Filtered by CWE-427
Filtered by vendor Subscriptions
Total 812 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-35769 1 Intel 1 Computing Improvement Program 2024-11-21 6.7 Medium
Uncontrolled search path in some Intel(R) CIP software before version 2.4.10577 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-35192 1 Intel 1 Graphics Performance Analyzer 2024-11-21 6.7 Medium
Uncontrolled search path in some Intel(R) GPA Framework software before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-35060 1 Intel 1 Battery Life Diagnostic Tool 2024-11-21 6.7 Medium
Uncontrolled search path in some Intel(R) Battery Life Diagnostic Tool software before version 2.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-34430 1 Intel 1 Battery Life Diagnostic Tool 2024-11-21 6.7 Medium
Uncontrolled search path in some Intel Battery Life Diagnostic Tool software before version 2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-34355 2 Intel, Intel Server Board M10jnp2sb Integrated Bmc Video Drivers 3 Integrated Bmc Video Driver, Server Board M10jnp2sb, Intel Server Board M10jnp2sb Integrated Bmc Video Drive 2024-11-21 6.7 Medium
Uncontrolled search path element for some Intel(R) Server Board M10JNP2SB integrated BMC video drivers before version 3.0 for Microsoft Windows and before version 1.13.4 for linux may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-34350 1 Intel 1 Extreme Tuning Utility 2024-11-21 6.7 Medium
Uncontrolled search path element in some Intel(R) XTU software before version 7.12.0.15 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-33874 1 Intel 7 Hid Event Filter Driver, Nuc 12 Pro Board Nuc12wsbv5, Nuc 12 Pro Board Nuc12wsbv7 and 4 more 2024-11-21 6.7 Medium
Uncontrolled search path in some Intel(R) NUC 12 Pro Kits & Mini PCs - NUC12WS Intel(R) HID Event Filter Driver installation software before version 2.2.2.1 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-32660 1 Intel 2 Nuc Kit Nuc6i7kyk, Thunderbolt 3 Controller Firmware 2024-11-21 6.7 Medium
Uncontrolled search path in some Intel(R) NUC Kit NUC6i7KYK Thunderbolt(TM) 3 Firmware Update Tool installation software before version 46 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-32646 1 Intel 1 Virtual Raid On Cpu 2024-11-21 6.7 Medium
Uncontrolled search path element in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-32618 1 Intel 1 Oneapi 2024-11-21 6.7 Medium
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-32272 1 Intel 1 Nuc Pro Software Suite 2024-11-21 7.9 High
Uncontrolled search path in some Intel NUC Pro Software Suite Configuration Tool software installers before version 3.0.0.6 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-31197 1 Intel 1 Trace Analyzer And Collector 2024-11-21 6.7 Medium
Uncontrolled search path in the Intel(R) Trace Analyzer and Collector before version 2020 update 3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-31027 2 Microsoft, Nvidia 2 Windows, Virtual Gpu 2024-11-21 8.2 High
NVIDIA GPU Display Driver for Windows contains a vulnerability that allows Windows users with low levels of privilege to escalate privileges when an administrator is updating GPU drivers, which may lead to escalation of privileges.
CVE-2023-31016 2 Microsoft, Nvidia 2 Windows, Virtual Gpu 2024-11-21 7.3 High
NVIDIA GPU Display Driver for Windows contains a vulnerability where an uncontrolled search path element may allow an attacker to execute arbitrary code, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
CVE-2023-30237 1 Cyberghostvpn 1 Cyberghost 2024-11-21 7.8 High
CyberGhostVPN Windows Client before v8.3.10.10015 was discovered to contain a DLL injection vulnerability via the component Dashboard.exe.
CVE-2023-2355 1 Acronis 1 Snap Deploy 2024-11-21 7.8 High
Local privilege escalation due to a DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 3900.
CVE-2023-29504 1 Intel 1 Realsense D400 Series Dynamic Calibration Tool 2024-11-21 6.7 Medium
Uncontrolled search path element in some Intel(R) RealSense(TM) Dynamic Calibration software before version 2.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-29445 1 Ptc 3 Kepware Kepserverex, Thingworx Industrial Connectivity, Thingworx Kepware Server 2024-11-21 7.8 High
An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM.
CVE-2023-29444 1 Ptc 3 Kepware Kepserverex, Thingworx Industrial Connectivity, Thingworx Kepware Server 2024-11-21 6.3 Medium
An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM. Alternatively, they could host a trojanized version of the software and trick victims into downloading and installing their malicious version to gain initial access and code execution.
CVE-2023-29187 1 Sap 1 Sapsetup 2024-11-21 6.7 Medium
A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) - version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attackers control.