Filtered by vendor Cyberlink
Subscribe
Total
10 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-29333 | 1 Cyberlink | 1 Powerdirector | 2024-02-28 | 6.8 MEDIUM | 7.8 HIGH |
A vulnerability in CyberLink Power Director v14 allows attackers to escalate privileges via a crafted .exe file. | |||||
CVE-2017-14627 | 1 Cyberlink | 1 Labelprint | 2024-02-28 | 6.8 MEDIUM | 7.8 HIGH |
Stack-based buffer overflows in CyberLink LabelPrint 2.5 allow remote attackers to execute arbitrary code via the (1) author (inside the INFORMATION tag), (2) name (inside the INFORMATION tag), (3) artist (inside the TRACK tag), or (4) default (inside the TEXT tag) parameter in an lpp project file. | |||||
CVE-2011-5171 | 1 Cyberlink | 1 Power2go | 2024-02-28 | 9.3 HIGH | N/A |
Multiple stack-based buffer overflows in CyberLink Power2Go 7 (build 196) and 8 (build 1031) allow remote attackers to execute arbitrary code via the (1) src and (2) name parameters in a p2g project file. | |||||
CVE-2010-5237 | 1 Cyberlink | 1 Powerdirector | 2024-02-28 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in CyberLink PowerDirector 7 allows local users to gain privileges via a Trojan horse mfc71loc.dll file in the current working directory, as demonstrated by a directory that contains a .pdl, .iso, .pds, .p2g, or .p2i file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2012-4756 | 1 Cyberlink | 1 Labelprint | 2024-02-28 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in CyberLink LabelPrint 2.5.3602 allow local users to gain privileges via a Trojan horse (1) mfc71loc.dll or (2) mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .lpp file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2012-4757 | 1 Cyberlink | 1 Streamauthor | 2024-02-28 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in CyberLink StreamAuthor 4.0 build 3308 allow local users to gain privileges via a Trojan horse (1) mfc71loc.dll or (2) mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .sta or .stp file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2010-5238 | 1 Cyberlink | 1 Powerdirector | 2024-02-28 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in CyberLink PowerDirector 8.00.3022 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .pdl, .iso, .pds, .p2g, or .p2i file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2012-4758 | 1 Cyberlink | 1 Powerproducer | 2024-02-28 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in CyberLink PowerProducer 5.5.3.2325 allow local users to gain privileges via a Trojan horse (1) mfc71loc.dll or (2) mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .ppp or .rdf file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2010-5243 | 1 Cyberlink | 1 Power2go | 2024-02-28 | 6.9 MEDIUM | N/A |
Multiple untrusted search path vulnerabilities in Cyberlink Power2Go 7.0.0.0816 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) MFC71LOC.DLL file in the current working directory, as demonstrated by a directory that contains a .p2g, .iso, .pdl, .pds, or .p2i file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2007-5219 | 1 Cyberlink | 1 Powerdvd | 2024-02-28 | 6.4 MEDIUM | N/A |
Directory traversal vulnerability in the CLAVSetting.CLSetting.1 ActiveX control in CLAVSetting.DLL 1.00.1829 in the CLAVSetting module in CyberLink PowerDVD 7.0 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the argument to the CreateNewFile method. |