr, 2025 | 01:32
Updated-10 Jul, 2025 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability

Uncontrolled search path element in Visual Studio Tools for Applications and SQL Server Management Studio allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_tools_for_applications_2019_sdksql_server_management_studiovisual_studio_tools_for_applications_2019visual_studio_tools_for_applications_2022visual_studio_tools_for_applications_2022_sdkSQL Server Management Studio 20.2VSTA 2019 SDKVisual Studio Tools for Applications (VSTA)VSTA 2022 SDK
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-45422
Matching Score-4
Assigner-LG Electronics
ShareView Details
Matching Score-4
Assigner-LG Electronics
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.74%
||
7 Day CHG~0.00%
Published-21 Nov, 2022 | 00:00
Updated-28 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When LG SmartShare is installed, local privilege escalation is possible through DLL Hijacking attack. The LG ID is LVE-HOT-220005.

Action-Not Available
Vendor-n/aLG Electronics Inc.
Product-smart_shareLG PC
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-44939
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.37%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 00:00
Updated-09 Apr, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Efs Software Easy Chat Server Version 3.1 was discovered to contain a DLL hijacking vulnerability via the component TextShaping.dll. This vulnerability allows attackers to execute arbitrary code via a crafted DLL.

Action-Not Available
Vendor-echatservern/a
Product-easy_chat_servern/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-44744
Matching Score-4
Assigner-Acronis International GmbH
ShareView Details
Matching Score-4
Assigner-Acronis International GmbH
CVSS Score-2.2||LOW
EPSS-0.04% / 11.23%
||
7 Day CHG~0.00%
Published-07 Nov, 2022 | 19:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.

Action-Not Available
Vendor-Acronis (Acronis International GmbH)
Product-cyber_protect_home_officeAcronis Cyber Protect Home Office
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-43751
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.96%
||
7 Day CHG~0.00%
Published-22 Nov, 2022 | 00:00
Updated-29 Apr, 2025 | 05:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

McAfee Total Protection prior to version 16.0.49 contains an uncontrolled search path element vulnerability due to the use of a variable pointing to a subdirectory that may be controllable by an unprivileged user. This may have allowed the unprivileged user to execute arbitrary code with system privileges.

Action-Not Available
Vendor-n/aMcAfee, LLC
Product-total_protectionn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-43722
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.55%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected software does not properly secure a folder containing library files. This could allow an attacker to place a custom malicious DLL in this folder which is then run with SYSTEM rights when a service is started that requires this DLL. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions.

Action-Not Available
Vendor-Siemens AG
Product-sicam_pas\/pqsSICAM PAS/PQS
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-43310
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.97%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 00:00
Updated-01 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-foxit_readern/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-42945
Matching Score-4
Assigner-Autodesk
ShareView Details
Matching Score-4
Assigner-Autodesk
CVSS Score-7.8||HIGH
EPSS-0.64% / 69.57%
||
7 Day CHG~0.00%
Published-19 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DWG TrueViewTM 2023 version has a DLL Search Order Hijacking vulnerability. Successful exploitation by a malicious attacker could result in remote code execution on the target system.

Action-Not Available
Vendor-n/aAutodesk Inc.
Product-dwg_trueviewDWG TrueView
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-41796
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.22%
||
7 Day CHG~0.00%
Published-24 Oct, 2022 | 00:00
Updated-07 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in the installer of Content Transfer (for Windows) Ver.1.3 and prior allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.

Action-Not Available
Vendor-Sony Group Corporation
Product-content_transferContent Transfer (for Windows)
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-26631
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.3||HIGH
EPSS-0.21% / 43.49%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 16:59
Updated-03 Jul, 2025 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visual Studio Code Elevation of Privilege Vulnerability

Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_codeVisual Studio Code
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-40978
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-7.5||HIGH
EPSS-0.00% / 0.01%
||
7 Day CHG~0.00%
Published-19 Sep, 2022 | 16:05
Updated-03 Aug, 2024 | 12:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The installer of JetBrains IntelliJ IDEA before 2022.2.2 was vulnerable to EXE search order hijacking

Action-Not Available
Vendor-JetBrains s.r.o.
Product-intellij_ideaIntelliJ IDEA
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-4894
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.3||HIGH
EPSS-0.12% / 32.01%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 20:13
Updated-03 Aug, 2024 | 01:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain HP and Samsung Printer software packages may potentially be vulnerable to elevation of privilege due to Uncontrolled Search Path Element.

Action-Not Available
Vendor-SamsungHP Inc.
Product-7fq92a\#ab18af51a714z8a_firmwaress256h_firmwaress272q_firmwaress278ass395a_firmwaress388kst682a_firmwaress383f_firmwaress359ess150t8af50a_firmwaress211c_firmwaress213ess395c_firmwaress365g_firmware7fr04a\#ab1ss344b_firmwaress152a_firmwaress272c_firmwaress370a_firmware7gf50a\#ab1209u7ass196fss365j_firmwarest686css042d_firmwaress150p_firmwaress108j_firmwaress204ess103a_firmwarest690css272n_firmwaresv531ass404q3b0c3a\#ab1_firmwarest695b_firmware7gf55a\#ab1_firmwaress196g_firmwaress106j_firmwaress339fss204dss210j_firmwaress076sss076d_firmwaress342d_firmwaress229fss389z_firmwaress154a_firmwaress343e_firmwaress397q_firmwaress326est679h_firmwaress370ass256kst694ass357a_firmwaress150j_firmware6hu09a_firmwaress334ess352h_firmwaress365lss389z7gf53a\#ab1_firmwaress276bss341ass268a_firmwaress075bss150lss106lss327css272d_firmwarest688jss196f_firmwaress041jss075kss287a_firmwaress256tss383h_firmware3a9x2a\#301ss389mss396c_firmware715a6a715a3ass153f_firmwaress256n_firmwaress359hss105gss256p_firmwaress355a3a9x1a\#ab1ss210c_firmwaress378d_firmwaress271lss218h_firmwaress353ass229c_firmwaress335fss216v_firmwaress042fss153kss257l_firmwaress256m_firmwaress027lss272nss108k_firmwarest688g_firmwaress255c_firmwaress058b_firmwaress336a_firmwaress271ass042b_firmware7fq87a\#ab1ss076k3a9x3a\#ab1_firmware3b0c0a\#301_firmwaress107j_firmwaresw192a_firmwarest688e_firmware8pa11a\#301_firmwaress325ass350ass395mss058a_firmware4zb93ass076e_firmwaress150q_firmwaress205p_firmware7ab26a_firmwaress273b_firmwaress397lss369a_firmware7fq89a\#ab1_firmwaress349ass216hss150k_firmwaress383v4zb89ass058g_firmware3b0c9a\#304_firmwaress044jss204f_firmwaress280ass044k_firmwaress340c_firmwaress389gss369d_firmwaress275a_firmwaress334c_firmwaress384ass229ess389pss388fss395g_firmwaress383p_firmwaress335e_firmwarest687ass076l_firmwaress395pss058gss150bss398dss352mss352k_firmwaress385ass213gss272e_firmwaress348a_firmwaress216jss216q_firmwaress049dss033j3a9x3a\#ab1ss229gst682ast694dss236ass254css229f_firmwaress334d_firmwaress388lst688css368h_firmwaress216sss076w_firmwaress386fss359fss272f_firmwaress352ess257e_firmwaress105b_firmwaress218css353c_firmwaress392css365fss218j_firmwaress368css404jss398css229hss257c_firmwaress328a_firmwaress205l_firmwaress234ass382a_firmwaress210ass105dss365mss042bss033lss149a_firmwaress359h_firmwaress323ass195ass359kss198a_firmwaress384dss229j_firmwaress108ass229css218ass229h_firmwaress383q_firmware7fq92a\#ab1_firmwaress383a_firmwaress341a_firmwaress211k_firmwaress108f_firmwaress150t_firmwaress236a_firmwaress388f_firmwaress076d3b0c6a\#312_firmwaress150g7gf48a\#ab1_firmwaress195a_firmwaress237a_firmwaress075b_firmware715a1ass349c_firmwaress230q_firmware3b0c5a\#ab1ss368ess273bss254bss216k_firmware715a2a_firmwaress365d_firmwaress044bss257jst673a_firmwaress211j_firmwaress335a_firmwaress383uss389lss230f_firmwaress027k7gf54a\#ab1_firmwaress043gss076q2zn50a_firmwaress033l_firmwaress378fss212a_firmwaress211d_firmwaress389b_firmwaress210e_firmwaress104ass229e_firmwaress108h_firmwaress211jss108gss389h_firmwaress261ass393bss369bss326e_firmwaress343fss272bss353g_firmwaress076j3a9x4a\#ab1ss204jss218hss150css378dss076v_firmwaress383nss219e_firmwarest679b_firmwaress271p_firmwaress213a_firmware3b0c1a\#304ss272l_firmwaress211nss256a_firmwaress044b_firmwarest673dss395e_firmwarest682css033bss152css274ass232ass027f_firmwaress378e_firmwaress076q_firmwaress271q_firmwaress353h_firmware8pa10a\#301ss342ess353d_firmwaress352g_firmwaress369ass404h_firmwaress397kss340css259a4zb85a_firmwaress365gss107b_firmwaress394a_firmwaress230s_firmwaress210m_firmwaress216kss107n_firmwaress043b_firmware4zb79ass365k_firmwaress256f_firmwaress352gss383g_firmwaress327dst686b_firmware715a0a_firmwaress107h_firmwaress392a3a9x8a\#ab1_firmwaress380a_firmwaress349f_firmware4zb83ass218jss377h_firmwaress027jss075j_firmwaress359z_firmwaress150dss204n_firmwaress106h7fq88a\#ab1_firmwaress369ess334f_firmwaress216qss335gss396d_firmwarest693dst690c_firmwaress043j_firmwaress205h_firmwaress076css353dss197ass333ass377bst682b_firmwaress255ass230k_firmwaress150qss398f_firmwaress396hst688a_firmwaress276ass325a_firmwaress027k_firmware4zb87a_firmwaress359e_firmwaress404hst693d_firmwaress041ess058hss256nss106g_firmwaress033h_firmwaress211f_firmwaress216f_firmwaress359f_firmwaress205zst694a_firmwaress058css043d_firmwaress257nss205u3b0c6a\#312ss343g_firmwaress106jss395qss256e_firmware7fq93a\#ab1ss388e_firmwaress352n_firmwaress334dss216lss379ass389v_firmwaress107c_firmware7fq94a\#ab1st686h_firmwaress342a_firmwaress380b_firmwaress076k_firmwarest688bss383u_firmwaress404css379b_firmwaress044d_firmwaress377gss230zss204m_firmwaress271m_firmwaress353f_firmwaress059ess335b4zb96a_firmwaress106k_firmwaress218b_firmwarest693bss150f_firmwaress075d_firmware3a9x1a\#ab1_firmware9vv52a_firmwarest679a_firmware7fq88a\#ab1ss153b_firmwaress049n_firmwaress216p_firmwaress151ass257g_firmwaress256j_firmwaress107k_firmwaress153d_firmwaress383yss257bss404z4zb85ass272m_firmwaress335ess275bss383tss386d_firmwaress152b_firmwaress383z_firmwaress205lss336ass365c_firmwaress041a_firmwaress049m_firmware4zb92ass210m4zb96ass359q_firmwaress327a_firmwaress205f_firmware7fq97a\#ab1_firmwaress343a_firmwarest673ass105h_firmwaress209a_firmwaress213g_firmwaress076s_firmwaress383zst683d_firmwaress282css211h_firmwaress041fss211b3b0c8a\#ab1ss338ass105ess209ass352m_firmwaress254e_firmwaress397b_firmwaress230g_firmwaress230est684a_firmwaress205s_firmwaress033j_firmwaress383y_firmwaress105hw7u02a_firmwaress272a_firmwaress335d_firmwaress211gss368ass384b_firmwaress335f_firmwaress044j_firmware715a1a_firmwaress256l_firmware7fq99a\#ab1_firmwaress377fst683dss150c_firmwaress216gsv899d_firmwaress285a_firmwaress282b_firmwaress058ass404gss049nss150ass044ess105g_firmwaress396css390dss205t_firmwaress351ass389hst689a_firmwaress042css284a_firmwaress339a_firmwaress211hss398e_firmwaress359lss150b_firmwaress210jss386css230m_firmwaress368c_firmwaress272g7fr00a\#ab1ss235a_firmwaress395m_firmwarest695css353j_firmwaress152d_firmwaress397css041hss257a_firmwaress229a_firmwaress218gss230gss378a_firmwaress365jss272zss349c3b0d3a\#301ss255b_firmwaress059e_firmware1vr14a_firmwaress274a_firmwaress388j_firmwaress389dss272jss352q_firmwaress283ass216j_firmwaress272b_firmwaress339ess262a_firmwaress368a_firmwaress389e_firmwarest689ass044css059a_firmwaress404g_firmwaress041f_firmware6hu08ass330ass388l_firmwaress027fss257kss059d_firmwaress335dss378c\#304ss230a_firmwaress210css368d_firmwaress107mss369e_firmwaress058h_firmwaress390hss153gss404k_firmwaress342css339dss257m_firmwarest688h_firmwaress049f_firmware3b0c4a\#301_firmwaress257zss153css383wss041d_firmwaress076j_firmwaress219a_firmwaress266ass365c8af50asv899dss377g_firmwaress257j_firmwaress219a6hu10ass395d_firmwaress075css106sss199ass395hss211kss075d8af51a_firmware7fr00a\#ab1_firmwaress042g_firmwaress108d_firmwaress271bss044fss106ess397a_firmwaress205kss326css049c_firmwaress217ass352sss216m_firmwaress359zss211lss106tss388jss398esv899css404kss042a_firmwaress359n_firmwaress389u_firmware4zb95a3b0d1a\#ab1ss353fsw116bss076lss388css219css354ass398c_firmwarest695ass211b_firmwaress343c_firmwaress059c_firmwaress340ass076pss339e_firmwaress271nss233ass395s_firmwarest695c_firmware714z9a_firmwaress395kss043e_firmwaress210k_firmwaress368hss218e_firmwaress377e_firmware7uq76ass027d_firmwaress265a_firmware3b0d1a\#ab1_firmwarest686d_firmwaress254e715a5a_firmware7zb72a_firmwaress388b_firmwaress108c3b0c4a\#301ss033a_firmwaress352l_firmwaress390bss378gss391b_firmwaress105e_firmwaress058est679ass404z_firmwaress395l_firmwaress359dss327ast686fss205k_firmwaress106e_firmware4zb88a_firmwaress254c_firmwaress281ass277a7uq76a_firmwaress391ess324a_firmwaress076b_firmwaress397bss287b_firmwaress383x_firmwaress076tss196a_firmwaress075jss404dss153bss043l_firmwaress271c_firmwaress272hss076u_firmwaress377kss389q_firmware3b0c5a\#ab1_firmwaress254f_firmwaress383n_firmwaress230d_firmwaress390ess043c_firmwaress395lss230b_firmwaress204kss230pss276a_firmwaress395h_firmware7fq86a\#ab1_firmwarest688c_firmwaress359b_firmwaress353e_firmwaress365b6hu12a_firmwaress353hss343css216b_firmwaress365b_firmwaress391dss205nss205hss256d_firmwaress391c_firmwaress058f_firmwaress340dss332a_firmwaress254d_firmwaress356a_firmwaresw176bss044e_firmwaress339c_firmwaress204l6hu11ass380ass033g_firmwaress196dss106mss271kss216u_firmwaress216nss404l_firmwaress197a_firmware7zb20a_firmwaress348css271pss384a_firmwaress027ass108b_firmwaress256z_firmwaress218bss257dss230c_firmwaress279a2zn49a_firmwaress107qss204d_firmwarest679d_firmwaress393a_firmwaress027gst690d_firmwaress108a_firmware8pa14a\#302sv531a_firmwaress106d_firmwaress075a_firmwaress387a_firmwaress049bss257qss204h_firmware7fq90a\#ab1_firmwaress329ass076uss042dss388gss076hss255a_firmwaress398b_firmwaress330css075g_firmwaress404e_firmwaress102a_firmwaress281bss106fsv901b_firmwaress076ass275c_firmwaress108j715a3a_firmwaress288a6hu08a_firmwaress042a7gf51a\#ab1ss219f_firmwaress106n_firmwaress395dss210d715a6a_firmwaress404q_firmwaress211mss216d_firmware7fq98a\#ab1ss106css033fss195b_firmwaress377jss154ass367css383xss216a_firmwaress076bss334a_firmwarest693b_firmwaress106g8pa13a\#302ss256lss264a_firmwaress205css210g_firmwaress230h_firmwarest683bss106b_firmwaress390fss326dss213h_firmwaress211l_firmwaress027l_firmwaresw176a_firmwaress404b_firmwaress076xss327c_firmwaress027h_firmware8pa12a\#302_firmwaress271jss377p7fq91a\#ab1ss059g_firmwaress369dss271tss404e7fq94a\#ab1_firmwaress043dss343b_firmwaress386bss230p_firmwaress204c_firmwaress076ess383s_firmwaress404a_firmwaress342g_firmwaress365l_firmware7fq99a\#ab1ss256ass278a_firmwaress058jss353a_firmwaress353bss027g_firmwaress049k_firmwaress150a_firmwaress339gss265ass281b_firmwaress254dss075f_firmwaress256g_firmwaress041c_firmwaress383l_firmwaress107f_firmwaress105d_firmware4zb89a_firmwaress262ass331a_firmware3b0c0a\#301ss388k_firmwaress204bss058j_firmwaress107ast690bss153l_firmwarest694b_firmwaress383kss389s_firmware7gf47a\#ab1_firmwaress106zss271g_firmwaress378hss330c_firmwaress058fss276c_firmwaress359g_firmwaress258a_firmware8pa13a\#302_firmwarest686ass150h_firmwaress383bss267bss218ess106c_firmwaress218fss152bss377lss383qss076f_firmwaress397ass107g_firmwaress043kss033kss276b_firmwaress049e_firmwaress339g_firmwaress279a_firmwaress342fst686gss272f7fr03a\#ab1ss377nss396e_firmwarest683b_firmwaress033k_firmware7gf52a\#ab1_firmwaress359mss281a_firmwaress104a_firmwaress271dss395nss076mss391css275b_firmwaress342bss379a_firmwaress218a_firmwaress344a7fr04a\#ab1_firmwaress333a_firmwaress281css076t_firmwaress150n_firmwaress151bss330bss344b3b0c8a\#ab1_firmwaress352lss106f_firmware7zb25asv899c_firmwaress059bss059fss234a_firmwaress391ass348b_firmwaress348c_firmware6hu11a_firmwaress377j_firmwaress356ass027a_firmware7gf53a\#ab14zb79a_firmwaress256css395jss352f_firmwaress232a_firmware4zb90ass210n_firmware2zn49ass256jss049ess404pss049css383e_firmwarest688gss396bw7u01a_firmwaress368g_firmwaress257h_firmwaress272qss106nss230css027j_firmwaress329a_firmwaress044mss271k_firmwaress256q7gf50a\#ab1_firmwaress237bss342gss216g_firmwaress205d_firmwaress049lss254fss213e_firmwaress033mss397j_firmwaress349fss396h_firmwaress049a7zb21a_firmwaress205m_firmwaress107fss359c7fq97a\#ab1ss397h4zb95a_firmwaress359l_firmwaress335g_firmwaress044ass210d_firmwaress395bss044m_firmwaress377k_firmwaress106bss391bss339b_firmwaress322bss387ass271h_firmwaress386ass213hss076g_firmware8af49a_firmwaress404ast693a_firmwaress049jss352bst688hss042c_firmwaress043f_firmwaress336bss196h_firmwarest694d_firmwaress271e_firmwaress075k_firmwaress219b_firmwaress257ess205c_firmwaress272s_firmware7fq90a\#ab1ss261a_firmwaress108l_firmwaress352h4zb91ass075hss367ass271fss268bss263ass210f_firmwaress219fss398a_firmware8pa12a\#302ss380bss352b_firmwaress105jss286a_firmwaress389kss383gst695dss396ess027e3a9x8a\#ab1ss076m_firmwaress353b_firmwaress213c_firmwaress256mss042jss395sss365f_firmwaress210n7fq98a\#ab1_firmwaress349ess383hss381ass326d_firmwaress198ass267a_firmware7fr03a\#ab1_firmwaress218c_firmwaress272u_firmwaresw176ass230t_firmwaress049fss386e_firmwaress216l_firmwaress230j_firmwaress391e_firmwaress151a_firmware3b0c7a\#301_firmwaress389u7fq96a\#ab1_firmwaress257mss058dss393c_firmwarest686hss076vss256k_firmwarest679hss107dss390ass352a_firmwaress230nst686e_firmware8af52ass230z_firmwaress205fss388a_firmwaress041b_firmwaress211e_firmwaress150fss389n_firmwaress257p_firmwaress205qss404m_firmwaress383t_firmwaress359jss106p_firmwaress153ass343kss366ass342c_firmwaress218f_firmwaress396fss397p_firmwaress043h714z9ass352kss389t7fq86a\#ab1ss076h_firmwaress271d_firmwaress326bss392a_firmwaress396b_firmwaress230mst684ass335ass359gss268ass339f_firmwaress257q_firmwaress398fss283a_firmwaress404lss391fss378c\#304_firmwaress386a_firmwaress105j_firmwaress395n_firmwaress389g_firmwarest688dss211m_firmwaress383j_firmwaress352e_firmwaress339bss390d_firmwaress378b_firmwaress254g_firmware7gf54a\#ab1ss396g_firmwaress211ess367a_firmware7fr05a\#ab1_firmwaress395p_firmwaress027css277a_firmwaress353css328ass043a_firmwaress397pss284b_firmwaress150m4zb86ass332ass102ass389m_firmwaress204ass033ass108hss059b_firmwaress254a_firmwaress196hss326ass106m_firmwaress258ass280a_firmwaress359c_firmwaress359bss369c4zb84a_firmwaress387bss049d_firmwaress230n_firmwaress213d8af49a4zb90a_firmwaress336b_firmwaress353jss263bss272css379bst679f_firmwaress257d_firmware714z6a_firmwaress041g_firmwaress256c_firmwaress027dss396dst679fss367d_firmware4zb82ass042f_firmwaress219bss107bsw116b_firmware7gf52a\#ab1ss204m7zb72ass388ess044l_firmware7gf49a\#ab1ss216s_firmware3a9x2a\#301_firmwaresw176c_firmwaress365e_firmwaress330b_firmwaress150kss368fss340bss326c_firmwarest683c_firmwaress395ess229ass383jss106qss386f_firmwaress352a3a9x7a\#ab1_firmwaress059f_firmwaress377d_firmwarest688d_firmwaress342dss044kss150jss216n_firmwaress404fss386dss383mss233a_firmwarest688ass397g_firmwaress389p_firmwaress049kss076n_firmwaress395tss216bss153ess196b_firmwaress271b_firmwaress397mss076c_firmwaress384d_firmwaress150l_firmwaress340d_firmwaress334ass334b_firmwaress150nss076wss389j_firmwaress195bss330a_firmwaress365ess257n_firmwaress107lss334fss213f_firmwaress033c4zb83a_firmwaress059a7zb21a4zb94a_firmwaress058bsv901bss059jss263a_firmwarest695bss230lss349dss359nss044n_firmwaress106kss235ass323a_firmwaress107nss106a_firmwaress343dss271l_firmwaress216css153c_firmwaress041e_firmwaress369b_firmwarest679gss397jss383d_firmwaress288a_firmwaress391f_firmwaress380css106dss327bss049h_firmwaress106h_firmwaress322a7fq91a\#ab1_firmwaress272kss027e_firmwaress105f_firmware4zb94ass397d_firmwaress075h_firmwarest679dss216z7fq95a\#ab1ss237b_firmwaress389ass150d_firmwaress337a_firmwaress352f4zb81a_firmwaress398d_firmwaress271css230a4zb82a_firmwaress154bst690a_firmware7zb19a_firmwaress383v_firmwaress151b_firmwaress033d_firmwaress404f_firmwaress271a_firmwaress257k_firmwaress204psw192ast688f_firmwaress367e_firmwaress340a_firmwaress354a_firmwaress389t_firmwaress211ass384est673b_firmwaress152ass339d_firmwaress043ass204e_firmwaress383c7fr01a\#ab1ss219dss388h_firmwaress106q_firmwaress272lss377dss383pss377l_firmwaress033c_firmwaress343gss268b_firmwaress213ass229d_firmwaress392b_firmwaress365m_firmwarest695a_firmwaress196c4zb81ass211pst685ass322b_firmwaress273ass368e_firmwaress271hst693c_firmware4zb93a_firmwaress213css044f_firmwaress219d_firmwaress397l_firmwaress383ew7u02ass282a_firmwaress216fss075f6hu10a_firmwaress042e_firmwaress049l_firmwaress205g_firmwaress397fss256sss210gss397f_firmware8pa14a\#302_firmwaress027c_firmware4zb91a_firmwaress368f_firmwaress352pss216mss343jss390h_firmwaress404d_firmwaress284ass335b_firmwaress230bss059j_firmwaress271gss230h7gf51a\#ab1_firmware3b0c7a\#301ss150sss205sss365a_firmwaress353kss326b_firmwaress256b_firmwaress230fss377a_firmwaress059gss216pss199a_firmwarest673c_firmware2zn50ass213bss271f_firmwarest682bss153e_firmwaress044nss076gss367f_firmwaress027b_firmware7fr02a\#ab1ss377css204k_firmwaress205q_firmwaress353gss204nss257css383c_firmwaress359pss386c_firmwaress105ass076zss389vss256fst690b_firmwaress260ass271n_firmwaress343ass205bss033e_firmwaress393b_firmwaress272k_firmwaress378css404nss396a_firmwaresw112b_firmwaress368b_firmwaress383k_firmwarest673css389qss349e_firmware7gf49a\#ab1_firmwaress216u715a0ast688b_firmwaress377c_firmwaress349bss367b_firmwaress075e_firmwaress342f_firmwaress352dss328bss388bss213b_firmwaress334cst687a_firmwaress076z_firmwaress377b_firmwaress150ess331b_firmwaress353k_firmwaress210lss075gss390css395gss339ass395css272ess271sss042j_firmwaress385a_firmwaress256dss043bss389fss041h_firmwaress211p_firmwaress386ess033n3b0d3a\#301_firmwaress196c_firmwaress398g_firmwaress367bss255bss287ass049a_firmwaress263b_firmwaress388g_firmwarest673bss324ass271j_firmwaress044a_firmwaress367c_firmwaress044h_firmwaress153jss404mss272ass211g_firmwaress383fss230tss397k_firmwaress149ass389l_firmwaress229jss378h_firmware5ue14a_firmwarest685a_firmwarest686a_firmwarest694c_firmware7zb20ass349a_firmwaress205jss108fss359p_firmwaress108c_firmwaress353ess256q_firmwaress352jss106pss205mss107l_firmwarest683ess204j_firmwaress286ass396f_firmwaress384e_firmwaress271t_firmwaress359a3a9x7a\#ab1ss365ass393css257f_firmwaress042e715a5ass256h3a9x4a\#ab1_firmwaress389jss257l7gf48a\#ab1ss254ass260a_firmwaress027hst688ess365d7ab26ass217a_firmwaress272t_firmwaress153lss352c4zb87ass058c_firmwaress043fss339cst690dst686bss383sss256s_firmwaress204b_firmwaress272dss256pss395j_firmwaress219c_firmwaress359m_firmwaress105c_firmwaress398gss231ass107d_firmwaress377m_firmwaress033dss205a_firmware7fq87a\#ab1_firmwaress282c_firmwaress033m_firmwaress282ass281c_firmwarest673d_firmwaress108kss377ess107a_firmwaress395f_firmwaress043jss367dst682c_firmwaress229bss153fss105a_firmwaress395f7fq93a\#ab1_firmwaress335hss216z_firmwaress108lss338a_firmwaress271s_firmwaress107gss334e_firmwaress398bss378k4zb88ass204p_firmwaress205u_firmwaress272ust694bss381a_firmwaress049gss277b_firmwaress256t_firmwaress107hss153h_firmwaress350a_firmwaress272tss388ass391d_firmwaress388d_firmwaress043g_firmwaress390e_firmwaress397gss229g_firmwaress049b_firmware7fq96a\#ab1ss204hst679bst684b_firmwaress196gss076p_firmwaress213fss404c_firmwaress204gss210k4zb84ast679c_firmwaress368j_firmwaress393ass397nss196ass044g_firmware715a4ass150pss348bss041bss388h6hu09ass211n_firmwaress397n_firmwaress392c_firmwaress153g_firmware7fr05a\#ab1ss215ass276css044lss322a_firmwaress389f_firmwaress154b_firmwaress218g_firmwaress389nst679css331bss041gss106z_firmware1vr14ass352p_firmwaress383w_firmwaress389c_firmwarest690ass377f_firmwaress205e8af52a_firmware2ky38a_firmwarest683ass196e4zb80a_firmwarest684bss216t_firmwaress211f715a2ass378ess384css383dss043l7zb19ass033n_firmwaress044g7fq95a\#ab1_firmwaress196d_firmwaress397e_firmwaress396gss365kst686c_firmwaress230k3b0c1a\#304_firmwaress216tss322c_firmwaress272h_firmwaress027bss153d714z7ass380c_firmwaress152c_firmware4zb80ass272pss108g_firmware714z8ass272sss255css395t_firmwaress348ass108bsw112bss272z_firmwaress106l_firmwaress389sss404bss272j_firmwaress368jss389ess257gss367ess272g_firmwaress153a_firmwaress274b_firmwaress343hss404n_firmwaress256zss395a4zb86a_firmwaress343ess378j_firmwaress396ass398ass344a_firmwaress390gss352c_firmwaress359a_firmwaress103ass257pss041css204css378jss342e_firmwaress229b_firmware714z6ass388dss335css267ass340b_firmwaress284bss343bst694css256bsw176css204fss150e_firmwaress205z_firmwaress042gss205n_firmwaress351a_firmwaress204g_firmwaress343d_firmwaress152dss343h_firmwaress033f_firmwaress349d_firmwaress390a_firmwaress349b_firmwaress216dss230dss378g_firmwaress218k_firmware209u7a_firmwaress377n_firmwaress076a_firmwaress210l_firmwaress229dss377p_firmwaress404p_firmwaress377hss352d_firmwaress106t_firmwaress397qss230jss150hss230qss327b_firmwaress108e_firmwaress231a_firmwaress216ew7u01ass043k_firmwaress342b_firmwaress272m5ue15a_firmwaress322css328b_firmwarest683e_firmwaress377mss257hss254b_firmwaress196e_firmwaress389css153k_firmwaress150m_firmwaress216e_firmwaress388c_firmwaress205g2ky38ass210a_firmwaress150s_firmwaress389bss107e_firmwaress377ass365hss359j_firmware714z7a_firmwaress342ass259a_firmwaress153j_firmware7fq89a\#ab1ss335c_firmwaress205ass266a_firmwaress378c_firmwarest683a_firmware4zb92a_firmwarest695d_firmwaress397c_firmwaress275ass397ess049j_firmwaress395k_firmware3b0c9a\#304ss204a_firmwaress368gss041j_firmwaress044hss049g_firmwaress367fss397h_firmware5ue14ass212ass049hss107ess218kss392bss378k_firmwaress334b7fr01a\#ab1_firmwaress257z_firmwaress337ass230e_firmware4zb97ass076nss210ess394ass271ess205d7fr02a\#ab1_firmware9vv52ass282bss216vss274bss404j_firmware5ue15ass327d_firmwaress390b_firmwaress033gss205tss343f_firmwaress150g_firmwaress106ass075ess384c_firmwaress277bss210fss044dst683css211dsw176b_firmwaress216ass366a_firmwarest686f_firmwaress267b_firmwaress343k_firmwaress210bss395q_firmwaress041ass042h_firmwaress335h_firmwaress107m_firmwaress108ess058e_firmwarest679g_firmwaress378f_firmwaress108dss256ess210b_firmware7gf47a\#ab1715a4a_firmwaress264ass257f3b0c3a\#ab1ss359k_firmwarest693ass049mss210h_firmwaress033est686dss271qss059dss368bss213d_firmwaress343j_firmwaress230sss285ass205b_firmwaress042hss216c_firmwaress218d_firmwaress383b_firmwaress355a_firmwarest686g_firmwaress058d_firmwarest693css357ass257ass059css107kst679ess359qss205e_firmwarest688fss383ass397m_firmwaress331ass390f_firmwaress352s_firmwaress076x_firmwaress387b_firmwaress106s_firmwaress218dss211css075a7gf55a\#ab1ss352j_firmwaress230l_firmwaress378bss386b_firmwaress219ess271mss382ass383lss043c8pa10a\#301_firmwaress365h_firmwaress273a_firmwaress369c_firmwaress390g_firmwaress287bss033b_firmwaress389d_firmwarest688j_firmwaress153hss215a_firmwaress107q_firmwaress075c_firmwaress389k_firmwaress211a_firmwaress205pss378ass359d_firmwaress326a_firmwaress256gss216h_firmwaress257b_firmwaress275css107c7zb25a_firmwaress105bst686ess390c_firmwaress272p_firmwaress397dss076f4zb97a_firmwaress033hss352nss352qss105fss105css196b8pa11a\#301ss041dss368dst679e_firmwaress205j_firmwaress254gss384b6hu12ass107jss210hss043h_firmwaress391a_firmwaress043ess389a_firmwaress204l_firmwaress237ass395b_firmwaress383m_firmwaress044c_firmwareHP and Samsung Printer software
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-28098
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 13.43%
||
7 Day CHG~0.00%
Published-14 Apr, 2021 | 14:56
Updated-03 Aug, 2024 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Forescout CounterACT before 8.1.4. A local privilege escalation vulnerability is present in the logging function. SecureConnector runs with administrative privileges and writes logs entries to a file in %PROGRAMDATA%\ForeScout SecureConnector\ that has full permissions for the Everyone group. Using a symbolic link allows an attacker to point the log file to a privileged location such as %WINDIR%\System32. The resulting log file adopts the file permissions of the source of the symbolic link (in this case, the Everyone group). The log file in System32 can be replaced and renamed with a malicious DLL for DLL hijacking.

Action-Not Available
Vendor-n/aForescout Technologies, Inc.
Product-counteractn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-427
Uncontrolled Search Path Element
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2025-2630
Matching Score-4
Assigner-National Instruments
ShareView Details
Matching Score-4
Assigner-National Instruments
CVSS Score-7||HIGH
EPSS-0.03% / 6.54%
||
7 Day CHG~0.00%
Published-09 Apr, 2025 | 18:50
Updated-18 Aug, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL Hijacking Vulnerability in NI LabVIEW

There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.

Action-Not Available
Vendor-niNI
Product-labviewLabVIEW
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-28595
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-5.69% / 90.05%
||
7 Day CHG~0.00%
Published-20 Aug, 2021 | 18:09
Updated-23 Apr, 2025 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe Dimension Uncontrolled Search Path Element Could Lead To Remote Code Execution

Adobe Dimension version 3.4 (and earlier) is affected by an Uncontrolled Search Path Element element. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.Apple Inc.Microsoft Corporation
Product-windowsdimensionmacosDimension
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-2629
Matching Score-4
Assigner-National Instruments
ShareView Details
Matching Score-4
Assigner-National Instruments
CVSS Score-7||HIGH
EPSS-0.03% / 6.54%
||
7 Day CHG~0.00%
Published-09 Apr, 2025 | 18:45
Updated-18 Aug, 2025 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL Hijacking Vulnerability in NI LabVIEW When Loading NI Error Reporting

There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.

Action-Not Available
Vendor-niNI
Product-labviewLabVIEW
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-39613
Matching Score-4
Assigner-Mattermost, Inc.
ShareView Details
Matching Score-4
Assigner-Mattermost, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 24.47%
||
7 Day CHG~0.00%
Published-16 Sep, 2024 | 06:40
Updated-20 Sep, 2024 | 13:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RCE in desktop app in Windows by local attacker

Mattermost Desktop App versions <=5.8.0 fail to specify an absolute path when searching the cmd.exe file, which allows a local attacker who is able to put an cmd.exe file in the Downloads folder of a user's machine to cause remote code execution on that machine.

Action-Not Available
Vendor-Mattermost, Inc.
Product-mattermost_desktopMattermost
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-28594
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-5.69% / 90.05%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 18:18
Updated-17 Sep, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Creative Cloud Desktop installer Uncontrolled Search Path element could lead to arbitrary code execution

Adobe Creative Cloud Desktop Application (installer) version 2.4 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.
Product-creative_cloud_desktop_applicationPrelude
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-31637
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.28% / 50.79%
||
7 Day CHG~0.00%
Published-16 Mar, 2023 | 00:00
Updated-26 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue found in UwAmp v.1.1, 1.2, 1.3, 2.0, 2.1, 2.2, 2.2.1, 3.0.0, 3.0.1, 3.0.2 allows a remote attacker to execute arbitrary code via a crafted DLL.

Action-Not Available
Vendor-uwamp_projectn/a
Product-uwampn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-32580
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.65%
||
7 Day CHG~0.00%
Published-05 Aug, 2021 | 19:06
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.

Action-Not Available
Vendor-n/aAcronis (Acronis International GmbH)
Product-true_imagen/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-31847
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-8.2||HIGH
EPSS-0.03% / 8.00%
||
7 Day CHG~0.00%
Published-22 Sep, 2021 | 13:25
Updated-03 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper privilege management in repair process of MA for Windows

Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature.

Action-Not Available
Vendor-McAfee, LLC
Product-agentMcAfee Agent for Windows
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-24998
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.3||HIGH
EPSS-0.24% / 47.23%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 16:59
Updated-01 Jul, 2025 | 19:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visual Studio Elevation of Privilege Vulnerability

Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_2022visual_studio_2017visual_studio_2019Microsoft Visual Studio 2022 version 17.8Microsoft Visual Studio 2022 version 17.12Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)Microsoft Visual Studio 2022 version 17.10Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)Microsoft Visual Studio 2022 version 17.13
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-32592
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.82%
||
7 Day CHG~0.00%
Published-01 Dec, 2021 | 11:27
Updated-25 Oct, 2024 | 13:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientforticlient_enterprise_management_serverFortinet FortiClientWindows, FortiClientEMS
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-25003
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.3||HIGH
EPSS-0.24% / 47.23%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 16:59
Updated-01 Jul, 2025 | 19:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visual Studio Elevation of Privilege Vulnerability

Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_2022visual_studio_2019Microsoft Visual Studio 2022 version 17.8Microsoft Visual Studio 2022 version 17.12Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)Microsoft Visual Studio 2022 version 17.10Microsoft Visual Studio 2022 version 17.13
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-28636
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.3||HIGH
EPSS-1.29% / 78.85%
||
7 Day CHG~0.00%
Published-20 Aug, 2021 | 18:09
Updated-16 Sep, 2024 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe Acrobat Reader Unquoted Search Path Vulnerability

Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. An attacker with access to the victim's C:/ folder could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.
Product-acrobat_dcacrobat_reader_dcAcrobat Reader
CWE ID-CWE-427
Uncontrolled Search Path Element
  • Previous
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • 8
  • Next
Details not found