CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
1,099 results Clear all
CVE-2024-55955 6.7 MEDIUM EPSS 0.00
Trendmicro Deep Security Agent - Uncontrolled Search Path
An incorrect permissions assignment vulnerability in Trend Micro Deep Security 20.0 agents between versions 20.0.1-9400 and 20.0.1-23340 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CWE-427 Dec 31, 2024
CVE-2022-27595 7.8 HIGH EPSS 0.00
Qnap Qvpn < 2.0.0.1316 - Uncontrolled Search Path
An insecure library loading vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local attackers who have gained user access to execute unauthorized code or commands. We have already fixed the vulnerability in the following versions: QVPN Windows 2.0.0.1316 and later QVPN Windows 2.0.0.1310 and later
CWE-427 Dec 19, 2024
CVE-2024-47576 3.3 LOW EPSS 0.00
SAP Product Lifecycle Costing Client <4.7.1 - Command Injection
SAP Product Lifecycle Costing Client (versions below 4.7.1) application loads on demand a DLL that is available with Windows OS. This DLL is loaded from the computer running SAP Product Lifecycle Costing Client application. That particular DLL could be replaced by a malicious one, that could execute commands as being part of SAP Product Lifecycle Costing Client Application. On a successful attack, it can cause a low impact to confidentiality but no impact to the integrity and availability of the application.
CWE-427 Dec 10, 2024
CVE-2024-9852 7.8 HIGH EPSS 0.00
Mitsubishi Electric - Local Privilege Escalation
Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
CWE-427 Nov 28, 2024
CVE-2024-8299 7.8 HIGH EPSS 0.00
Mitsubishi Electric - Local Privilege Escalation
Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
CWE-427 Nov 28, 2024
CVE-2024-7253 7.8 HIGH EPSS 0.00
Nomachine < 7.15.6 - Uncontrolled Search Path
NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within nxnode.exe. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. . Was ZDI-CAN-24039.
CWE-427 Nov 22, 2024
CVE-2024-7244 7.8 HIGH EPSS 0.00
Pandasecurity Panda Dome - Uncontrolled Search Path
Panda Security Dome VPN DLL Hijacking Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the VPN process. The process does not restrict DLL search to trusted paths, which can result in the loading of a malicious DLL. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23428.
CWE-427 Nov 22, 2024
CVE-2024-30376 7.3 HIGH EPSS 0.00
Radmin Advanced IP Scanner - Uncontrolled Search Path
Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Famatech Advanced IP Scanner. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the application's use of Qt. The application loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator. Was ZDI-CAN-20768.
CWE-427 Nov 22, 2024
CVE-2024-48992 7.8 HIGH 1 Writeup EPSS 0.01
Needrestart < 3.8 - Uncontrolled Search Path
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
CWE-427 Nov 19, 2024
CVE-2024-48990 7.8 HIGH 21 PoCs Analysis EPSS 0.19
Ubuntu needrestart Privilege Escalation
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
CWE-427 Nov 19, 2024
CVE-2024-49592 6.7 MEDIUM EPSS 0.00
McAfee Total Protection <16.0.53 - Privilege Escalation
Trial installer for McAfee Total Protection (legacy trial installer software) 16.0.53 allows local privilege escalation because of an Uncontrolled Search Path Element. The attacker could be "an adversary or knowledgeable user" and the type of attack could be called "DLL-squatting." The issue only affects execution of this installer, and does not leave McAfee Total Protection in a vulnerable state after installation is completed. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-427 Nov 15, 2024
CVE-2024-38668 6.7 MEDIUM EPSS 0.00
Intel(R) Quartus(R) Prime Standard Edition <23.1.1 - Privilege Esca...
Uncontrolled search path for some Intel(R) Quartus(R) Prime Standard Edition software for Windows before version 23.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024
CVE-2024-38387 6.7 MEDIUM EPSS 0.00
Intel(R) Graphics Driver <15.45 - Privilege Escalation
Uncontrolled search path in the Intel(R) Graphics Driver installers for versions 15.40 and 15.45 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024
CVE-2024-38383 6.7 MEDIUM EPSS 0.00
Intel(R) Quartus(R) Prime Pro Edition <24.2 - Privilege Escalation
Uncontrolled search path for some Intel(R) Quartus(R) Prime Pro Edition software for Windows before version 24.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024
CVE-2024-37024 6.7 MEDIUM EPSS 0.00
Intel(R) ACAT <3.11.0 - Privilege Escalation
Uncontrolled search path for some ACAT software maintained by Intel(R) for Windows before version 3.11.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024
CVE-2024-36253 6.7 MEDIUM EPSS 0.00
Intel(R) SDP Tool - Privilege Escalation
Uncontrolled search path in the Intel(R) SDP Tool for Windows software all version may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024
CVE-2024-36245 6.7 MEDIUM EPSS 0.00
Intel(R) VTune(TM) Profiler <2024.2.0 - Privilege Escalation
Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024
CVE-2024-35245 6.7 MEDIUM EPSS 0.00
Intel(R) PROSet/Wireless WiFi <23.60 - Privilege Escalation
Uncontrolled search path element in some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024
CVE-2024-34167 6.7 MEDIUM EPSS 0.00
Intel(R) Server Board S2600ST - Privilege Escalation
Uncontrolled search path for the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024
CVE-2024-34165 6.7 MEDIUM EPSS 0.00
Intel(R) oneAPI DPC++/C++ Compiler <2024.2 - Privilege Escalation
Uncontrolled search path in some Intel(R) oneAPI DPC++/C++ Compiler before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 13, 2024