The resulting log file adopts the file permissions of the source of the symbolic link (in this case, the Everyone group). Using a symbolic link allows an attacker to point the log file to a privileged location such as %WINDIR%\System32. SecureConnector runs with administrative privileges and writes logs entries to a file in %PROGRAMDATA%\ForeScout SecureConnector\ that has full permissions for the Everyone group. A local privilege escalation vulnerability is present in the logging function.
Trend Micro Password Manager version 5 (Consumer) is vulnerable to a DLL Hijacking vulnerability which could allow an attacker to inject a malicious DLL file during the installation progress and could execute a malicious program each time a user installs a program.Īn issue was discovered in Forescout CounterACT before 8.1.4.
Corel videostudio pro x6 kernelbase.dll update#
Exploitation of this issue requires user interaction.Īcronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.ĭLL Search Order Hijacking Vulnerability in McAfee Drive Encryption (MDE) prior to 7.3.0 HF2 (7.3.0.183) allows local users to execute arbitrary code and escalate privileges via execution from a compromised folder.
An attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user via DLL hijacking.
Corel videostudio pro x6 kernelbase.dll .dll#
dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's,Īcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.ĭelta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed.Īcronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking. Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4.