CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
1,099 results Clear all
CVE-2026-2713 7.4 HIGH EPSS 0.00
IBM Trusteer Rapport 3.5.2309.290 - DLL Hijacking
IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CWE-427 Mar 10, 2026
CVE-2026-24317 5.0 MEDIUM EPSS 0.00
SAP GUI for Windows - DLL Hijacking
SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability.
CWE-427 Mar 10, 2026
CVE-2026-30896 7.8 HIGH EPSS 0.00
Qsee Client <=1.0.1 - DLL Hijacking
The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic Link Libraries (DLLs). When a user is directed to place some malicious DLL to the same directory and execute the affected installer, then arbitrary code may be executed with the administrative privilege.
CWE-427 Mar 09, 2026
CVE-2026-3787 7.0 HIGH EPSS 0.00
UltraVNC 1.6.4.0 - Path Traversal
A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an unknown function in the library cryptbase.dll of the component Windows Service. This manipulation causes uncontrolled search path. The attack requires local access. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-427 Mar 08, 2026
CVE-2026-28712 6.3 MEDIUM EPSS 0.00
Acronis Cyber Protect 17 <41186 - Privilege Escalation
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.
CWE-427 Mar 06, 2026
CVE-2026-28711 6.3 MEDIUM EPSS 0.00
Acronis Cyber Protect 17 - Privilege Escalation
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.
CWE-427 Mar 06, 2026
CVE-2025-11792 7.3 HIGH EPSS 0.00
Acronis Cyber Protect Cloud Agent <41124 - Privilege Escalation
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 41124.
CWE-427 Mar 06, 2026
CVE-2026-29610 8.8 HIGH 1 Writeup EPSS 0.00
OpenClaw <2026.2.14 - Command Injection
OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.
CWE-427 Mar 05, 2026
CVE-2026-28456 7.2 HIGH 1 Writeup EPSS 0.00
OpenClaw 2026.1.5-2026.2.14 - Code Injection
OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process.
CWE-427 Mar 05, 2026
CVE-2025-15558 8.0 HIGH EPSS 0.00
Docker CLI <=29.1.5 - Privilege Escalation
Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker CLI is executed as a privileged user. This issue affects Docker CLI: through 29.1.5 and Windows binaries acting as a CLI-plugin manager using the github.com/docker/cli/cli-plugins/manager https://pkg.go.dev/github.com/docker/[email protected]+incompatible/cli-plugins/manager  package, such as Docker Compose. This issue does not impact non-Windows binaries, and projects not using the plugin-manager code.
CWE-427 Mar 04, 2026
CVE-2026-22270 6.7 MEDIUM EPSS 0.00
Dell PowerScale OneFS <9.10.1.6/9.11.0.0-9.12.0.1 - Privilege Escal...
Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an uncontrolled search path element vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service, elevation of privileges, and information disclosure.
CWE-427 Mar 04, 2026
CVE-2026-24502 8.8 HIGH EPSS 0.00
Dell Command | Intel vPro <4.7.0 - Privilege Escalation
Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
CWE-427 Mar 03, 2026
CVE-2026-25191 7.8 HIGH EPSS 0.00
FinalCode Client - DLL Hijacking
The installer of FinalCode Client provided by Digital Arts Inc. contains an issue with the DLL search path. If a user is directed to place a malicious DLL file and the installer to the same directory and execute the installer, arbitrary code may be executed with the installer's execution privilege.
CWE-427 Feb 26, 2026
CVE-2026-3091 6.7 MEDIUM EPSS 0.00
Synology Presto Client <2.1.3-0672 - DLL Hijacking
An uncontrolled search path element vulnerability in Synology Presto Client before 2.1.3-0672 allows local users to read or write arbitrary files during installation by placing a malicious DLL in advance in the same directory as the installer.
CWE-427 Feb 24, 2026
CVE-2026-21420 7.3 HIGH EPSS 0.00
Dell Repository Manager <3.4.8 - Privilege Escalation
Dell Repository Manager (DRM), versions prior to 3.4.8, contains an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution and escalation of privileges.
CWE-427 Feb 23, 2026
CVE-2026-2492 7.0 HIGH 1 Writeup EPSS 0.00
TensorFlow HDF5 Library - Privilege Escalation
TensorFlow HDF5 Library Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of TensorFlow. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of plugins. The application loads plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25480.
CWE-427 Feb 20, 2026
CVE-2026-2040 7.3 HIGH EPSS 0.00
PDF-XChange Editor - Privilege Escalation
PDF-XChange Editor TrackerUpdate Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of PDF-XChange Editor. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the TrackerUpdate process. The product loads a library from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of a target user. Was ZDI-CAN-27788.
CWE-427 Feb 20, 2026
CVE-2026-26099 5.5 MEDIUM EPSS 0.00
Owl opds 2.2.0.4 - Path Traversal
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulating Configuration File Search Paths via a crafted network request.
CWE-427 Feb 20, 2026
CVE-2026-26098 5.5 MEDIUM EPSS 0.00
Owl opds 2.2.0.4 - Path Traversal
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulating Configuration File Search Paths via a crafted network request.
CWE-427 Feb 20, 2026
CVE-2026-26097 5.5 MEDIUM EPSS 0.00
Owl opds 2.2.0.4 - Path Traversal
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulating Configuration File Search Paths via a crafted network request.
CWE-427 Feb 20, 2026