Логотип exploitDog
bind:CVE-2025-9267
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-9267

Количество 3

Количество 3

nvd логотип

CVE-2025-9267

5 месяцев назад

In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the current working directory without validating their origin or integrity. This behavior can be exploited by placing a malicious DLL in the same directory as the installer executable, leading to arbitrary code execution with the privileges of the user running the installer. The issue stems from the use of insecure DLL loading practices, such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries.

EPSS: Низкий
github логотип

GHSA-6rrf-p74p-p7q8

5 месяцев назад

In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the current working directory without validating their origin or integrity. This behavior can be exploited by placing a malicious DLL in the same directory as the installer executable, leading to arbitrary code execution with the privileges of the user running the installer. The issue stems from the use of insecure DLL loading practices, such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries.

EPSS: Низкий
fstec логотип

BDU:2025-12441

6 месяцев назад

Уязвимость программного пакета для управления устройствами хранения данных Seagate Toolkit, связанная с загрузкой ненадежных DLL-файлов, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-9267

In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the current working directory without validating their origin or integrity. This behavior can be exploited by placing a malicious DLL in the same directory as the installer executable, leading to arbitrary code execution with the privileges of the user running the installer. The issue stems from the use of insecure DLL loading practices, such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries.

0%
Низкий
5 месяцев назад
github логотип
GHSA-6rrf-p74p-p7q8

In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the current working directory without validating their origin or integrity. This behavior can be exploited by placing a malicious DLL in the same directory as the installer executable, leading to arbitrary code execution with the privileges of the user running the installer. The issue stems from the use of insecure DLL loading practices, such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries.

0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-12441

Уязвимость программного пакета для управления устройствами хранения данных Seagate Toolkit, связанная с загрузкой ненадежных DLL-файлов, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
0%
Низкий
6 месяцев назад

Уязвимостей на страницу