Vulnerabilities (CVE)

Filtered by CWE-427
Total 844 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-6021 1 Checkpoint 1 Endpoint Security 2024-11-21 4.4 MEDIUM 7.8 HIGH
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client’s privileges.
CVE-2020-5992 2 Microsoft, Nvidia 2 Windows, Geforce Now 2024-11-21 4.4 MEDIUM 7.8 HIGH
NVIDIA GeForce NOW application software on Windows, all versions prior to 2.0.25.119, contains a vulnerability in its open-source software dependency in which the OpenSSL library is vulnerable to binary planting attacks by a local user, which may lead to code execution or escalation of privileges.
CVE-2020-5977 1 Nvidia 1 Geforce Experience 2024-11-21 4.4 MEDIUM 7.8 HIGH
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.
CVE-2020-5740 2 Microsoft, Plex 2 Windows, Media Server 2024-11-21 7.2 HIGH 7.8 HIGH
Improper Input Validation in Plex Media Server on Windows allows a local, unauthenticated attacker to execute arbitrary Python code with SYSTEM privileges.
CVE-2020-5681 1 Epson 2 Epsonnet Setupmanager, Offirio Synergyware Printdirector 2024-11-21 9.3 HIGH 7.8 HIGH
Untrusted search path vulnerability in self-extracting files created by EpsonNet SetupManager versions 2.2.14 and earlier, and Offirio SynergyWare PrintDirector versions 1.6x/1.6y and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-5357 1 Dell 8 Dock Wd15, Dock Wd15 Firmware, Dock Wd19 and 5 more 2024-11-21 2.6 LOW 7.1 HIGH
Dell Dock Firmware Update Utilities for Dell Client Consumer and Commercial docking stations contain an Arbitrary File Overwrite vulnerability. The vulnerability is limited to the Dell Dock Firmware Update Utilities during the time window while being executed by an administrator. During this time window, a locally authenticated low-privileged malicious user could exploit this vulnerability by tricking an administrator into overwriting arbitrary files via a symlink attack. The vulnerability does not affect the actual binary payload that the update utility delivers.
CVE-2020-5316 1 Dell 2 Supportassist For Business Pcs, Supportassist For Home Pcs 2024-11-21 4.6 MEDIUM 7.8 HIGH
Dell SupportAssist for Business PCs versions 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3 and Dell SupportAssist for Home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4 contain an uncontrolled search path vulnerability. A locally authenticated low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code.
CVE-2020-5145 1 Sonicwall 1 Global Vpn Client 2024-11-21 6.9 MEDIUM 8.6 HIGH
SonicWall Global VPN client version 4.10.4.0314 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to remote code execution in the target system.
CVE-2020-4623 2 Ibm, Microsoft 2 I2 Ibase, Windows 2024-11-21 4.4 MEDIUM 6.5 MEDIUM
IBM i2 iBase 8.9.13 could allow a local authenticated attacker to execute arbitrary code on the system, caused by a DLL search order hijacking flaw. By using a specially-crafted .DLL file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 184984.
CVE-2020-3803 3 Adobe, Apple, Microsoft 4 Acrobat Dc, Acrobat Reader Dc, Macos and 1 more 2024-11-21 4.4 MEDIUM 7.8 HIGH
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.
CVE-2020-3535 1 Cisco 1 Webex Teams 2024-11-21 7.2 HIGH 7.8 HIGH
A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account.
CVE-2020-35483 1 Anydesk 1 Anydesk 2024-11-21 4.4 MEDIUM 7.8 HIGH
AnyDesk before 6.1.0 on Windows, when run in portable mode on a system where the attacker has write access to the application directory, allows this attacker to compromise a local user account via a read-only setting for a Trojan horse gcapi.dll file.
CVE-2020-2049 2 Microsoft, Paloaltonetworks 2 Windows, Cortex Xdr Agent 2024-11-21 7.2 HIGH 7.8 HIGH
A local privilege escalation vulnerability exists in Palo Alto Networks Cortex XDR Agent on the Windows platform that allows an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory. This issue impacts: All versions of Cortex XDR Agent 7.1 with content update 149 and earlier versions; All versions of Cortex XDR Agent 7.2 with content update 149 and earlier versions.
CVE-2020-29654 1 Westerndigital 1 Dashboard 2024-11-21 6.9 MEDIUM 7.8 HIGH
Western Digital Dashboard before 3.2.2.9 allows DLL Hijacking that leads to compromise of the SYSTEM account.
CVE-2020-29157 1 Raonwiz 1 Raon K Editor 2024-11-21 6.9 MEDIUM 7.8 HIGH
An issue in RAONWIZ K Editor v2018.0.0.10 allows attackers to perform a DLL hijacking attack when the service or system is restarted.
CVE-2020-28950 1 Kaspersky 1 Anti-ransomware Tool 2024-11-21 6.9 MEDIUM 7.8 HIGH
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CVE-2020-28646 1 Owncloud 1 Owncloud 2024-11-21 4.4 MEDIUM 7.8 HIGH
ownCloud owncloud/client before 2.7 allows DLL Injection. The desktop client loaded development plugins from certain directories when they were present.
CVE-2020-28369 1 Beyondtrust 1 Privilege Management For Windows 2024-11-21 N/A 7.8 HIGH
In BeyondTrust Privilege Management for Windows (aka PMfW) through 5.7, a SYSTEM installation causes Cryptbase.dll to be loaded from the user-writable location %WINDIR%\Temp.
CVE-2020-27955 1 Git Large File Storage Project 1 Git Large File Storage 2024-11-21 10.0 HIGH 9.8 CRITICAL
Git LFS 2.12.0 allows Remote Code Execution.
CVE-2020-27348 1 Canonical 2 Snapcraft, Ubuntu Linux 2024-11-21 4.4 MEDIUM 6.8 MEDIUM
In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.