Total
800 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-38571 | 2 Foxitsoftware, Microsoft | 3 Foxit Reader, Phantompdf, Windows | 2024-08-04 | 7.8 High |
An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows DLL hijacking, aka CNVD-C-2021-68000 and CNVD-C-2021-68502. | ||||
CVE-2021-38410 | 1 Aveva | 7 Batch Management, Enterprise Data Management, Manufacturing Execution System and 4 more | 2024-08-04 | 7.3 High |
AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path. | ||||
CVE-2021-38086 | 2 Acronis, Microsoft | 2 Cyber Protect, Windows | 2024-08-04 | 7.8 High |
Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking. | ||||
CVE-2021-37617 | 1 Nextcloud | 1 Desktop | 2024-08-04 | 7.3 High |
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. The Nextcloud Desktop Client invokes its uninstaller script when being installed to make sure there are no remnants of previous installations. In versions 3.0.3 through 3.2.4, the Client searches the `Uninstall.exe` file in a folder that can be written by regular users. This could lead to a case where a malicious user creates a malicious `Uninstall.exe`, which would be executed with administrative privileges on the Nextcloud Desktop Client installation. This issue is fixed in Nextcloud Desktop Client version 3.3.0. As a workaround, do not allow untrusted users to create content in the `C:\` system folder and verify that there is no malicious `C:\Uninstall.exe` file on the system. | ||||
CVE-2021-36770 | 3 Fedoraproject, P5-encode Project, Perl | 3 Fedora, P5-encode, Perl | 2024-08-04 | 7.8 High |
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value. | ||||
CVE-2021-36753 | 1 Bat Project | 1 Bat | 2024-08-04 | 7.8 High |
sharkdp BAT before 0.18.2 executes less.exe from the current working directory. | ||||
CVE-2021-36631 | 1 Baidu | 1 Baidunetdisk | 2024-08-04 | 6.7 Medium |
Untrusted search path vulnerability in Baidunetdisk Version 7.4.3 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | ||||
CVE-2021-36376 | 2 Delta Project, Microsoft | 2 Delta, Windows | 2024-08-04 | 7.8 High |
dandavison delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory. | ||||
CVE-2021-36216 | 1 Linecorp | 1 Line | 2024-08-04 | 7.8 High |
LINE for Windows 6.2.1.2289 and before allows arbitrary code execution via malicious DLL injection. | ||||
CVE-2021-35957 | 1 Stormshield | 1 Endpoint Security | 2024-08-04 | 6.7 Medium |
Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\system32) with malicious ones. | ||||
CVE-2021-34803 | 2 Microsoft, Teamviewer | 2 Windows, Teamviewer | 2024-08-04 | 7.8 High |
TeamViewer before 14.7.48644 on Windows loads untrusted DLLs in certain situations. | ||||
CVE-2021-33064 | 1 Intel | 1 System Studio | 2024-08-03 | 6.7 Medium |
Uncontrolled search path in the software installer for Intel(R) System Studio for all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2021-33101 | 1 Intel | 1 Graphics Performance Analyzers | 2024-08-03 | 7.8 High |
Uncontrolled search path in the Intel(R) GPA software before version 21.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2021-32580 | 1 Acronis | 1 True Image | 2024-08-03 | 7.8 High |
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking. | ||||
CVE-2021-32466 | 2 Microsoft, Trendmicro | 2 Windows, Housecall For Home Networks | 2024-08-03 | 7.0 High |
An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | ||||
CVE-2021-31840 | 1 Mcafee | 1 Mcafee Agent | 2024-08-03 | 7.3 High |
A vulnerability in the preloading mechanism of specific dynamic link libraries in McAfee Agent for Windows prior to 5.7.3 could allow an authenticated, local attacker to perform a DLL preloading attack with unsigned DLLs. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. This would result in the user gaining elevated permissions and being able to execute arbitrary code. | ||||
CVE-2021-31847 | 1 Mcafee | 1 Agent | 2024-08-03 | 8.2 High |
Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature. | ||||
CVE-2021-31853 | 1 Mcafee | 1 Drive Encryption | 2024-08-03 | 7.8 High |
DLL Search Order Hijacking Vulnerability in McAfee Drive Encryption (MDE) prior to 7.3.0 HF2 (7.3.0.183) allows local users to execute arbitrary code and escalate privileges via execution from a compromised folder. | ||||
CVE-2021-31637 | 1 Uwamp Project | 1 Uwamp | 2024-08-03 | 7.8 High |
An issue found in UwAmp v.1.1, 1.2, 1.3, 2.0, 2.1, 2.2, 2.2.1, 3.0.0, 3.0.1, 3.0.2 allows a remote attacker to execute arbitrary code via a crafted DLL. | ||||
CVE-2021-30360 | 1 Checkpoint | 1 Endpoint Security | 2024-08-03 | 7.8 High |
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges. |