Search Results (651 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-5039 1 Autodesk 17 Advance Steel, Autocad, Autocad Architecture and 14 more 2026-02-26 7.8 High
A maliciously crafted binary file, when present while loading files in certain Autodesk applications, could lead to execution of arbitrary code in the context of the current process due to an untrusted search path being utilized.
CVE-2025-49457 1 Zoom 7 Meeting Software Development Kit, Rooms, Rooms Controller and 4 more 2026-02-26 9.6 Critical
Untrusted search path in certain Zoom Clients for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access
CVE-2025-60718 1 Microsoft 6 Windows, Windows 11, Windows 11 24h2 and 3 more 2026-02-26 7.8 High
Untrusted search path in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.
CVE-2025-67722 2 Freepbx, Sangoma 2 Freepbx, Freepbx 2026-02-26 7.8 High
FreePBX is an open-source web-based graphical user interface (GUI) that manages Asterisk. Prior to versions 16.0.45 and 17.0.24 of the FreePBX framework, an authenticated local privilege escalation exists in the deprecated FreePBX startup script `amportal`. In the deprecated `amportal` utility, the lookup for the `freepbx_engine` file occurs in `/etc/asterisk/` directories. Typically, these are configured by FreePBX as writable by the **asterisk** user and any members of the **asterisk** group. This means that a member of the **asterisk** group can add their own `freepbx_engine` file in `/etc/asterisk/` and upon `amportal` executing, it would exec that file with root permissions (even though the file was created and placed by a non-root user). Version 16.0.45 and 17.0.24 contain a fix for the issue. Other mitigation strategies are also available. Confirm only trusted local OS system users are members of the `asterisk` group. Look for suspicious files in the `/etc/asterisk/` directory (via Admin -> Config Edit in the GUI, or via CLI). Double-check that `live_dangerously = no` is set (or unconfigured, as the default is **no**) in `/etc/asterisk/asterisk.conf` file. Eliminate any unsafe custom use of Asterisk dial plan applications and functions that potentially can manipulate the file system, e.g., System(), FILE(), etc.
CVE-2023-43586 1 Zoom 4 Meeting Software Development Kit, Video Software Development Kit, Virtual Desktop Infrastructure and 1 more 2026-02-25 7.3 High
Path traversal in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows may allow an authenticated user to conduct an escalation of privilege via network access.
CVE-2023-48670 1 Dell 1 Supportassist For Home Pcs 2026-02-25 7.3 High
Dell SupportAssist for Home PCs version 3.14.1 and prior versions contain a privilege escalation vulnerability in the installer. A local low privileged authenticated attacker may potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with elevated privileges.
CVE-2025-30399 4 Apple, Linux, Microsoft and 1 more 8 Macos, Linux Kernel, .net and 5 more 2026-02-20 7.5 High
Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network.
CVE-2025-21399 1 Microsoft 3 Edge, Edge Update, Edge Update Setup 2026-02-13 7.4 High
Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability
CVE-2025-27743 1 Microsoft 20 System Center Data Protection Manager, System Center Data Protection Manager 2019, System Center Data Protection Manager 2022 and 17 more 2026-02-13 7.8 High
Untrusted search path in System Center allows an authorized attacker to elevate privileges locally.
CVE-2025-15321 1 Tanium 1 Tanos 2026-02-10 2.7 Low
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
CVE-2025-12793 1 Asus 2 Asussoftwaremanageragent, Myasus 2026-01-28 7.8 High
An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgent. A local attacker may influence the application to load a DLL from an attacker-controlled location, potentially resulting in arbitrary code execution. Refer to the ' Security Update for MyASUS' section on the ASUS Security Advisory for more information.
CVE-2025-29903 1 Jetbrains 1 Runtime 2026-01-13 5.2 Medium
In JetBrains Runtime before 21.0.6b872.80 arbitrary dynamic library execution due to insecure macOS flags was possible
CVE-2024-53866 1 Pnpm 1 Pnpm 2025-12-31 9.8 Critical
The package manager pnpm prior to version 9.15.0 seems to mishandle overrides and global cache: Overrides from one workspace leak into npm metadata saved in global cache; npm metadata from global cache affects other workspaces; and installs by default don't revalidate the data (including on first lockfile generation). This can make workspace A (even running with `ignore-scripts=true`) posion global cache and execute scripts in workspace B. Users generally expect `ignore-scripts` to be sufficient to prevent immediate code execution on install (e.g. when the tree is just repacked/bundled without executing it). Here, that expectation is broken. Global state integrity is lost via operations that one would expect to be secure, enabling subsequently running arbitrary code execution on installs. Version 9.15.0 fixes the issue. As a work-around, use separate cache and store dirs in each workspace.
CVE-2025-26155 2 Microsoft, Ncp-e 5 Windows, Ncp Secure Entry Client, Secure Client and 2 more 2025-12-30 9.8 Critical
NCP Secure Enterprise Client 13.18 and NCP Secure Entry Windows Client 13.19 have an Untrusted Search Path vulnerability.
CVE-2025-12819 1 Pgbouncer 1 Pgbouncer 2025-12-27 7.5 High
Untrusted search path in auth_query connection handler in PgBouncer before 1.25.1 allows an unauthenticated attacker to execute arbitrary SQL during authentication via a malicious search_path parameter in the StartupMessage.
CVE-2024-30100 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2025-12-17 7.8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-35260 1 Microsoft 1 Power Platform 2025-12-17 8 High
An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network.
CVE-2023-41840 1 Fortinet 1 Forticlient 2025-12-16 7.4 High
A untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.
CVE-2024-12168 1 Yandex 1 Yandex Telemost 2025-12-03 7.8 High
Yandex Telemost for Desktop before 2.7.0 has a DLL Hijacking Vulnerability because an untrusted search path is used.
CVE-2024-27303 2 Electron, Microsoft 2 Electron-builder, Windows 2025-12-03 7.3 High
electron-builder is a solution to package and build a ready for distribution Electron, Proton Native app for macOS, Windows and Linux. A vulnerability that only affects eletron-builder prior to 24.13.2 in Windows, the NSIS installer makes a system call to open cmd.exe via NSExec in the `.nsh` installer script. NSExec by default searches the current directory of where the installer is located before searching `PATH`. This means that if an attacker can place a malicious executable file named cmd.exe in the same folder as the installer, the installer will run the malicious file. Version 24.13.2 fixes this issue. No known workaround exists. The code executes at the installer-level before the app is present on the system, so there's no way to check if it exists in a current installer.