CVE & Exploit Intelligence Database

Updated 42m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
602 results Clear all
CVE-2026-3787 7.0 HIGH EPSS 0.00
UltraVNC 1.6.4.0 - Path Traversal
A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an unknown function in the library cryptbase.dll of the component Windows Service. This manipulation causes uncontrolled search path. The attack requires local access. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-426 Mar 08, 2026
CVE-2026-29089 8.8 HIGH 1 Writeup EPSS 0.00
TimescaleDB 2.23.0-2.25.1 - Code Injection
TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.
CWE-426 Mar 06, 2026
CVE-2026-2998 7.8 HIGH EPSS 0.00
eAI Technologies ERP - DLL Hijacking
ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.
CWE-426 Feb 23, 2026
CVE-2026-25926 7.3 HIGH EPSS 0.00
Notepad++ <8.9.2 - Unsafe Search Path
Notepad++ is a free and open-source source code editor. An Unsafe Search Path vulnerability (CWE-426) exists in versions prior to 8.9.2 when launching Windows Explorer without an absolute executable path. This may allow execution of a malicious explorer.exe if an attacker can control the process working directory. Under certain conditions, this could lead to arbitrary code execution in the context of the running application. Version 8.9.2 patches the issue.
CWE-426 Feb 19, 2026
CVE-2026-2542 7.0 HIGH 1 Writeup EPSS 0.00
Total VPN 0.5.29.0 - Privilege Escalation
A weakness has been identified in Total VPN 0.5.29.0 on Windows. Affected by this vulnerability is an unknown functionality of the file C:\Program Files\Total VPN\win-service.exe. Executing a manipulation can lead to unquoted search path. It is possible to launch the attack on the local host. This attack is characterized by high complexity. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-428 Feb 16, 2026
CVE-2026-2538 7.0 HIGH 1 Writeup EPSS 0.00
Notepad2 4.2.22-4.2.25 - Path Traversal
A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected is an unknown function in the library Msimg32.dll. Performing a manipulation results in uncontrolled search path. Attacking locally is a requirement. The attack's complexity is rated as high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-427 Feb 16, 2026
CVE-2026-2516 7.0 HIGH EPSS 0.00
Unidocs ezPDF DRM Reader/ezPDF Reader 2.0/3.0.0.4 - Path Traversal
A vulnerability was identified in Unidocs ezPDF DRM Reader and ezPDF Reader 2.0/3.0.0.4 on 32-bit. This affects an unknown part in the library SHFOLDER.dll. Such manipulation leads to uncontrolled search path. The attack needs to be performed locally. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-427 Feb 15, 2026
CVE-2026-21508 7.0 HIGH 1 PoC Analysis EPSS 0.00
Microsoft Windows 10 1607 < 10.0.14393.8868 - Authentication Bypass
Improper authentication in Windows Storage allows an authorized attacker to elevate privileges locally.
CWE-287 Feb 10, 2026
CVE-2025-15569 7.0 HIGH EPSS 0.00
Artifex MuPDF <1.26.1 - Path Traversal
A flaw has been found in Artifex MuPDF up to 1.26.1 on Windows. The impacted element is the function get_system_dpi of the file platform/x11/win_main.c. This manipulation causes uncontrolled search path. The attack requires local access. The attack is considered to have high complexity. The exploitability is regarded as difficult. Upgrading to version 1.26.2 is sufficient to resolve this issue. Patch name: ebb125334eb007d64e579204af3c264aadf2e244. Upgrading the affected component is recommended.
CWE-426 Feb 10, 2026
CVE-2026-25880 7.8 HIGH EPSS 0.00
SumatraPDF <3.5.2 - RCE
SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, the PDF reader allows execution of a malicious binary (explorer.exe) located in the same directory as the opened PDF when the user clicks File → “Show in folder”. This behavior leads to arbitrary code execution on the victim’s system with the privileges of the current user, without any warning or user interaction beyond the menu click.
CWE-426 Feb 09, 2026
CVE-2025-15321 2.7 LOW EPSS 0.00
Tanium Tanos < 1.8.3.0196 - Incorrect Authorization
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
CWE-863 Feb 05, 2026
CVE-2025-13491 5.1 MEDIUM EPSS 0.00
IBM App Connect Enterprise <12.19.0-12.0 - Info Disclosure
IBM App Connect Enterprise Certified Container up to 12.19.0 (Continuous Delivery) and 12.0 LTS (Long Term Support) could allow an attacker to access sensitive files or modify configurations due to an untrusted search path.
CWE-426 Feb 05, 2026
CVE-2026-0662 7.8 HIGH EPSS 0.00
Autodesk 3ds Max < 2026.3.2 - Untrusted Search Path
A maliciously crafted project directory, when opening a max file in Autodesk 3ds Max, could lead to execution of arbitrary code in the context of the current process due to an Untrusted Search Path being utilized.
CWE-426 Feb 04, 2026
CVE-2025-65078 EPSS 0.00
Lexmark - Code Injection
An untrusted search path vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code.
CWE-426 Feb 03, 2026
CVE-2026-24051 7.0 HIGH 1 Writeup EPSS 0.00
OpenTelemetry-Go <1.40.0 - Path Hijacking
OpenTelemetry-Go is the Go implementation of OpenTelemetry. The OpenTelemetry Go SDK in version v1.20.0-1.39.0 is vulnerable to Path Hijacking (Untrusted Search Paths) on macOS/Darwin systems. The resource detection code in sdk/resource/host_id.go executes the ioreg system command using a search path. An attacker with the ability to locally modify the PATH environment variable can achieve Arbitrary Code Execution (ACE) within the context of the application. A fix was released with v1.40.0.
CWE-426 Feb 02, 2026
CVE-2026-24070 8.8 HIGH EPSS 0.00
Native Access - Privilege Escalation
During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is deployed as well. The communication with the XPC service of the privileged helper is only allowed if the client process is signed with the corresponding certificate and fulfills the following code signing requirement: "anchor trusted and certificate leaf[subject.CN] = \"Developer ID Application: Native Instruments GmbH (83K5EG6Z9V)\"" The Native Access application was found to be signed with the `com.apple.security.cs.allow-dyld-environment-variables` and `com.apple.security.cs.disable-library-validation` entitlements leading to DYLIB injection and therefore command execution in the context of this application. A low privileged user can exploit the DYLIB injection to trigger functions of the privileged helper XPC service resulting in privilege escalation by first deleting the /etc/sudoers file and then copying a malicious version of that file to /etc/sudoers.
CWE-426 Feb 02, 2026
CVE-2026-23888 6.5 MEDIUM 1 Writeup EPSS 0.00
pnpm <10.28.1 - Path Traversal
pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm's binary fetcher allows malicious packages to write files outside the intended extraction directory. The vulnerability has two attack vectors: (1) Malicious ZIP entries containing `../` or absolute paths that escape the extraction root via AdmZip's `extractAllTo`, and (2) The `BinaryResolution.prefix` field is concatenated into the extraction path without validation, allowing a crafted prefix like `../../evil` to redirect extracted files outside `targetDir`. The issue impacts all pnpm users who install packages with binary assets, users who configure custom Node.js binary locations and CI/CD pipelines that auto-install binary dependencies. It can lead to overwriting config files, scripts, or other sensitive files leading to RCE. Version 10.28.1 contains a patch.
CWE-23 Jan 26, 2026
CVE-2026-23512 8.6 HIGH 1 Writeup EPSS 0.00
SumatraPDF <3.5.2 - RCE
SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, there is a Untrusted Search Path vulnerability when Advanced Options setting is trigger. The application executes notepad.exe without specifying an absolute path when using the Advanced Options setting. On Windows, this allows execution of a malicious notepad.exe placed in the application's installation directory, leading to arbitrary code execution.
CWE-426 Jan 14, 2026
CVE-2026-21280 8.6 HIGH EPSS 0.00
Adobe Illustrator < 29.8.4 - Untrusted Search Path
Illustrator versions 29.8.3, 30.0 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.
CWE-426 Jan 13, 2026
CVE-2026-20943 7.0 HIGH EPSS 0.00
Microsoft Office - Code Injection
Untrusted search path in Microsoft Office allows an unauthorized attacker to execute code locally.
CWE-426 Jan 13, 2026