CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
1,099 results Clear all
CVE-2025-49487 6.8 MEDIUM EPSS 0.00
Trendmicro Worry-free Business Securi... - Uncontrolled Search Path
An uncontrolled search path vulnerability in the Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an attacker with physical access to a machine to execute arbitrary code on affected installations. An attacker must have had physical access to the target system in order to exploit this vulnerability due to need to access a certain hardware component. Also note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a previous WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only.
CWE-427 Jun 17, 2025
CVE-2025-49158 6.7 MEDIUM EPSS 0.00
Trendmicro Apex One < 14.0.14492 - Uncontrolled Search Path
An uncontrolled search path vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CWE-427 Jun 17, 2025
CVE-2025-49155 8.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.14492 - Uncontrolled Search Path
An uncontrolled search path vulnerability in the Trend Micro Apex One Data Loss Prevention module could allow an attacker to inject malicious code leading to arbitrary code execution on affected installations.
CWE-427 Jun 17, 2025
CVE-2025-33122 7.5 HIGH EPSS 0.00
IBM i <7.7 - Privilege Escalation
IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualified library call in IBM Advanced Job Scheduler for i. A malicious actor could cause user-controlled code to run with administrator privilege.
CWE-427 Jun 17, 2025
CVE-2025-49148 7.3 HIGH EPSS 0.00
ClipShare <3.8.5 - RCE
ClipShare is a lightweight and cross-platform tool for clipboard sharing. Prior to 3.8.5, ClipShare Server for Windows uses the default Windows DLL search order and loads system libraries like CRYPTBASE.dll and WindowsCodecs.dll from its own directory before the system path. A local, non-privileged user who can write to the folder containing clip_share.exe can place malicious DLLs there, leading to arbitrary code execution in the context of the server, and, if launched by an Administrator (or another elevated user), it results in a reliable local privilege escalation. This vulnerability is fixed in 3.8.5.
CWE-427 Jun 11, 2025
CVE-2025-5480 7.8 HIGH EPSS 0.00
Action1 - Privilege Escalation
Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26767.
CWE-427 Jun 06, 2025
CVE-2025-30167 7.3 HIGH 1 Writeup EPSS 0.00
Jupyter Core <5.8.0 - Info Disclosure
Jupyter Core is a package for the core common functionality of Jupyter projects. When using Jupyter Core prior to version 5.8.0 on Windows, the shared `%PROGRAMDATA%` directory is searched for configuration files (`SYSTEM_CONFIG_PATH` and `SYSTEM_JUPYTER_PATH`), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected `%PROGRAMDATA%` are affected. Users should upgrade to Jupyter Core version 5.8.0 or later to receive a patch. Some other mitigations are available. As administrator, modify the permissions on the `%PROGRAMDATA%` directory so it is not writable by unauthorized users; or as administrator, create the `%PROGRAMDATA%\jupyter` directory with appropriately restrictive permissions; or as user or administrator, set the `%PROGRAMDATA%` environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators _or_ the current user).
CWE-427 Jun 03, 2025
CVE-2024-42191 6.5 MEDIUM EPSS 0.00
Hcltech Traveler For Microsoft Outlook - Uncontrolled Search Path
HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a COM hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content.
CWE-427 May 30, 2025
CVE-2024-42190 6.5 MEDIUM EPSS 0.00
Hcltech Traveler For Microsoft Outlook - Uncontrolled Search Path
HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a DLL hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content.
CWE-427 May 30, 2025
CVE-2025-5180 7.0 HIGH EPSS 0.00
Wondershare Filmora - Uncontrolled Search Path
A vulnerability, which was classified as critical, has been found in Wondershare Filmora 14.5.16. Affected by this issue is some unknown functionality in the library CRYPTBASE.dll of the file NFWCHK.exe of the component Installer. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-427 May 26, 2025
CVE-2025-5129 7.0 HIGH EPSS 0.00
Sangfor Atrust - Uncontrolled Search Path
A vulnerability has been found in Sangfor 零信任访问控制系统 aTrust 2.3.10.60 and classified as critical. Affected by this vulnerability is an unknown functionality in the library MSASN1.dll. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-427 May 24, 2025
CVE-2024-13946 6.8 MEDIUM 1 PoC Analysis EPSS 0.01
ASPECT-Enterprise <3.* - Binary Planting
DLL's are not digitally signed when loaded in ASPECT's configuration toolset exposing the application to binary planting during device commissioning.This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.
CWE-427 May 22, 2025
CVE-2025-2272 7.0 HIGH EPSS 0.00
Forcepoint FIE Endpoint <25.05 - Privilege Escalation
Uncontrolled Search Path Element vulnerability in Forcepoint FIE Endpoint allows Privilege Escalation, Code Injection, Hijacking a privileged process.This issue affects FIE Endpoint: before 25.05.
CWE-427 May 22, 2025
CVE-2025-27997 8.4 HIGH EPSS 0.00
Blizzard Battle.net - Uncontrolled Search Path
An issue in Blizzard Battle.net v2.40.0.15267 allows attackers to escalate privileges via placing a crafted shell script or executable into the C:\ProgramData directory.
CWE-427 May 21, 2025
CVE-2025-4769 7.0 HIGH EPSS 0.00
CBEWIN Anytxt Searcher 1.3.1128.0 - Uncontrolled Search Path
A vulnerability classified as critical was found in CBEWIN Anytxt Searcher 1.3.1128.0. This vulnerability affects unknown code of the file ATService.exe. The manipulation leads to uncontrolled search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult.
CWE-427 May 16, 2025
CVE-2025-43553 7.8 HIGH EPSS 0.00
Adobe Substance 3D Modeler < 1.22.0 - Uncontrolled Search Path
Substance3D - Modeler versions 1.21.0 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. If the application relies on a search path to locate critical resources such as libraries or executables, an attacker could manipulate the search path to load a malicious resource, potentially executing arbitrary code. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 May 13, 2025
CVE-2025-21099 6.7 MEDIUM EPSS 0.00
Intel(R) Graphics - Privilege Escalation
Uncontrolled search path for some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 May 13, 2025
CVE-2025-20108 6.7 MEDIUM EPSS 0.00
Intel(R) Network Adapter Driver <29.4 - Privilege Escalation
Uncontrolled search path element for some Intel(R) Network Adapter Driver installers for Windows 11 before version 29.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 May 13, 2025
CVE-2025-20079 6.7 MEDIUM EPSS 0.00
Intel(R) Advisor - Privilege Escalation
Uncontrolled search path for some Intel(R) Advisor software may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 May 13, 2025
CVE-2025-20043 6.7 MEDIUM EPSS 0.00
Intel RealSense SDK <2.56.2 - Privilege Escalation
Uncontrolled search path for some Intel(R) RealSense™ SDK software before version 2.56.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 May 13, 2025