
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in KMPlayer version 4.2.2.73, identified as CVE-2023-1745. The vulnerability affects the software's DLL handling mechanism and was classified as a DLL hijacking vulnerability (CWE-427: Uncontrolled Search Path Element). The issue was discovered in the SHFOLDER.dll component and allows attackers to escalate privileges through Current Working Directory (CWD) DLL planting (GitHub POC).
The vulnerability is a DLL hijacking issue that occurs in the SHFOLDER.dll component of KMPlayer. The flaw allows attackers to exploit the application's DLL search order by placing a malicious DLL in the current working directory. When the application attempts to load SHFOLDER.dll, it may load the malicious DLL instead of the legitimate system DLL, leading to arbitrary code execution with elevated privileges (GitHub POC).
The successful exploitation of this vulnerability could allow attackers to execute arbitrary code with elevated privileges on the affected system. This could potentially lead to complete system compromise, allowing attackers to install programs, create new accounts with full user rights, or view, change, or delete data (GitHub POC).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."