Vulnerabilities (CVE)

Filtered by CWE-427
Total 877 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-28745 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in Intel(R) QSFP+ Configuration Utility software, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28740 2 Intel, Microsoft 4 Quickassist Technology, Quickassist Technology Firmware, Quickassist Technology Library and 1 more 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28596 1 Zoom 1 Meetings 2024-11-21 N/A 7.8 HIGH
Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to privileges to root.
CVE-2023-28407 1 Intel 1 Extreme Tuning Utility 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28405 1 Intel 1 Openvino 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in the Intel(R) Distribution of OpenVINO(TM) Toolkit before version 2022.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28388 1 Intel 1 Chipset Device Software 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element in some Intel(R) Chipset Device Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28380 1 Intel 1 Ai Hackathon 2024-11-21 N/A 8.8 HIGH
Uncontrolled search path for the Intel(R) AI Hackathon software before version 2.0.0 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CVE-2023-28140 1 Qualys 1 Cloud Agent 2024-11-21 N/A 6.7 MEDIUM
An Executable Hijacking condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may load a malicious copy of a Dependency Link Library (DLL) via a local attack vector instead of the DLL that the application was expecting, when processes are running with escalated privileges. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.
CVE-2023-28080 1 Dell 1 Powerpath 2024-11-21 N/A 6.7 MEDIUM
PowerPath for Windows, versions 7.0, 7.1 & 7.2 contains DLL Hijacking Vulnerabilities. A regular user (non-admin) can exploit these issues to potentially escalate privileges and execute arbitrary code in the context of NT AUTHORITY\SYSTEM.
CVE-2023-27908 1 Autodesk 1 Installer 2024-11-21 N/A 7.8 HIGH
A maliciously crafted DLL file can be forced to write beyond allocated boundaries in the Autodesk installer when parsing the DLL files and could lead to a Privilege Escalation vulnerability.
CVE-2023-27513 1 Intel 1 Server Information Retrieval Utility 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element in some Intel(R) Server Information Retrieval Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-27362 2024-11-21 N/A 7.0 HIGH
3CX Uncontrolled Search Path Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of 3CX. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20026.
CVE-2023-25944 1 Intel 1 Vcust Tool 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element in some Intel(R) VCUST Tool software downloaded before February 3nd 2023 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-25779 1 Intel 1 Thunderbolt Dch Driver 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-25182 1 Intel 1 Unite 2024-11-21 N/A 4.2 MEDIUM
Uncontrolled search path element in the Intel(R) Unite(R) Client software for Mac before version 4.2.11 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-24591 1 Intel 1 Binary Configuration Tool 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) Binary Configuration Tool software before version 3.4.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-24016 2 Intel, Linux 2 Quartus Prime, Linux Kernel 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element in some Intel(R) Quartus(R) Prime Pro and Standard edition software for linux may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-23577 1 Intel 3 Ite Tech Consumer Infrared Driver, Nuc 11 Enthusiast Kit Nuc11phki7c, Nuc 11 Enthusiast Mini Pc Nuc11phki7caa 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element for some ITE Tech consumer infrared drivers before version 5.5.2.1 for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-22841 1 Intel 2 C621a, Server Firmware Update Utility 2024-11-21 N/A 6.7 MEDIUM
Unquoted search path in the software installer for the System Firmware Update Utility (SysFwUpdt) for some Intel(R) Server Boards and Intel(R) Server Systems Based on Intel(R) 621A Chipset before version 16.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-22818 1 Westerndigital 1 Sandisk Security Installer 2024-11-21 N/A 7.3 HIGH
Multiple DLL Search Order Hijack vulnerabilities were addressed in the SanDisk Security Installer for Windows that could allow attackers with local access to execute arbitrary code by executing the installer in the same folder as the malicious DLL. This can lead to the execution of arbitrary code with the privileges of the vulnerable application or obtain a certain level of persistence on the compromised host.