![]() (An attacker must already have user privileges on Windows to exploit this vulnerability.)Ī untrusted search path vulnerability in Fortinet FortiClientWindows 7.0.9 allows an attacker to perform a DLL Hijack attack via a malicious OpenSSL engine library in the search path.Ī DLL hijacking vulnerability in Panda Security VPN for Windows prior to version v15.14.8 allows attackers to execute arbitrary code via placing a crafted DLL file in the same directory as PANDAVPN.exe. Successful exploitation via a local attacker could result in command execution in the target system.Ī DLL hijacking vulnerability in Samsung Memory Card & UFD Authentication Utility PC Software before 1.0.1 could allow a local attacker to escalate privileges. SonicWall NetExtender Windows (32-bit and 64-bit) client 10.2.336 and earlier versions have a DLL Search Order Hijacking vulnerability in the start-up DLL component. ![]() The following products are affected: Acronis Agent (Windows) before build 36497. Local privilege escalation due to DLL hijacking vulnerability. This issue has been patched in version 4.5.0. By placing a DLL in the Folder c:\DLLs, an attacker can run arbitrary code on every execution of BleachBit for Windows. BleachBit for Windows up to version 4.4.2 is vulnerable to a DLL Hijacking vulnerability. A local attacker could execute arbitrary code by injecting DLL files into the same folder where the application is installed, resulting in DLL hijacking in edputil.dll, samlib.dll, urlmon.dll, sspicli.dll, propsys.dll and profapi.dll files.īleachBit cleans files to free disk space and to maintain privacy. Uncontrolled search path element vulnerability in Plesk Installer affects version 3.27.0.0.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |