Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
History

Mon, 16 Sep 2024 19:45:00 +0000

Type Values Removed Values Added
Title AUVESY Versiondog AUVESY Versiondog

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2021-10-22T11:22:44.045095Z

Updated: 2024-09-16T19:30:55.153Z

Reserved: 2021-08-10T00:00:00

Link: CVE-2021-38469

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-22T12:15:08.650

Modified: 2024-11-21T06:17:10.800

Link: CVE-2021-38469

cve-icon Redhat

No data.