Total
785 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-7193 | 1 Mp3tag | 1 Mp3tag | 2024-11-20 | N/A | 7.8 HIGH |
A vulnerability has been found in Mp3tag up to 3.26d and classified as problematic. This vulnerability affects unknown code in the library tak_deco_lib.dll of the component DLL Handler. The manipulation leads to uncontrolled search path. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.26e is able to address this issue. It is recommended to upgrade the affected component. VDB-272614 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early, responded in a very professional manner and immediately released a fixed version of the affected product. | |||||
CVE-2024-34167 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path for the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-31407 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path in some Intel(R) High Level Synthesis Compiler software for Intel(R) Quartus(R) Prime Pro Edition Software before version 24.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-37024 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path for some ACAT software maintained by Intel(R) for Windows before version 3.11.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-35245 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path element in some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-26017 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path in some Intel(R) Rendering Toolkit software before version 2024.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-34165 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path in some Intel(R) oneAPI DPC++/C++ Compiler before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-34164 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path element in some Intel(R) MAS software before version 2.5 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-23312 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path for some Intel(R) Binary Configuration Tool software for Windows before version 3.4.5 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-28950 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path for some Intel(R) oneAPI Math Kernel Library software for Windows before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-28952 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path for some Intel(R) IPP software for Windows before version 2021.12.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-28881 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path for some Intel(R) Fortran Compiler Classic software before version 2021.13 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-38387 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path in the Intel(R) Graphics Driver installers for versions 15.40 and 15.45 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-36245 | 2024-11-15 | N/A | N/A | ||
Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-47942 | 1 Siemens | 1 Solid Edge Se2024 | 2024-11-13 | N/A | 7.3 HIGH |
A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 9). The affected applications suffer from a DLL hijacking vulnerability. This could allow an attacker to execute arbitrary code via placing a crafted DLL file on the system. | |||||
CVE-2022-23410 | 1 Axis | 1 Ip Utility | 2024-11-08 | 4.4 MEDIUM | 7.8 HIGH |
AXIS IP Utility before 4.18.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder. | |||||
CVE-2024-10093 | 1 Vso-software | 1 Convertxtodvd | 2024-11-01 | N/A | 7.8 HIGH |
A vulnerability, which was classified as critical, was found in VSO ConvertXtoDvd 7.0.0.83. Affected is an unknown function in the library avcodec.dll of the file ConvertXtoDvd.exe. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2024-48605 | 1 Helakuru | 1 Helakuru | 2024-10-30 | N/A | 7.8 HIGH |
An issue in Helakuru Desktop Application v1.1 allows a local attacker to execute arbitrary code via the lack of proper validation of the wow64log.dll file. | |||||
CVE-2023-24591 | 1 Intel | 1 Binary Configuration Tool | 2024-10-29 | N/A | 7.8 HIGH |
Uncontrolled search path in some Intel(R) Binary Configuration Tool software before version 3.4.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2023-32618 | 1 Intel | 1 Oneapi | 2024-10-29 | N/A | 7.8 HIGH |
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.2 may allow an authenticated user to potentially enable escalation of privilege via local access. |