Vulnerabilities (CVE)

Filtered by CWE-427
Total 785 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-24578 1 Dlink 2 Dsl2888a, Dsl2888a Firmware 2023-04-26 3.3 LOW 6.5 MEDIUM
An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. It has a misconfigured FTP service that allows a malicious network user to access system folders and download sensitive files (such as the password hash file).
CVE-2023-29187 1 Sap 1 Sapsetup 2023-04-26 N/A 6.7 MEDIUM
A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) - version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attackers control.
CVE-2022-26032 1 Intel 1 Distribution For Python 2023-04-07 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28596 1 Zoom 1 Meetings 2023-04-03 N/A 7.8 HIGH
Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to privileges to root.
CVE-2019-1794 1 Cisco 1 Meeting Server 2023-03-24 3.6 LOW 5.1 MEDIUM
A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources.
CVE-2022-38136 1 Intel 1 Oneapi Dpc\+\+\/c\+\+ Compiler 2023-03-17 N/A 7.3 HIGH
Uncontrolled search path in the Intel(R) oneAPI DPC++/C++ Compiler for Windows and Intel Fortran Compiler for Windows before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-37329 1 Intel 2 Fpga Software Development Kit, Quartus Prime 2023-03-06 N/A 7.3 HIGH
Uncontrolled search path in some Intel(R) Quartus(R) Prime Pro and Standard Edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-37340 1 Intel 1 Quickassist Technology 2023-03-06 N/A 7.3 HIGH
Uncontrolled search path in some Intel(R) QAT drivers for Windows before version 1.6 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-41314 1 Intel 16 Administrative Tools For Intel Network Adapters, Ethernet Controller E810, Ethernet Network Adapter E810-cqda1 and 13 more 2023-03-06 N/A 7.8 HIGH
Uncontrolled search path in some Intel(R) Network Adapter installer software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-36398 1 Intel 1 Battery Life Diagnostic Tool 2023-03-02 N/A 7.8 HIGH
Uncontrolled search path in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-25905 1 Intel 1 Oneapi Data Analytics Library 2023-02-28 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) oneAPI Data Analytics Library (oneDAL) before version 2021.5 for Intel(R) oneAPI Base Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-26052 1 Intel 1 Mpi Library 2023-02-28 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) MPI Library before version 2021.6 for Intel(R) oneAPI HPC Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-26062 1 Intel 1 Trace Analyzer And Collector 2023-02-28 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) Trace Analyzer and Collector before version 2021.6 for Intel(R) oneAPI HPC Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-26076 1 Intel 1 Oneapi Deep Neural Network 2023-02-28 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) oneAPI Deep Neural Network (oneDNN) before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-26345 1 Intel 1 Openmp 2023-02-28 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) oneAPI Toolkit OpenMP before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-26421 1 Intel 1 Oneapi Dpc\+\+\/c\+\+ Compiler Runtime 2023-02-28 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) oneAPI DPC++/C++ Compiler Runtime before version 2022.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-26425 1 Intel 1 Oneapi Collective Communications Library 2023-02-28 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) oneAPI Collective Communications Library (oneCCL) before version 2021.6 for Intel(R) oneAPI Base Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-26512 1 Intel 1 Fpga Add-on 2023-02-28 N/A 7.3 HIGH
Uncontrolled search path element in the Intel(R) FPGA Add-on for Intel(R) oneAPI Base Toolkit before version 2022.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2021-44226 2 Microsoft, Razer 2 Windows, Synapse 2023-02-22 6.9 MEDIUM 7.3 HIGH
Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
CVE-2023-22283 1 F5 2 Big-ip Access Policy Manager, Big-ip Edge 2023-02-09 N/A 6.5 MEDIUM
On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.