In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
Untrusted search path vulnerability in NFC Port Software Version 18.104.22.168 and earlier (for RC-S310, RC-S320, RC-S330, RC-S370, RC-S380, RC-S380/S), NFC Port Software Version 22.214.171.124 and earlier (for RC-S320, RC-S310/J1C, RC-S310/ED4C), PC/SC Activator for Type B Ver.126.96.36.199 and earlier, SFCard Viewer 2 Ver.188.8.131.52 and earlier, NFC Net Installer Ver.184.108.40.206 and earlier allows an attacker to gain pri ...
In EMC VNX2 versions prior to OE for File 220.127.116.11 and VNX1 versions prior to OE for File 18.104.22.168, a local authenticated user can load a maliciously crafted file in the search path which may potentially allow the attacker to execute arbitrary code on the targeted VNX Control Station system, aka an uncontrolled search path vulnerability.
An Uncontrolled Search Path Element issue was discovered in AzeoTech DAQFactory versions prior to 17.1. An uncontrolled search path element vulnerability has been identified, which may execute malicious DLL files that have been placed within the search path.