Vulnerabilities (CVE)

Filtered by CWE-427
Total 757 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-3252 1 Tenable 1 Nessus 2024-11-21 N/A 6.8 MEDIUM
An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges could alter logging variables to overwrite arbitrary files on the remote host with log data, which could lead to a denial of service condition.
CVE-2023-3091 1 Captura Project 1 Captura 2024-11-21 6.0 MEDIUM 7.0 HIGH
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Captura up to 8.0.0. It has been declared as critical. This vulnerability affects unknown code in the library CRYPTBASE.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation appears to be difficult. The identifier of this vulnerability is VDB-230668. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2023-3078 1 Lenovo 1 Universal Device Client 2024-11-21 N/A 7.8 HIGH
An uncontrolled search path vulnerability was reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.
CVE-2023-39929 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in some Libva software maintained by Intel(R) before version 2.20.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-39374 1 Forescout 1 Secureconnector 2024-11-21 N/A 7.8 HIGH
ForeScout NAC SecureConnector version 11.2 - CWE-427: Uncontrolled Search Path Element
CVE-2023-39254 2024-11-21 N/A 6.7 MEDIUM
Dell Update Package (DUP), Versions prior to 4.9.10 contain an Uncontrolled Search Path vulnerability. A malicious user with local access to the system could potentially exploit this vulnerability to run arbitrary code as admin.
CVE-2023-37849 1 Watchguard 1 Panda Security Vpn 2024-11-21 N/A 6.5 MEDIUM
A DLL hijacking vulnerability in Panda Security VPN for Windows prior to version v15.14.8 allows attackers to execute arbitrary code via placing a crafted DLL file in the same directory as PANDAVPN.exe.
CVE-2023-37490 1 Sap 1 Businessobjects Business Intelligence 2024-11-21 N/A 7.6 HIGH
SAP Business Objects Installer - versions 420, 430, allows an authenticated attacker within the network to overwrite an executable file created in a temporary directory during the installation process. On replacing this executable with a malicious file, an attacker can completely compromise the confidentiality, integrity, and availability of the system
CVE-2023-36853 1 Keysight 1 Geolocation Server 2024-11-21 N/A 7.8 HIGH
?In Keysight Geolocation Server v2.4.2 and prior, a low privileged attacker could create a local ZIP file containing a malicious script in any location. The attacker could abuse this to load a DLL with SYSTEM privileges.
CVE-2023-36344 1 Dieboldnixdorf 1 Vynamic View 2024-11-21 N/A 7.8 HIGH
An issue in Diebold Nixdorf Vynamic View Console v.5.3.1 and before allows a local attacker to execute arbitrary code via not restricting the search path for required DLLs and not verifying the signature.
CVE-2023-35897 1 Ibm 2 Storage Protect, Storage Protect Client 2024-11-21 N/A 8.4 HIGH
IBM Spectrum Protect Client and IBM Storage Protect for Virtual Environments 8.1.0.0 through 8.1.19.0 could allow a local user to execute arbitrary code on the system using a specially crafted file, caused by a DLL hijacking flaw. IBM X-Force ID: 259246.
CVE-2023-35192 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) GPA Framework software before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-34430 1 Intel 1 Battery Life Diagnostic Tool 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel Battery Life Diagnostic Tool software before version 2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-34355 1 Intel 2 Integrated Bmc Video Driver, Server Board M10jnp2sb 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element for some Intel(R) Server Board M10JNP2SB integrated BMC video drivers before version 3.0 for Microsoft Windows and before version 1.13.4 for linux may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-34350 1 Intel 1 Extreme Tuning Utility 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element in some Intel(R) XTU software before version 7.12.0.15 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-33874 1 Intel 7 Hid Event Filter Driver, Nuc 12 Pro Board Nuc12wsbv5, Nuc 12 Pro Board Nuc12wsbv7 and 4 more 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) NUC 12 Pro Kits & Mini PCs - NUC12WS Intel(R) HID Event Filter Driver installation software before version 2.2.2.1 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-32660 1 Intel 2 Nuc Kit Nuc6i7kyk, Thunderbolt 3 Controller Firmware 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) NUC Kit NUC6i7KYK Thunderbolt(TM) 3 Firmware Update Tool installation software before version 46 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-32272 1 Intel 1 Nuc Pro Software Suite 2024-11-21 N/A 7.9 HIGH
Uncontrolled search path in some Intel NUC Pro Software Suite Configuration Tool software installers before version 3.0.0.6 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-31543 1 Pipreqs Project 1 Pipreqs 2024-11-21 N/A 9.8 CRITICAL
A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.
CVE-2023-31210 1 Checkmk 1 Checkmk 2024-11-21 N/A 8.8 HIGH
Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries