Total
186 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-8459 | 1 Checkpoint | 6 Capsule Docs Standalone Client, Endpoint Security Clients, Endpoint Security Server Package and 3 more | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Check Point Endpoint Security Client for Windows, with the VPN blade, before version E80.83, starts a process without using quotes in the path. This can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one. | |||||
CVE-2019-7590 | 1 Johnsoncontrols | 1 Exacqvision Server | 2024-11-21 | 4.6 MEDIUM | 6.7 MEDIUM |
ExacqVision Server’s services 'exacqVisionServer', 'dvrdhcpserver' and 'mdnsresponder' have an unquoted service path. If an authenticated user is able to insert code in their system root path it potentially can be executed during the application startup. This could allow the authenticated user to elevate privileges on the system. This issue affects: Exacq Technologies, Inc. exacqVision Server 9.6; 9.8. This issue does not affect: Exacq Technologies, Inc. exacqVision Server version 9.4 and prior versions; 19.03. It is not known whether this issue affects: Exacq Technologies, Inc. exacqVision Server versions prior to 8.4. | |||||
CVE-2019-7487 | 2 Microsoft, Sonicwall | 3 Windows, Sonicos, Sonicos Sslvpn Nacagent | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Installation of the SonicOS SSLVPN NACagent 3.5 on the Windows operating system, an autorun value is created does not put the path in quotes, so if a malicious binary by an attacker within the parent path could allow code execution. | |||||
CVE-2019-7201 | 1 Qnap | 1 Netbak Replicator | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
An unquoted service path vulnerability is reported to affect the service QVssService in QNAP NetBak Replicator. This vulnerability could allow an authorized but non-privileged local user to execute arbitrary code with elevated system privileges. QNAP have already fixed this issue in QNAP NetBak Replicator 4.5.12.1108. | |||||
CVE-2019-6149 | 1 Lenovo | 2 Dynamic Power Reduction, Thinkpad X1 Carbon | 2024-11-21 | 7.2 HIGH | 6.7 MEDIUM |
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges. | |||||
CVE-2019-6145 | 1 Forcepoint | 1 Vpn Client | 2024-11-21 | 7.2 HIGH | 6.7 MEDIUM |
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us. | |||||
CVE-2019-6008 | 1 Yokogawa | 8 Exaopc, Exaplog, Exaquantum and 5 more | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges. | |||||
CVE-2019-20362 | 2 Microsoft, Teradici | 4 Windows, Pcoip Client, Pcoip Graphics Agent and 1 more | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
In Teradici PCoIP Agent before 19.08.1 and PCoIP Client before 19.08.3, an unquoted service path can cause execution of %PROGRAMFILES(X86)%\Teradici\PCoIP.exe instead of the intended pcoip_vchan_printing_svc.exe file. | |||||
CVE-2019-20357 | 2 Microsoft, Trendmicro | 9 Windows, Antivirus \+ Security 2019, Antivirus \+ Security 2020 and 6 more | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system. | |||||
CVE-2019-18915 | 1 Hp | 1 System Event Utility | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
A potential security vulnerability has been identified with certain versions of HP System Event Utility prior to version 1.4.33. This vulnerability may allow a local attacker to execute arbitrary code via an HP System Event Utility system service. | |||||
CVE-2019-18245 | 1 Reliablecontrols | 1 Rc-licensemanager | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Reliable Controls LicenseManager versions 3.4 and prior may allow an authenticated user to insert malicious code into the system root path, which may allow execution of code with elevated privileges of the application. | |||||
CVE-2019-17658 | 1 Fortinet | 1 Forticlient | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An unquoted service path vulnerability in the FortiClient FortiTray component of FortiClientWindows v6.2.2 and prior allow an attacker to gain elevated privileges via the FortiClientConsole executable service path. | |||||
CVE-2019-16647 | 2 Maxthon, Microsoft | 2 Maxthon Browser, Windows | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
Unquoted Search Path in Maxthon 5.1.0 to 5.2.7 Browser for Windows. | |||||
CVE-2019-14685 | 2 Microsoft, Trendmicro | 5 Windows, Antivirus \+ Security 2019, Internet Security 2019 and 2 more | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
A local privilege escalation vulnerability exists in Trend Micro Security 2019 (v15.0) in which, if exploited, would allow an attacker to manipulate a specific product feature to load a malicious service. | |||||
CVE-2019-11093 | 1 Intel | 1 Scs Discovery Utility | 2024-11-21 | 4.6 MEDIUM | 6.7 MEDIUM |
Unquoted service path in the installer for the Intel(R) SCS Discovery Utility version 12.0.0.129 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2018-6384 | 1 Nsclient | 1 Nsclient\+\+ | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Unquoted Windows search path vulnerability in NSClient++ before 0.4.1.73 allows non-privileged local users to execute arbitrary code with elevated privileges on the system via a malicious program.exe executable in the %SYSTEMDRIVE% folder. | |||||
CVE-2018-6321 | 1 Pandasecurity | 1 Panda Global Protection | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Unquoted Windows search path vulnerability in the panda_url_filtering service in Panda Global Protection 17.0.1 allows local users to gain privileges via a malicious artefact. | |||||
CVE-2018-6016 | 1 10-strike | 1 Network Monitor | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Unquoted Windows search path vulnerability in the srvInventoryWebServer service in 10-Strike Network Monitor 5.4 allows local users to gain privileges via a malicious artefact. | |||||
CVE-2018-4873 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Unquoted Search Path vulnerability. Successful exploitation could lead to local privilege escalation. | |||||
CVE-2018-3688 | 1 Intel | 1 Quartus Prime Programmer And Tools | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Unquoted service paths in Intel Quartus Prime Programmer and Tools in versions 15.1 - 18.0 allow a local attacker to potentially execute arbitrary code. |