Total
492 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-2242 | 1 Ntt | 1 Flets Setsuzoku Tool | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in Flets Setsuzoku Tool for Windows all versions allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2233 | 1 Moj | 1 Pdf Digital Signature | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in Installer of PDF Digital Signature Plugin (G2.30) and earlier, distributed till June 29, 2017 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2232 | 1 Moj | 1 Shinseiyo Sogo Soft | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in Installer of Shinseiyo Sogo Soft (4.8A) and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2231 | 1 Mlit | 1 Denshiseikabutsusakuseishienkensa | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in The installer of MLIT DenshiSeikabutsuSakuseiShienKensa system Ver3.02 and earlier, distributed till June 20, 2017, The self-extracting archive including the installer of MLIT DenshiSeikabutsuSakuseiShienKensa system Ver3.02 and earlier, distributed till June 20, 2017 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2230 | 1 Nilim | 1 Road Construction Completion Diagram Check Program | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Untrusted search path vulnerability in Douro Kouji Kanseizutou Check Program Ver3.1 (cdrw_checker_3.1.0.lzh) and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2229 | 1 Douroshisetu | 1 Kihon Data Sakusei System | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Untrusted search path vulnerability in Douroshisetu Kihon Data Sakusei System Ver1.0.2 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2228 | 1 Enecho.meti | 1 Teikihoukokusho Sakuseishien Tool | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in Teikihoukokusho Sakuseishien Tool v4.0 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2227 | 1 Charamin | 1 Omp | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Untrusted search path vulnerability in The installer of Charamin OMP Version 1.1.7.4 and earlier, Version 1.2.0.0 Beta and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2226 | 1 Nta | 1 E-tax | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Untrusted search path vulnerability in Setup file of advance preparation for e-Tax software (WEB version) (1.17.1) and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2225 | 1 Mext | 1 Ebidsettingchecker | 2024-11-21 | 6.8 MEDIUM | 9.8 CRITICAL |
Untrusted search path vulnerability in EbidSettingChecker.exe (version 1.0.0.0) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2221 | 1 Baidu | 1 Baidu Ime | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in Installer of Baidu IME Ver3.6.1.6 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2220 | 1 Ipa | 1 Casl Ii Simulator | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Untrusted search path vulnerability in Installer of CASL II simulator (self-extract format) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2219 | 1 Baidu | 1 Simeji | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in the [Simeji for Windows] installer (simeji.exe) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2218 | 2 Apple, Microsoft | 2 Quicktime, Windows | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Untrusted search path vulnerability in Installer of QuickTime for Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2215 | 1 E-tax.nta | 1 E-tax | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Untrusted search path vulnerability in Installer of "Setup file of advance preparation" (jizen_setup.exe) (The version which was available on the website prior to 2017 June 12) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2214 | 1 Jiransoft | 2 Appcheck, Appcheck Pro | 2024-11-21 | 9.3 HIGH | 8.4 HIGH |
Untrusted search path vulnerability in AppCheck and AppCheck Pro prior to version 2.0.1.15 allows an attacker to execute arbitrary code via a specially crafted executable file in an unspecified directory. | |||||
CVE-2017-2213 | 1 Gsi | 1 Semidynaexe | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in SemiDynaEXE (SemiDynaEXE2008.EXE) ver. 1.0.2 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2212 | 1 Gsi | 1 Tky2jgd | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in TKY2JGD (TKY2JGD1379.EXE) ver. 1.3.79 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2211 | 1 Gsi | 1 Patchjgd | 2024-11-21 | 9.3 HIGH | 7.8 HIGH |
Untrusted search path vulnerability in PatchJGD (Hyoko) (PatchJGDh101.EXE) ver. 1.0.1 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | |||||
CVE-2017-2209 | 1 Santeikohyo | 1 Installer Of Houkokusyo Sakusei Shien Tool | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Untrusted search path vulnerability in the installer of Houkokusyo Sakusei Shien Tool ver3.0.2 (For the first installation) (The version which was available on the website from 2017 April 4 to 2017 May 18) and ver2.0 and later (For the first installation) (The versions which were available on the website prior to 2017 April 4) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. |