Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-23401

Summary
Assigner-jpcert
Assigner Org ID-ede6fdc4-6654-4307-a26d-3331c018e2ce
Published At-11 Mar, 2022 | 09:10
Updated At-03 Aug, 2024 | 03:43
Rejected At-
Credits

The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:jpcert
Assigner Org ID:ede6fdc4-6654-4307-a26d-3331c018e2ce
Published At:11 Mar, 2022 | 09:10
Updated At:03 Aug, 2024 | 03:43
Rejected At:
â–¼CVE Numbering Authority (CNA)

The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Affected Products
Vendor
Yokogawa Electric Corporation
Product
CENTUM CS 3000
Versions
Affected
  • versions from R3.08.10 to R3.09.00
Vendor
Yokogawa Electric Corporation
Product
CENTUM VP
Versions
Affected
  • versions from R4.01.00 to R4.03.00
  • versions from R5.01.00 to R5.04.20
  • versions from R6.01.00 to R6.08.00
Vendor
Yokogawa Electric Corporation
Product
Exaopc
Versions
Affected
  • versions from R3.72.00 to R3.79.00
Problem Types
TypeCWE IDDescription
CWECWE-427CWE-427: Uncontrolled Search Path Element
Type: CWE
CWE ID: CWE-427
Description: CWE-427: Uncontrolled Search Path Element
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
x_refsource_CONFIRM
Hyperlink: https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Resource:
x_refsource_CONFIRM
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
x_refsource_CONFIRM
x_transferred
Hyperlink: https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:vultures@jpcert.or.jp
Published At:11 Mar, 2022 | 09:15
Updated At:18 Mar, 2022 | 14:57

The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.03.7LOW
AV:L/AC:H/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 3.7
Base severity: LOW
Vector:
AV:L/AC:H/Au:N/C:P/I:P/A:P
CPE Matches

yokogawa
yokogawa
>>centum_cs_3000_firmware>>Versions from r3.08.10(inclusive) to r3.09.00(inclusive)
cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_cs_3000>>-
cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_cs_3000_entry_firmware>>Versions from r3.08.10(inclusive) to r3.09.00(inclusive)
cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_cs_3000_entry>>-
cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_vp_firmware>>Versions from r4.01.00(inclusive) to r4.03.00(inclusive)
cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_vp_firmware>>Versions from r5.01.00(inclusive) to r5.04.20(inclusive)
cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_vp_firmware>>Versions from r6.01.00(inclusive) to r6.09.00(exclusive)
cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_vp>>-
cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_vp_entry_firmware>>Versions from r4.01.00(inclusive) to r4.03.00(inclusive)
cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_vp_entry_firmware>>Versions from r5.01.00(inclusive) to r5.04.20(inclusive)
cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_vp_entry_firmware>>Versions from r6.01.00(inclusive) to r6.09.00(exclusive)
cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*
yokogawa
yokogawa
>>centum_vp_entry>>-
cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*
yokogawa
yokogawa
>>exaopc>>Versions from r3.72.00(inclusive) to r3.80.00(exclusive)
cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-427Primarynvd@nist.gov
CWE-427Secondaryvultures@jpcert.or.jp
CWE ID: CWE-427
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-427
Type: Secondary
Source: vultures@jpcert.or.jp
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdfvultures@jpcert.or.jp
Vendor Advisory
Hyperlink: https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Source: vultures@jpcert.or.jp
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

274Records found

CVE-2019-20769
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.81%
||
7 Day CHG~0.00%
Published-17 Apr, 2020 | 13:32
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in LG PC Suite for LG G3 and earlier (aka LG PC Suite v5.3.27 and earlier). DLL Hijacking can occur via a Trojan horse DLL in the current working directory. The LG ID is LVE-MOT-190001 (November 2019).

Action-Not Available
Vendor-n/aLG Electronics Inc.
Product-pc_suiteg3n/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20400
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.36%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 03:10
Updated-16 Sep, 2024 | 22:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The usage of Tomcat in Jira before version 8.5.2 allows local attackers with permission to write a dll file to a directory in the global path environmental variable can inject code into via a DLL hijacking vulnerability.

Action-Not Available
Vendor-Atlassian
Product-jira_serverJira Server
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20419
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.73%
||
7 Day CHG-0.04%
Published-03 Jul, 2020 | 01:20
Updated-17 Sep, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to execute arbitrary code via a DLL hijacking vulnerability in Tomcat. The affected versions are before version 8.5.5, and from version 8.6.0 before 8.7.2.

Action-Not Available
Vendor-Atlassian
Product-jira_serverjira_data_centerJira Server
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20358
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-3.62% / 87.90%
||
7 Day CHG~0.00%
Published-30 Jan, 2020 | 21:10
Updated-05 Aug, 2024 | 02:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed. Another attack vector similar to CVE-2019-9491 was idenitfied and resolved in version 1.62.0.1228 of the tool.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowsanti-threat_toolkitTrend Micro Anti-Threat Toolkit (ATTK)
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-427
Uncontrolled Search Path Element
CWE ID-CWE-426
Untrusted Search Path
CVE-2022-48077
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.09%
||
7 Day CHG~0.00%
Published-13 Feb, 2023 | 00:00
Updated-24 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Genymotion Desktop v3.3.2 was discovered to contain a DLL hijacking vulnerability that allows attackers to escalate privileges and execute arbitrary code via a crafted DLL.

Action-Not Available
Vendor-genymotionn/a
Product-genymotion_desktopn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-17665
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.50%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 19:41
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NSA Ghidra before 9.0.2 is vulnerable to DLL hijacking because it loads jansi.dll from the current working directory.

Action-Not Available
Vendor-nsan/a
Product-ghidran/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-48422
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 31.88%
||
7 Day CHG~0.00%
Published-19 Mar, 2023 | 00:00
Updated-27 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ONLYOFFICE Docs through 7.3 on certain Linux distributions allows local users to gain privileges via a Trojan horse libgcc_s.so.1 in the current working directory, which may be any directory in which an ONLYOFFICE document is located.

Action-Not Available
Vendor-onlyofficen/aLinux Kernel Organization, Inc
Product-linux_kerneldocument_servern/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-17093
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.08%
||
7 Day CHG~0.00%
Published-23 Oct, 2019 | 16:59
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0.

Action-Not Available
Vendor-avgavastn/a
Product-anti-virusantivirusn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-53000
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.61%
||
7 Day CHG~0.00%
Published-17 Dec, 2025 | 20:27
Updated-18 Feb, 2026 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
nbconvert has an uncontrolled search path that leads to unauthorized code execution on Windows

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. This issue has been patched in version 7.17.0.

Action-Not Available
Vendor-jupyterjupyterMicrosoft Corporation
Product-nbconvertwindowsnbconvert
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2013-0725
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.03%
||
7 Day CHG~0.00%
Published-30 Jan, 2020 | 13:03
Updated-06 Aug, 2024 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ERDAS ER Viewer 13.0 has dwmapi.dll and irml.dll libraries arbitrary code execution vulnerabilities

Action-Not Available
Vendor-hexagongeospatialERDAS
Product-erdas_er_viewerER Viewer
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-43553
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.75%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 20:24
Updated-19 May, 2025 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Substance3D - Modeler | Uncontrolled Search Path Element (CWE-427)

Substance3D - Modeler versions 1.21.0 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. If the application relies on a search path to locate critical resources such as libraries or executables, an attacker could manipulate the search path to load a malicious resource, potentially executing arbitrary code. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.
Product-substance_3d_modelerSubstance3D - Modeler
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-46330
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.20% / 41.21%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-16 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Squirrel.Windows is both a toolset and a library that provides installation and update functionality for Windows desktop applications. Installers generated by Squirrel.Windows 2.0.1 and earlier contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with the privilege of the user invoking the installer.

Action-Not Available
Vendor-squirrel.windows_projectSquirrel
Product-squirrel.windowsInstallers generated by Squirrel.Windows
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-43722
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.40%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected software does not properly secure a folder containing library files. This could allow an attacker to place a custom malicious DLL in this folder which is then run with SYSTEM rights when a service is started that requires this DLL. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions.

Action-Not Available
Vendor-Siemens AG
Product-sicam_pas\/pqsSICAM PAS/PQS
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-35471
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-7||HIGH
EPSS-0.05% / 16.09%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 01:13
Updated-23 Sep, 2025 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
conda-forge openssl-feedstock writable OPENSSLDIR

conda-forge openssl-feedstock before 066e83c (2024-05-20), on Microsoft Windows, configures OpenSSL to use an OPENSSLDIR file path that can be written to by non-privilged local users. By writing a specially crafted openssl.cnf file in OPENSSLDIR, a non-privileged local user can execute arbitrary code with the privileges of the user or process loading openssl-feedstock DLLs. Miniforge before 24.5.0 is also affected.

Action-Not Available
Vendor-conda-forgeconda-forgeMicrosoft Corporation
Product-openssl-feedstockminiforgewindowsminiforgeopenssl-feedstock
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-36376
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.46%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 12:27
Updated-04 Aug, 2024 | 00:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dandavison delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory.

Action-Not Available
Vendor-delta_projectn/aMicrosoft Corporation
Product-windowsdeltan/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-38395
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.08%
||
7 Day CHG~0.00%
Published-18 Nov, 2022 | 20:52
Updated-29 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Support Assistant uses HP Performance Tune-up as a diagnostic tool. HP Support Assistant uses Fusion to launch HP Performance Tune-up. It is possible for an attacker to exploit the DLL hijacking vulnerability and elevate privileges when Fusion launches the HP Performance Tune-up.

Action-Not Available
Vendor-HP Inc.
Product-fusionsupport_assistantHP Support Assistant
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-30033
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.44%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:16
Updated-10 Mar, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component.

Action-Not Available
Vendor-Siemens AG
Product-Siemens Network Planner (SINETPLAN)SIMATIC PCS 7 Advanced Process Functions V2.1SIMATIC Process Historian 2022SIMIT Simulation PlatformSIMATIC WinCC V8.1SIMATIC STEP 7 CFC V20SIMATIC PCS 7 Industry Library V10.0TIA Portal Cloud ConnectorSIMATIC Logon V1.6SINEMA Remote Connect ClientSIMATIC PDM V9.2Standard PID CTRL ToolSIMATIC WinCC Runtime Professional V20SIMIT Rapid TesterCreate MyConfig (CMC)SINAMICS Startdrive V19SIMATIC PCS 7 Advanced Process Graphics V10.0SINAMICS Startdrive V20SIMATIC Automation Tool SDK WindowsSIMATIC MTP Integrator V1.xSIMATIC STEP 7 V5.7CEMAT V10.0SIMATIC WinCC Unified SequenceOpenPCS 7 V10.0SIMATIC eaSie Core PackageTIA Project-ServerSIMATIC MTP CREATOR V2.xSIMATIC S7-Fail-safe Configuration Tool (S7-FCT)SIMATIC Automation ToolSIMATIC S7 F Systems V6.3SIMATIC WinCC Runtime ProfessionalTotally Integrated Automation Portal (TIA Portal) V19SIMATIC MTP Integrator V2.xWinCC Panel Image SetupSIMATIC ProSave V17SIMATIC WinCC Visualization Architect (SiVArc) V17SIMATIC PCS neo V5.0SIMATIC S7-1500 Software Controller V3SIMATIC Route Control V9.1SIMATIC ProSave V18SIMATIC NET PC Software V20Modular PID CTRL ToolSIMATIC Energy Suite V18SIMATIC D7-SYSSIMATIC PCS 7 Industry Library V9.0SIMATIC NET PC Software V19SIMATIC Process Function Library (PFL) V4.0SINAMICS Startdrive V18MultiFieldbus Configuration Tool (MFCT)FM Configuration PackageSIMATIC Logon V2.0SIMATIC eaSie Workflow SkillsSIMATIC S7-PLCSIM V20CP PtP Param configuring interfaceSIMATIC NET PC Software V17SIMATIC PCS 7 PowerControlSIMATIC MTP CREATOR V4.xSIMATIC BATCH V10.0SIMATIC PCS 7 V10.0SIMATIC eaSie Document SkillsSIMATIC WinCC Visualization Architect (SiVArc) V19Automation License Manager V6.0SIMATIC ProSave V20SIMATIC PCS 7 Advanced Process Faceplates V9.1SIMATIC Process Historian 2020SIMATIC Energy Suite V19SIMATIC PCS 7 Logic Matrix V10.0SIMATIC PCS neo V6.0SIMATIC S7-PLCSIM V17SIMATIC S7 F Systems V6.4SIMATIC S7-PLCSIM AdvancedTotally Integrated Automation Portal (TIA Portal) V17SIMATIC MTP CREATOR V5.xSIMATIC WinCC Runtime AdvancedSIMATIC S7-PLCSIM V18SIMATIC ProSave V19SIMATIC Energy Suite V17SIMATIC MTP CREATOR V3.xEnergy Support Library (EnSL)SIMATIC PCS 7 Standard Chemical Library V10.0SITRANSSIMATIC Management AgentSIMATIC PCS 7 Advanced Process Functions V2.2SIMATIC ODK 1500SSIMATIC WinCC Unified PC Runtime V19SIMATIC BATCH V9.1TIA Portal Test Suite V19SIMATIC PCS 7 MPC ConfiguratorSIMATIC STEP 7 CFC V19OpenPCS 7 V9.1SIMATIC PCS 7 Basis Faceplates V9.1SIMATIC WinCC V8.0TIA AdministratorAutomation License Manager V6.2SIMATIC S7-1500 Software Controller V2SIMATIC Control Function Library (CFL) V1.xSIMATIC PDM Maintenance Station V5.0SIMATIC WinCC Unified Line CoordinationSIMATIC PCS 7 Basis Library V9.1SIMATIC Control Function Library (CFL) V2.xSIMATIC WinCC V7.5SIMATIC PCS 7 Advanced Process Library incl. Faceplates V10.0SIMATIC PCS 7 Standard Chemical Library V9.1SIMATIC WinCC flexible ESSIMATIC Route Control V10.0SIMATIC WinCC Visualization Architect (SiVArc) V18TIA Portal Test Suite V20SIMATIC S7-PLCSIM V19SIMATIC NET PC Software V18SINAMICS Startdrive V17Totally Integrated Automation Portal (TIA Portal) V18SIMATIC Safety MatrixTIA Project-Server V17SIMATIC WinCC Unified PC Runtime V20Totally Integrated Automation Portal (TIA Portal) V20SIMATIC WinCC TeleControlSINEC NMSSIMATIC PCS 7/OPEN OS V9.1SIMATIC Process Historian 2024TIA Portal Test Suite V18SIMATIC WinCC Visualization Architect (SiVArc) V20SIMATIC PDM V9.3SIMATIC PCS 7 Basis Library V10.0SIMATIC WinCC Unified PC Runtime V18SIMATIC Control Function Library (CFL) V4.xSIMATIC PCS 7 Logic Matrix V9.1SIMATIC PCS 7 TeleControlSIMATIC PCS 7 V9.1SIMATIC TargetSIMATIC Management ConsoleSIMATIC S7-PCTSIMATIC NET PC Software V16TIA Portal Test Suite V17SIMATIC PCS 7 Advanced Process Library V9.1TeleControl Server Basic V3.1SIMATIC eaSie PCS 7 Skill PackageSIMATIC Control Function Library (CFL) V3.xSIMATIC PCS 7 Advanced Process Graphics V9.1SIMATIC PCS 7 Industry Library V9.1
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-36840
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4.5||MEDIUM
EPSS-0.06% / 18.70%
||
7 Day CHG~0.00%
Published-05 Aug, 2022 | 15:18
Updated-03 Aug, 2024 | 10:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL hijacking vulnerability in Samsung Update Setup prior to version 2.2.9.50 allows attackers to execute arbitrary code.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-updateSamsung Update Setup
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-34101
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.36%
||
7 Day CHG~0.00%
Published-13 Sep, 2022 | 21:47
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can place a malicious DLL in a certain path to execute code and preform a privilege escalation attack.

Action-Not Available
Vendor-n/aCrestron Electronics, Inc.
Product-airmedian/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-2630
Matching Score-4
Assigner-National Instruments
ShareView Details
Matching Score-4
Assigner-National Instruments
CVSS Score-7||HIGH
EPSS-0.06% / 18.15%
||
7 Day CHG~0.00%
Published-09 Apr, 2025 | 18:50
Updated-18 Aug, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL Hijacking Vulnerability in NI LabVIEW

There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.

Action-Not Available
Vendor-niNI
Product-labviewLabVIEW
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-18215
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.98%
||
7 Day CHG~0.00%
Published-18 Nov, 2019 | 20:00
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.

Action-Not Available
Vendor-comodon/a
Product-comodo_internet_securityn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-30744
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.2||MEDIUM
EPSS-0.06% / 18.69%
||
7 Day CHG~0.00%
Published-07 Jun, 2022 | 18:19
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL hijacking vulnerability in KiesWrapper in Samsung Kies prior to version 2.6.4.22043_1 allows attacker to execute arbitrary code.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-kiesSamsung Kies
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-23853
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.48%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 00:00
Updated-03 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.

Action-Not Available
Vendor-n/aKDE
Product-ktexteditorkaten/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-10215
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7||HIGH
EPSS-0.01% / 2.65%
||
7 Day CHG~0.00%
Published-10 Sep, 2025 | 11:39
Updated-20 Jan, 2026 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL search path hijacking vulnerability

DLL search path hijacking vulnerability in the UPDF.exe executable for Windows version 1.8.5.0 allows attackers with local access to execute arbitrary code by placing a FREngine.dll file of their choice in the 'C:\Users\Public\AppData\Local\UPDF\FREngine\Bin64\' directory, which could lead to arbitrary code execution and persistence.

Action-Not Available
Vendor-updfUPDF
Product-updfUPDF
CWE ID-CWE-427
Uncontrolled Search Path Element
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found