CVE List

Id CVE No. Status Description Phase Votes Comments Actions
55283  CVE-2012-2040  Candidate  Untrusted search path vulnerability in the installer in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows local users to gain privileges via a Trojan horse executable file in an unspecified directory.  Assigned (20120402)  None (candidate not yet proposed)    View
90976  CVE-2016-4157  Candidate  Untrusted search path vulnerability in the installer in Adobe Creative Cloud Desktop Application before 3.7.0.272 on Windows allows local users to gain privileges via a Trojan horse resource in an unspecified directory.  Assigned (20160427)  None (candidate not yet proposed)    View
88100  CVE-2016-1281  Candidate  Untrusted search path vulnerability in the installer for TrueCrypt 7.2 and 7.1a, VeraCrypt before 1.17-BETA, and possibly other products allows local users to execute arbitrary code with administrator privileges and conduct DLL hijacking attacks via a Trojan horse DLL in the "application directory", as demonstrated with the USP10.dll, RichEd20.dll, NTMarta.dll and SRClient.dll DLLs.  Assigned (20160102)  None (candidate not yet proposed)    View
58621  CVE-2012-5378  Candidate  Untrusted search path vulnerability in the installation functionality in ActiveTcl 8.5.12, when installed in the top-level C: directory, allows local users to gain privileges via a Trojan horse DLL in the C:TDin directory, which is added to the PATH system environment variable, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview.  Assigned (20121011)  None (candidate not yet proposed)    View
58620  CVE-2012-5377  Candidate  Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C: directory, allows local users to gain privileges via a Trojan horse DLL in the C:PerlSitein directory, which is added to the PATH system environment variable, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview.  Assigned (20121011)  None (candidate not yet proposed)    View

Page 830 of 20943, showing 5 records out of 104715 total, starting on record 4146, ending on 4150

Actions