Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-28394

Summary
Assigner-trendmicro
Assigner Org ID-7f7bd7df-cffe-4fdb-ab6d-859363b89272
Published At-26 May, 2022 | 23:25
Updated At-03 Aug, 2024 | 05:56
Rejected At-
Credits

EOL Product CVE - Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 and below provided by Trend Micro Incorporated contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Please note that this was reported on an EOL version of the product, and users are advised to upgrade to the latest supported version (5.x).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:trendmicro
Assigner Org ID:7f7bd7df-cffe-4fdb-ab6d-859363b89272
Published At:26 May, 2022 | 23:25
Updated At:03 Aug, 2024 | 05:56
Rejected At:
▼CVE Numbering Authority (CNA)

EOL Product CVE - Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 and below provided by Trend Micro Incorporated contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Please note that this was reported on an EOL version of the product, and users are advised to upgrade to the latest supported version (5.x).

Affected Products
Vendor
Trend Micro IncorporatedTrend Micro
Product
Trend Micro Password Manager
Versions
Affected
  • 3.7.0.1223 and below
Problem Types
TypeCWE IDDescription
textN/AUncontrolled Search Path Element
Type: text
CWE ID: N/A
Description: Uncontrolled Search Path Element
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10977
x_refsource_MISC
https://jvn.jp/en/jp/JVN60037444/
x_refsource_MISC
https://jvn.jp/jp/JVN60037444/
x_refsource_MISC
Hyperlink: https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10977
Resource:
x_refsource_MISC
Hyperlink: https://jvn.jp/en/jp/JVN60037444/
Resource:
x_refsource_MISC
Hyperlink: https://jvn.jp/jp/JVN60037444/
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10977
x_refsource_MISC
x_transferred
https://jvn.jp/en/jp/JVN60037444/
x_refsource_MISC
x_transferred
https://jvn.jp/jp/JVN60037444/
x_refsource_MISC
x_transferred
Hyperlink: https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10977
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://jvn.jp/en/jp/JVN60037444/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://jvn.jp/jp/JVN60037444/
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@trendmicro.com
Published At:27 May, 2022 | 00:15
Updated At:08 Jun, 2022 | 16:19

EOL Product CVE - Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 and below provided by Trend Micro Incorporated contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Please note that this was reported on an EOL version of the product, and users are advised to upgrade to the latest supported version (5.x).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.06.9MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.9
Base severity: MEDIUM
Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Trend Micro Incorporated
trendmicro
>>password_manager>>Versions before 3.7.0.1223(exclusive)
cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*
Weaknesses
CWE IDTypeSource
CWE-427Primarynvd@nist.gov
CWE ID: CWE-427
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10977security@trendmicro.com
Vendor Advisory
https://jvn.jp/en/jp/JVN60037444/security@trendmicro.com
Third Party Advisory
https://jvn.jp/jp/JVN60037444/security@trendmicro.com
Third Party Advisory
Hyperlink: https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10977
Source: security@trendmicro.com
Resource:
Vendor Advisory
Hyperlink: https://jvn.jp/en/jp/JVN60037444/
Source: security@trendmicro.com
Resource:
Third Party Advisory
Hyperlink: https://jvn.jp/jp/JVN60037444/
Source: security@trendmicro.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

301Records found

CVE-2022-1098
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.64%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-16 Apr, 2025 | 17:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Delta Electronics DIAEnergie Uncontrolledly Search Path Element

Delta Electronics DIAEnergie (all versions prior to 1.8.02.004) are vulnerable to a DLL hijacking condition. When combined with the Incorrect Default Permissions vulnerability of 4.2.2 above, this makes it possible for an attacker to escalate privileges

Action-Not Available
Vendor-DIAEnerrgieDelta Electronics, Inc.
Product-diaenergieDIAEnergie
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-5463
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.56%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 21:31
Updated-02 Aug, 2024 | 07:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XINJE XDPPro cfgmgr32.dll uncontrolled search path

A vulnerability was found in XINJE XDPPro up to 3.7.17a. It has been rated as critical. Affected by this issue is some unknown functionality in the library cfgmgr32.dll. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-241586 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-xinjeXINJExinje
Product-xdpproXDPProxdppro
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-6235
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.66%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 12:24
Updated-02 Aug, 2024 | 08:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary code execution in Duet Display

An uncontrolled search path element vulnerability has been found in the Duet Display product, affecting version 2.5.9.1. An attacker could place an arbitrary libusk.dll file in the C:\Users\user\AppData\Local\Microsoft\WindowsApps\ directory, which could lead to the execution and persistence of arbitrary code.

Action-Not Available
Vendor-duetdisplayDuet Display
Product-duet_displayDuet Display for Windows 10+
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-6132
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.3||HIGH
EPSS-0.04% / 10.47%
||
7 Day CHG~0.00%
Published-29 Feb, 2024 | 17:40
Updated-04 Mar, 2025 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AVEVA Edge products Uncontrolled Search Path Element

The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.

Action-Not Available
Vendor-AVEVA
Product-platform_common_servicesenterprise_data_managementmanufacturing_execution_systemsystem_platformwork_tasksbatch_managementmobile_operatorAVEVA Edgeaveva_edge
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-44463
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.1||HIGH
EPSS-0.04% / 11.52%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:09
Updated-17 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Emerson DeltaV Uncontrolled Search Path Element

Missing DLLs, if replaced by an insider, could allow an attacker to achieve local privilege escalation on the DeltaV Distributed Control System Controllers and Workstations (All versions) when some DeltaV services are started.

Action-Not Available
Vendor-emersonn/a
Product-deltavn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-43940
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.8||HIGH
EPSS-0.15% / 36.88%
||
7 Day CHG~0.00%
Published-15 Feb, 2022 | 03:15
Updated-08 Oct, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. This vulnerability only affects installations of Confluence Server and Data Center on Windows. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

Action-Not Available
Vendor-Microsoft CorporationAtlassian
Product-confluence_data_centerwindowsconfluence_serverConfluence ServerConfluence Data Centerconfluence_data_centerconfluence_server
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-18670
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 36.09%
||
7 Day CHG~0.00%
Published-17 Dec, 2019 | 15:10
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Quick Access Service (QAAdminAgent.exe) in Acer Quick Access V2.01.3000 through 2.01.3027 and V3.00.3000 through V3.00.3008, a REGULAR user can load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\SYSTEM. This is a DLL Hijacking vulnerability (including search order hijacking, which searches for the missing DLL in the PATH environment variable), which is caused by an uncontrolled search path element for nvapi.dll, atiadlxx.dll, or atiadlxy.dll.

Action-Not Available
Vendor-n/aAcer Inc.
Product-quick_accessn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-51711
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.43%
||
7 Day CHG~0.00%
Published-24 Jan, 2024 | 00:00
Updated-30 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Regify Regipay Client for Windows version 4.5.1.0 allows DLL hijacking: a user can trigger the execution of arbitrary code every time the product is executed.

Action-Not Available
Vendor-regifyn/a
Product-regipayn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-44226
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.08% / 25.37%
||
7 Day CHG+0.02%
Published-23 Mar, 2022 | 00:00
Updated-04 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.

Action-Not Available
Vendor-razern/aMicrosoft Corporation
Product-windowssynapsen/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-30033
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.5||HIGH
EPSS-0.02% / 2.34%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:16
Updated-12 Aug, 2025 | 20:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component.

Action-Not Available
Vendor-Siemens AG
Product-SIMATIC PCS 7/OPEN OS V9.1SIMATIC S7-PLCSIM V20SIMATIC PCS 7 Advanced Process Functions V2.2TIA Portal Test Suite V19SIMATIC NET PC Software V17SIMATIC WinCC flexible ESSIMATIC PCS 7 PowerControlSIMATIC WinCC Visualization Architect (SiVArc) V20SIMATIC WinCC Visualization Architect (SiVArc) V18SIMATIC NET PC Software V19SIMATIC PCS 7 V10.0SIMATIC ProSave V20SIMATIC WinCC Runtime Professional V20SIMATIC S7-1500 Software Controller V2SIMATIC Process Historian 2024SIMIT Rapid TesterStandard PID CTRL ToolSIMATIC PCS 7 Basis Faceplates V9.1SIMATIC WinCC TeleControlSIMATIC WinCC Unified PC Runtime V18SIMATIC PDM V9.2SIMATIC S7-PLCSIM AdvancedSIMATIC eaSie Document SkillsSIMATIC WinCC Unified PC Runtime V19SIMATIC MTP CREATOR V3.xSIMATIC S7-PLCSIM V18SIMATIC PCS 7 Standard Chemical Library V9.1SIMATIC PCS neo V6.0SIMATIC Automation ToolSINAMICS Startdrive V19SIMATIC Safety MatrixSIMATIC MTP CREATOR V5.xSIMATIC S7-PCTModular PID CTRL ToolTeleControl Server Basic V3.1Automation License Manager V6.2SIMATIC S7-1500 Software Controller V3OpenPCS 7 V9.1SIMATIC D7-SYSSIMATIC WinCC Visualization Architect (SiVArc) V19SIMATIC NET PC Software V20SIMATIC Process Function Library (PFL) V4.0TIA Portal Test Suite V20SIMATIC ProSave V19SIMATIC WinCC Unified Line CoordinationSIMATIC PCS 7 Industry Library V9.1SIMATIC NET PC Software V18SIMATIC STEP 7 CFC V19SIMIT Simulation PlatformSIMATIC MTP CREATOR V4.xSIMATIC Logon V1.6SINEMA Remote Connect ClientSIMATIC Management AgentSIMATIC WinCC Visualization Architect (SiVArc) V17SIMATIC Route Control V10.0SIMATIC Management ConsoleSIMATIC PCS 7 TeleControlSIMATIC eaSie PCS 7 Skill PackageSINEC NMSAutomation License Manager V6.0SIMATIC S7-Fail-safe Configuration Tool (S7-FCT)SIMATIC PCS 7 Advanced Process Functions V2.1Create MyConfig (CMC)SIMATIC eaSie Workflow SkillsSIMATIC MTP Integrator V1.xSIMATIC PCS 7 Advanced Process Graphics V10.0OpenPCS 7 V10.0SIMATIC PCS 7 Advanced Process Library incl. Faceplates V10.0WinCC Panel Image SetupSIMATIC ODK 1500SSIMATIC ProSave V17SIMATIC MTP CREATOR V2.xSIMATIC STEP 7 V5.7FM Configuration PackageSIMATIC STEP 7 CFC V20TIA Portal Test Suite V17SIMATIC eaSie Core PackageCP PtP Param configuring interfaceSIMATIC PCS 7 V9.1MultiFieldbus Configuration Tool (MFCT)SIMATIC Logon V2.0SIMATIC Process Historian 2020TIA Portal Cloud ConnectorTIA AdministratorSIMATIC NET PC Software V16SIMATIC WinCC Unified SequenceSIMATIC BATCH V10.0SIMATIC Route Control V9.1SIMATIC TargetSIMATIC WinCC V7.5SINAMICS Startdrive V18SIMATIC PCS neo V5.0SIMATIC WinCC V8.1SIMATIC Control Function Library (CFL) V4.0SIMATIC Control Function Library (CFL) V2.0SIMATIC S7-PLCSIM V19SIMATIC Automation Tool SDK WindowsSINAMICS Startdrive V20SIMATIC PCS 7 Basis Library V9.1SIMATIC PCS 7 MPC ConfiguratorSIMATIC S7 F Systems V6.3Energy Support Library (EnSL)SINAMICS Startdrive V17SIMATIC Control Function Library (CFL) V3.0SIMATIC MTP Integrator V2.xSIMATIC PCS 7 Advanced Process Graphics V9.1SIMATIC PDM V9.3SIMATIC ProSave V18SIMATIC Energy Suite V18SIMATIC Control Function Library (CFL) V1.0.0SIMATIC WinCC Unified PC Runtime V20SIMATIC WinCC V8.0TIA Portal Test Suite V18SIMATIC BATCH V9.1SIMATIC Energy Suite V17SIMATIC PCS 7 Advanced Process Faceplates V9.1TIA Project-ServerCEMAT V10.0SIMATIC PCS 7 Industry Library V10.0SIMATIC PCS 7 Advanced Process Library V9.1SIMATIC PCS 7 Standard Chemical Library V10.0SIMATIC PCS 7 Industry Library V9.0SIMATIC WinCC Runtime ProfessionalTIA Project-Server V17SIMATIC S7-PLCSIM V17SIMATIC S7 F Systems V6.4SIMATIC PCS 7 Logic Matrix V9.1Siemens Network Planner (SINETPLAN)SIMATIC WinCC Runtime AdvancedSIMATIC PDM Maintenance Station V5.0SITRANSSIMATIC PCS 7 Basis Library V10.0SIMATIC PCS 7 Logic Matrix V10.0SIMATIC Process Historian 2022SIMATIC Energy Suite V19
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-12891
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.07%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:29
Updated-16 Sep, 2024 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-radeon_softwareradeon_pro_softwareRadeon SoftwareRadeon Pro Software for Enterprise
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-11613
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.88%
||
7 Day CHG~0.00%
Published-11 Jun, 2020 | 16:47
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mids' Reborn Hero Designer 2.6.0.7 has an elevation of privilege vulnerability due to default and insecure permissions being set for the installation folder. By default, the Authenticated Users group has Modify permissions to the installation folder. Because of this, any user on the system can replace binaries or plant malicious DLLs to obtain elevated, or different, privileges, depending on the context of the user that runs the application.

Action-Not Available
Vendor-mids\'_reborn_hero_designer_projectn/a
Product-mids\'_reborn_hero_designern/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-12423
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-7.8||HIGH
EPSS-0.28% / 50.99%
||
7 Day CHG~0.00%
Published-09 Jul, 2020 | 14:39
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution. *Note: This issue only affects the Windows operating system; other operating systems are unaffected.* This vulnerability affects Firefox < 78.

Action-Not Available
Vendor-Mozilla CorporationMicrosoft Corporation
Product-firefoxwindowsFirefox
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-4936
Matching Score-4
Assigner-Synaptics, Inc.
ShareView Details
Matching Score-4
Assigner-Synaptics, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.87%
||
7 Day CHG~0.00%
Published-11 Oct, 2023 | 17:00
Updated-18 Sep, 2024 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Synaptics-DisplayLink-privilege escalation vulnerability via a dynamic library sideloading

It is possible to sideload a compromised DLL during the installation at elevated privilege.

Action-Not Available
Vendor-synapticsSynaptics
Product-displaylink_usb_graphicsDisplayLink USB Graphics Software for Windows
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-48677
Matching Score-4
Assigner-Acronis International GmbH
ShareView Details
Matching Score-4
Assigner-Acronis International GmbH
CVSS Score-7.3||HIGH
EPSS-0.04% / 10.17%
||
7 Day CHG-0.01%
Published-12 Dec, 2023 | 08:33
Updated-04 Jun, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901, Acronis Cyber Protect Cloud Agent (Windows) before build 39378, Acronis Cyber Protect 16 (Windows) before build 39938.

Action-Not Available
Vendor-Microsoft CorporationAcronis (Acronis International GmbH)
Product-cyber_protect_home_officewindowsAcronis Cyber Protect Home OfficeAcronis Cyber Protect 16Acronis Cyber Protect Cloud Agent
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-4770
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 37.83%
||
7 Day CHG~0.00%
Published-30 Nov, 2023 | 13:32
Updated-02 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Uncontrolled Search Path Element Vulnerability in 4D and 4D Windows Server

An uncontrolled search path element vulnerability has been found on 4D and 4D server Windows executables applications, affecting version 19 R8 100218. This vulnerability consists in a DLL hijacking by replacing x64 shfolder.dll in the installation path, causing an arbitrary code execution.

Action-Not Available
Vendor-4d4DMicrosoft Corporation
Product-4dwindowsserver4D Server.exe4D.exe
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-11634
Matching Score-4
Assigner-Zscaler, Inc.
ShareView Details
Matching Score-4
Assigner-Zscaler, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 20.20%
||
7 Day CHG~0.00%
Published-15 Jul, 2021 | 19:18
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.

Action-Not Available
Vendor-n/aZscaler, Inc.
Product-client_connectorn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-19364
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.22% / 44.68%
||
7 Day CHG~0.00%
Published-04 Dec, 2019 | 18:42
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak malicious user can escalate its privilege whenever CatalystProductionSuite.2019.1.exe (version 1.1.0.21) and CatalystBrowseSuite.2019.1.exe (version 1.1.0.21) installers run. The vulnerability is in the form of DLL Hijacking. The installers try to load DLLs that don’t exist from its current directory; by doing so, an attacker can quickly escalate its privileges.

Action-Not Available
Vendor-n/aSony Group Corporation
Product-catalyst_production_suitecatalyst_browsen/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-10626
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.38%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 15:52
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.

Action-Not Available
Vendor-fazecastn/a
Product-jserialcommecostruxure_it_gatewayFazecast jSerialComm, Version 2.2.2 and prior
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-41613
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.28% / 50.96%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 00:00
Updated-28 Aug, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EzViz Studio v2.2.0 is vulnerable to DLL hijacking.

Action-Not Available
Vendor-ezvizn/aezvizMicrosoft Corporation
Product-ezviz_studiowindowsn/aezviz_studio
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-2630
Matching Score-4
Assigner-National Instruments
ShareView Details
Matching Score-4
Assigner-National Instruments
CVSS Score-7||HIGH
EPSS-0.03% / 6.53%
||
7 Day CHG~0.00%
Published-09 Apr, 2025 | 18:50
Updated-18 Aug, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL Hijacking Vulnerability in NI LabVIEW

There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.

Action-Not Available
Vendor-niNI
Product-labviewLabVIEW
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-2006
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.32%
||
7 Day CHG~0.00%
Published-31 Aug, 2022 | 15:33
Updated-16 Apr, 2025 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AutomationDirect C-more EA9 HMI Uncontrolled Search Path Element

AutomationDirect DirectLOGIC has a DLL vulnerability in the install directory that may allow an attacker to execute code during the installation process. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73;

Action-Not Available
Vendor-AutomationDirect
Product-c-more_ea9-t6clc-more_ea9-t6cl-r_firmwarec-more_ea9-t10wclc-more_ea9-t12cl_firmwarec-more_ea9-pgmswc-more_ea9-rhmic-more_ea9-t10clc-more_ea9-t7cl-rc-more_ea9-t8cl_firmwarec-more_ea9-t15cl-r_firmwarec-more_ea9-t10wcl_firmwarec-more_ea9-t15cl-rc-more_ea9-t15cl_firmwarec-more_ea9-t15clc-more_ea9-pgmsw_firmwarec-more_ea9-t6cl-rc-more_ea9-rhmi_firmwarec-more_ea9-t10cl_firmwarec-more_ea9-t12clc-more_ea9-t7clc-more_ea9-t7cl_firmwarec-more_ea9-t8clc-more_ea9-t7cl-r_firmwarec-more_ea9-t6cl_firmwareC-more EA9
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-2629
Matching Score-4
Assigner-National Instruments
ShareView Details
Matching Score-4
Assigner-National Instruments
CVSS Score-7||HIGH
EPSS-0.03% / 6.53%
||
7 Day CHG~0.00%
Published-09 Apr, 2025 | 18:45
Updated-18 Aug, 2025 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL Hijacking Vulnerability in NI LabVIEW When Loading NI Error Reporting

There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.

Action-Not Available
Vendor-niNI
Product-labviewLabVIEW
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-39374
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.94%
||
7 Day CHG~0.00%
Published-03 Sep, 2023 | 14:48
Updated-01 Oct, 2024 | 14:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ForeScout NAC SecureConnector – CWE-427: Uncontrolled Search Path Element

ForeScout NAC SecureConnector version 11.2 - CWE-427: Uncontrolled Search Path Element

Action-Not Available
Vendor-ForeScoutForescout Technologies, Inc.
Product-secureconnectorNAC SecureConnector
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-5509
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-3.75% / 87.56%
||
7 Day CHG~0.00%
Published-06 Jun, 2024 | 17:51
Updated-09 Aug, 2024 | 13:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Luxion KeyShot BIP File Parsing Uncontrolled Search Path Element Remote Code Execution Vulnerability

Luxion KeyShot BIP File Parsing Uncontrolled Search Path Element Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BIP files. The issue results from loading a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22738.

Action-Not Available
Vendor-luxionLuxionluxion
Product-keyshot_viewerkeyshotkeyshot_network_renderingKeyShotkeyshot
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-17093
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 13.33%
||
7 Day CHG~0.00%
Published-23 Oct, 2019 | 16:59
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0.

Action-Not Available
Vendor-avastavgn/a
Product-anti-virusantivirusn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-35897
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-06 Oct, 2023 | 13:06
Updated-19 Sep, 2024 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Spectrum Protect code execution

IBM Spectrum Protect Client and IBM Storage Protect for Virtual Environments 8.1.0.0 through 8.1.19.0 could allow a local user to execute arbitrary code on the system using a specially crafted file, caused by a DLL hijacking flaw. IBM X-Force ID: 259246.

Action-Not Available
Vendor-IBM Corporation
Product-storage_protectstorage_protect_clientStorage Protect ClientStorage Protect for Virtual Environmentsstorage_protectstorage_protect_client
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-8062
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-7.87% / 91.65%
||
7 Day CHG~0.00%
Published-14 Aug, 2019 | 14:41
Updated-05 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe After Effects versions 16 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to arbitrary code execution.

Action-Not Available
Vendor-Adobe Inc.
Product-after_effectsAdobe After Effects
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-8076
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-7.48% / 91.40%
||
7 Day CHG~0.00%
Published-12 Sep, 2019 | 18:05
Updated-04 Aug, 2024 | 21:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe application manager installer version 10.0 have an Insecure Library Loading (DLL hijacking) vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.

Action-Not Available
Vendor-Adobe Inc.
Product-application_managerApplication Manager
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-7962
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.33%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 15:07
Updated-04 Aug, 2024 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Illustrator CC versions 23.1 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-windowsmacosillustrator_ccAdobe Illustrator CC
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-6858
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.8||HIGH
EPSS-0.16% / 37.59%
||
7 Day CHG~0.00%
Published-22 Jan, 2020 | 13:59
Updated-04 Aug, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-427:Uncontrolled Search Path Element vulnerability exists in MSX Configurator (Software Version prior to V1.0.8.1), which could cause privilege escalation when injecting a malicious DLL.

Action-Not Available
Vendor-n/a
Product-msx_configuratorMSX Configurator (Software Version prior to V1.0.8.1)
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-6692
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.19%
||
7 Day CHG~0.00%
Published-24 Oct, 2019 | 13:46
Updated-25 Oct, 2024 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious DLL preload vulnerability in Fortinet FortiClient for Windows 6.2.0 and below allows a privileged attacker to perform arbitrary code execution via forging that DLL.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-forticlientFortinet FortiClient for Windows
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-7365
Matching Score-4
Assigner-Autodesk
ShareView Details
Matching Score-4
Assigner-Autodesk
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.18%
||
7 Day CHG~0.00%
Published-03 Dec, 2019 | 17:01
Updated-04 Aug, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL preloading vulnerability in Autodesk Desktop Application versions 7.0.16.29 and earlier. An attacker may trick a user into downloading a malicious DLL file into the working directory, which may then leverage a DLL preloading vulnerability and execute code on the system.

Action-Not Available
Vendor-n/aAutodesk Inc.
Product-autodesk_desktopAutodesk Desktop Application
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-6825
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.8||HIGH
EPSS-0.49% / 64.59%
||
7 Day CHG~0.00%
Published-15 Jul, 2019 | 20:45
Updated-04 Aug, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0.

Action-Not Available
Vendor-Schneider Electric SE
Product-proclimaProClima all versions prior to version 8.0.0
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-7960
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.15% / 36.13%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 15:05
Updated-04 Aug, 2024 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Animate CC versions 19.2.1 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-windowsanimate_ccmacosAdobe Animate CC
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-6546
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.15% / 36.85%
||
7 Day CHG~0.00%
Published-09 May, 2019 | 14:27
Updated-04 Aug, 2024 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GE Communicator, all versions prior to 4.0.517, allows an attacker to place malicious files within the working directory of the program, which may allow an attacker to manipulate widgets and UI elements.

Action-Not Available
Vendor-gen/a
Product-ge_communicatorGE Communicator
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-5701
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.27%
||
7 Day CHG~0.00%
Published-09 Nov, 2019 | 01:48
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GeForce Experience, all versions prior to 3.20.0.118, contains a vulnerability when GameStream is enabled in which an attacker with local system access can load the Intel graphics driver DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service, information disclosure, or escalation of privileges through code execution.

Action-Not Available
Vendor-NVIDIA Corporation
Product-geforce_experienceNVIDIA GeForce Experience
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-5443
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.95% / 75.45%
||
7 Day CHG~0.00%
Published-02 Jul, 2019 | 18:31
Updated-04 Aug, 2024 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

Action-Not Available
Vendor-n/aNetApp, Inc.CURLOracle CorporationMicrosoft Corporation
Product-http_serveroncommand_insightoncommand_unified_managerwindowsoss_support_toolsoncommand_workflow_automationcurlsnapcenterenterprise_manager_ops_centermysql_servercurl
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-5631
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.23%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 14:32
Updated-16 Sep, 2024 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rapid7 InsightAppSec Local Privilege Escalation

The Rapid7 InsightAppSec broker suffers from a DLL injection vulnerability in the 'prunsrv.exe' component of the product. If exploited, a local user of the system (who must already be authenticated to the operating system) can elevate their privileges with this vulnerability to the privilege level of InsightAppSec (usually, SYSTEM). This issue affects version 2019.06.24 and prior versions of the product.

Action-Not Available
Vendor-Rapid7 LLC
Product-insightappsecInsightAppSec
CWE ID-CWE-427
Uncontrolled Search Path Element
CWE ID-CWE-426
Untrusted Search Path
CVE-2019-5695
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 18.39%
||
7 Day CHG~0.00%
Published-12 Nov, 2019 | 20:14
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GeForce Experience (prior to 3.20.1) and Windows GPU Display Driver (all versions) contains a vulnerability in the local service provider component in which an attacker with local system and privileged access can incorrectly load Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution.

Action-Not Available
Vendor-NVIDIA CorporationMicrosoft Corporation
Product-windowsgpu_drivergeforce_experienceNVIDIA GeForce ExperienceNVIDIA Windows GPU Display Driver
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-6534
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.74% / 72.07%
||
7 Day CHG~0.00%
Published-11 Apr, 2019 | 20:38
Updated-04 Aug, 2024 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The uncontrolled search path element vulnerability in Gemalto Sentinel UltraPro Client Library ux32w.dll Versions 1.3.0, 1.3.1, and 1.3.2 enables an attacker to load and execute a malicious file.

Action-Not Available
Vendor-gemaltoGemalto
Product-sentinel_ultrapro_client_librarySentinel UltraPro
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-6564
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.80%
||
7 Day CHG~0.00%
Published-09 May, 2019 | 14:27
Updated-04 Aug, 2024 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to place malicious files within the installer file directory, which may allow an attacker to gain administrative privileges on a system during installation or upgrade.

Action-Not Available
Vendor-gen/a
Product-ge_communicatorGE Communicator
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-3667
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-6.6||MEDIUM
EPSS-0.10% / 28.84%
||
7 Day CHG~0.00%
Published-11 Dec, 2019 | 06:25
Updated-04 Aug, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL Search Order Hijacking

DLL Search Order Hijacking vulnerability in the Microsoft Windows client in McAfee Tech Check 3.0.0.17 and earlier allows local users to execute arbitrary code via the local folder placed there by an attacker.

Action-Not Available
Vendor-McAfee, LLC
Product-techcheckMcAfee TechCheck
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-3745
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.59%
||
7 Day CHG~0.00%
Published-07 Oct, 2019 | 18:21
Updated-17 Sep, 2024 | 04:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vulnerability is limited to the installers of Dell Encryption Enterprise versions prior to 10.4.0 and Dell Endpoint Security Suite Enterprise versions prior to 2.4.0. This issue is exploitable only during the installation of the product by an administrator. A local authenticated low privileged user potentially could exploit this vulnerability by staging a malicious DLL in the search path of the installer prior to its execution by a local administrator. This would cause loading of the malicious DLL, which would allow the attacker to execute arbitrary code in the context of an administrator.

Action-Not Available
Vendor-Dell Inc.
Product-encryptionendpoint_security_suite_enterpriseDell Encryption EnterpriseDell Endpoint Security Suite Enterprise
CWE ID-CWE-427
Uncontrolled Search Path Element
CWE ID-CWE-426
Untrusted Search Path
CVE-2019-20769
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.07%
||
7 Day CHG~0.00%
Published-17 Apr, 2020 | 13:32
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in LG PC Suite for LG G3 and earlier (aka LG PC Suite v5.3.27 and earlier). DLL Hijacking can occur via a Trojan horse DLL in the current working directory. The LG ID is LVE-MOT-190001 (November 2019).

Action-Not Available
Vendor-n/aLG Electronics Inc.
Product-pc_suiteg3n/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20406
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.8||HIGH
EPSS-0.14% / 35.42%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 03:10
Updated-16 Sep, 2024 | 23:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.

Action-Not Available
Vendor-Microsoft CorporationAtlassian
Product-windowsconfluence_serverconfluenceConfluence Data Center
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-31358
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.3||HIGH
EPSS-0.02% / 2.35%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 17:14
Updated-16 May, 2025 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijacking vulnerability in the AMD Manageability API could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-aim-t_manageability_apiAIM-T Manageability API
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-31348
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.3||HIGH
EPSS-0.03% / 7.78%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 16:57
Updated-12 Dec, 2024 | 01:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijacking vulnerability in AMD μProf could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-uprofμProf Tooluprof_tool
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-31016
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.3||HIGH
EPSS-0.04% / 12.40%
||
7 Day CHG~0.00%
Published-02 Nov, 2023 | 18:36
Updated-06 Sep, 2024 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE

NVIDIA GPU Display Driver for Windows contains a vulnerability where an uncontrolled search path element may allow an attacker to execute arbitrary code, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.

Action-Not Available
Vendor-NVIDIA CorporationMicrosoft Corporation
Product-windowsvirtual_gpuNVIDIA GPU Display driver, vGPU driver, and Cloud gaming drivergpu_display_driver
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-20400
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.8||HIGH
EPSS-0.14% / 35.42%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 03:10
Updated-16 Sep, 2024 | 22:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The usage of Tomcat in Jira before version 8.5.2 allows local attackers with permission to write a dll file to a directory in the global path environmental variable can inject code into via a DLL hijacking vulnerability.

Action-Not Available
Vendor-Atlassian
Product-jira_serverJira Server
CWE ID-CWE-427
Uncontrolled Search Path Element
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next
Details not found