CVE & Exploit Intelligence Database

Updated 18m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
1,099 results Clear all
CVE-2024-9046 7.8 HIGH EPSS 0.00
Lenovo Starstudio < 2020.3.12.34806 - Uncontrolled Search Path
A DLL hijack vulnerability was reported in Lenovo stARstudio that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-4132 7.8 HIGH EPSS 0.00
Lenovo Lock Screen < 9.0.18 - Uncontrolled Search Path
A DLL hijack vulnerability was reported in Lenovo Lock Screen that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-4131 7.8 HIGH EPSS 0.00
Lenovo Emulator < 9.1.6 - Uncontrolled Search Path
A DLL hijack vulnerability was reported in Lenovo Emulator that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-4130 7.8 HIGH EPSS 0.00
Lenovo App Store < 9.0.17 - Uncontrolled Search Path
A DLL hijack vulnerability was reported in Lenovo App Store that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-4089 7.8 HIGH EPSS 0.00
Lenovo Super File - Privilege Escalation
A DLL hijack vulnerability was reported in Lenovo Super File that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-33582 7.8 HIGH EPSS 0.00
Lenovo Service Framework - Privilege Escalation
A DLL hijack vulnerability was reported in Lenovo Service Framework that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-33581 7.8 HIGH EPSS 0.00
Lenovo PC Manager AI - Privilege Escalation
A DLL hijack vulnerability was reported in Lenovo PC Manager AI intelligent scenario that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-33580 7.8 HIGH EPSS 0.00
Lenovo Personal Cloud - Privilege Escalation
A DLL hijack vulnerability was reported in Lenovo Personal Cloud that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-33579 7.8 HIGH EPSS 0.00
Lenovo Baiying - Privilege Escalation
A DLL hijack vulnerability was reported in Lenovo Baiying that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-33578 7.8 HIGH EPSS 0.00
Lenovo Leyun - Privilege Escalation
A DLL hijack vulnerability was reported in Lenovo Leyun that could allow a local attacker to execute code with elevated privileges.
CWE-427 Oct 11, 2024
CVE-2024-47196 6.7 MEDIUM EPSS 0.00
ModelSim Questa < V2025.2 - Code Injection
A vulnerability has been identified in ModelSim (All versions < V2025.2), Questa (All versions < V2025.2). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory.
CWE-427 Oct 08, 2024
CVE-2024-47195 6.7 MEDIUM EPSS 0.00
ModelSim Questa < V2024.3 - Code Injection
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). gdb.exe in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch gdb.exe from a user-writable directory.
CWE-427 Oct 08, 2024
CVE-2024-47194 6.7 MEDIUM EPSS 0.00
ModelSim Questa < V2024.3 - Code Injection
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vish2.exe in affected applications allows a specific DLL file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vish2.exe from a user-writable directory.
CWE-427 Oct 08, 2024
CVE-2024-45246 7.3 HIGH EPSS 0.00
Diebold Nixdorf - Buffer Overflow
Diebold Nixdorf – CWE-427: Uncontrolled Search Path Element
CWE-427 Oct 06, 2024
CVE-2024-6769 6.7 MEDIUM 1 PoC Analysis EPSS 0.16
Microsoft Windows <2022 - Privilege Escalation
A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt.
CWE-427 Sep 26, 2024
CVE-2024-44168 5.5 MEDIUM EPSS 0.00
Apple Macos < 13.7 - Uncontrolled Search Path
A library injection issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to modify protected parts of the file system.
CWE-114 Sep 17, 2024
CVE-2024-8766 6.7 MEDIUM EPSS 0.00
Acronis Cyber Protect <38235-39169 - Privilege Escalation
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 38235, Acronis Cyber Protect 16 (Windows) before build 39169.
CWE-427 Sep 16, 2024
CVE-2024-34016 6.5 MEDIUM EPSS 0.00
Acronis Cyber Protect Cloud Agent <38235 - Privilege Escalation
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 38235.
CWE-427 Sep 16, 2024
CVE-2024-34153 6.7 MEDIUM EPSS 0.00
Intel(R) RAID Web Console - Privilege Escalation
Uncontrolled search path element in Intel(R) RAID Web Console software for all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Sep 16, 2024
CVE-2024-39613 5.3 MEDIUM EPSS 0.01
Mattermost Desktop < 5.9.0 - Uncontrolled Search Path
Mattermost Desktop App versions <=5.8.0 fail to specify an absolute path when searching the cmd.exe file, which allows a local attacker who is able to put an cmd.exe file in the Downloads folder of a user's machine to cause remote code execution on that machine.
CWE-427 Sep 16, 2024