Vulnerabilities (CVE)

Filtered by CWE-426
Total 581 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-10863 1 Hitachi-solutions 1 Confidential File Decryption 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in HIBUN Confidential File Decryption program prior to 10.50.0.5 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. Note this is a separate vulnerability from CVE-2017-10865.
CVE-2017-2208 1 Acquisition Technology And Logistics Agency 1 Installer Of Electronic Tendering 2025-04-20 6.8 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in Installer of Electronic tendering and bid opening system available prior to June 12, 2017 allows an attacker to execute arbitrary code via a specially crafted executable file in an unspecified directory.
CVE-2017-10865 1 Hitachi-solutions 1 Confidential File Decryption 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in HIBUN Confidential File Decryption program prior to 10.50.0.5 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. Note this is a separate vulnerability from CVE-2017-10863.
CVE-2017-2108 1 Softbank 1 Primedrive Desktop Application 2025-04-20 7.2 HIGH 7.8 HIGH
Untrusted search path vulnerability in PrimeDrive Desktop Application 1.4.3 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-2215 1 E-tax.nta 1 E-tax 2025-04-20 6.8 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in Installer of "Setup file of advance preparation" (jizen_setup.exe) (The version which was available on the website prior to 2017 June 12) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-2225 1 Mext 1 Ebidsettingchecker 2025-04-20 6.8 MEDIUM 9.8 CRITICAL
Untrusted search path vulnerability in EbidSettingChecker.exe (version 1.0.0.0) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-2218 2 Apple, Microsoft 2 Quicktime, Windows 2025-04-20 6.8 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in Installer of QuickTime for Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-2157 1 Jpki 1 The Public Certification Service For Individuals 2025-04-20 4.4 MEDIUM 7.3 HIGH
Untrusted search path vulnerability in installers for The Public Certification Service for Individuals "The JPKI user's software (for Windows 7 and later)" Ver3.1 and earlier, The Public Certification Service for Individuals "The JPKI user's software (for Windows Vista)", The Public Certification Service for Individuals "The JPKI user's software" Ver2.6 and earlier that were available until April 27, 2017 allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-5235 1 Rapid7 1 Metasploit 2025-04-20 6.8 MEDIUM 7.8 HIGH
Rapid7 Metasploit Pro installers prior to version 4.13.0-2017022101 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer.
CVE-2017-2175 1 Ipa 1 Empirical Project Monitor - Extended 2025-04-20 6.8 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in Empirical Project Monitor - eXtended all versions allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-10825 1 Flets-w 1 Flets Easy Setup Tool 2025-04-20 6.8 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in Installer of Flets Easy Setup Tool Ver1.2.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-10864 1 Hitachi-solutions 1 Confidential File Viewer 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in Installer of HIBUN Confidential File Viewer prior to 11.20.0001 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-2242 1 Ntt 1 Flets Setsuzoku Tool 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in Flets Setsuzoku Tool for Windows all versions allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-8137 1 Huawei 1 Hedex Lite 2025-04-20 9.3 HIGH 7.8 HIGH
HedEx Earlier than V200R006C00 versions has a dynamic link library (DLL) hijacking vulnerability due to calling the DDL file by accessing a relative path. An attacker could exploit this vulnerability to tamper with the DLL file, leading to DLL hijacking.
CVE-2017-10849 1 Fujixerox 1 Docuworks 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in Self-extracting document generated by DocuWorks 8.0.7 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-2248 1 Chitora 1 Lhaz\+ 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in Installer of Lhaz+ version 3.4.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-10858 1 Daj 1 I-filter Installer 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in "i-filter 6.0 install program" file version 1.0.8.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-10848 1 Fujixerox 2 Docuworks, Docuworks Viewer Light 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in Installers for DocuWorks 8.0.7 and earlier and DocuWorks Viewer Light published in Jul 2017 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-10821 1 Enecho.meti 1 Shin Kikan Toukei Houkoku Data Nyuryokuyou Program 2025-04-20 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in Installer for Shin Kikan Toukei Houkoku Data Nyuryokuyou Program (program released on 2013 September 30) Distributed on the website until 2017 May 17 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2017-2178 1 Atla 1 Electronic Tendering And Bid Opening System 2025-04-20 6.8 MEDIUM 8.8 HIGH
Untrusted search path vulnerability in Installer of electronic tendering and bid opening system available prior to May 25, 2017 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.