CVE & Exploit Intelligence Database

Updated 18m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
1,099 results Clear all
CVE-2024-20430 7.3 HIGH EPSS 0.00
Cisco Meraki Systems Manager - Code Injection
A vulnerability in Cisco Meraki Systems Manager (SM) Agent for Windows could allow an authenticated, local attacker to execute arbitrary code with elevated privileges.  This vulnerability is due to incorrect handling of directory search paths at runtime. A low-privileged attacker could exploit this vulnerability by placing both malicious configuration files and malicious DLL files on an affected system, which would read and execute the files when Cisco Meraki SM launches on startup. A successful exploit could allow the attacker to execute arbitrary code on the affected system with SYSTEM privileges. 
CWE-427 Sep 12, 2024
CVE-2024-6510 7.8 HIGH EPSS 0.00
AVG Internet Security <24 - Privilege Escalation
Local Privilege Escalation in AVG Internet Security v24 on Windows allows a local unprivileged user to escalate privileges to SYSTEM via COM-Hijacking.
CWE-749 Sep 12, 2024
CVE-2024-8441 6.7 MEDIUM EPSS 0.01
Ivanti EPM <2022 SU6-2024 September - Privilege Escalation
An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6, or the 2024 September update allows a local authenticated attacker with admin privileges to escalate their privileges to SYSTEM.
CWE-427 Sep 10, 2024
CVE-2024-44107 8.8 HIGH EPSS 0.00
Ivanti Workspace Control < 10.18.99.0 - Uncontrolled Search Path
DLL hijacking in the management console of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to escalate their privileges and achieve arbitrary code execution.
CWE-427 Sep 10, 2024
CVE-2024-45405 6.0 MEDIUM 1 Writeup EPSS 0.00
Gitoxide <0.10.11 - RCE
`gix-path` is a crate of the `gitoxide` project (an implementation of `git` written in Rust) dealing paths and their conversions. Prior to version 0.10.11, `gix-path` runs `git` to find the path of a configuration file associated with the `git` installation, but improperly resolves paths containing unusual or non-ASCII characters, in rare cases enabling a local attacker to inject configuration leading to code execution. Version 0.10.11 contains a patch for the issue. In `gix_path::env`, the underlying implementation of the `installation_config` and `installation_config_prefix` functions calls `git config -l --show-origin` to find the path of a file to treat as belonging to the `git` installation. Affected versions of `gix-path` do not pass `-z`/`--null` to cause `git` to report literal paths. Instead, to cover the occasional case that `git` outputs a quoted path, they attempt to parse the path by stripping the quotation marks. The problem is that, when a path is quoted, it may change in substantial ways beyond the concatenation of quotation marks. If not reversed, these changes can result in another valid path that is not equivalent to the original. On a single-user system, it is not possible to exploit this, unless `GIT_CONFIG_SYSTEM` and `GIT_CONFIG_GLOBAL` have been set to unusual values or Git has been installed in an unusual way. Such a scenario is not expected. Exploitation is unlikely even on a multi-user system, though it is plausible in some uncommon configurations or use cases. In general, exploitation is more likely to succeed if users are expected to install `git` themselves, and are likely to do so in predictable locations; locations where `git` is installed, whether due to usernames in their paths or otherwise, contain characters that `git` quotes by default in paths, such as non-English letters and accented letters; a custom `system`-scope configuration file is specified with the `GIT_CONFIG_SYSTEM` environment variable, and its path is in an unusual location or has strangely named components; or a `system`-scope configuration file is absent, empty, or suppressed by means other than `GIT_CONFIG_NOSYSTEM`. Currently, `gix-path` can treat a `global`-scope configuration file as belonging to the installation if no higher scope configuration file is available. This increases the likelihood of exploitation even on a system where `git` is installed system-wide in an ordinary way. However, exploitation is expected to be very difficult even under any combination of those factors.
CWE-41 Sep 06, 2024
CVE-2024-7834 7.8 HIGH EPSS 0.00
Overwolf < 250.1.1 - Uncontrolled Search Path
A local privilege escalation is caused by Overwolf loading and executing certain dynamic link library files from a user-writeable folder in SYSTEM context on launch. This allows an attacker with unprivileged access to the system to run arbitrary code with SYSTEM privileges by placing a malicious .dll file in the respective location.
CWE-427 Sep 04, 2024
CVE-2024-34019 7.3 HIGH EPSS 0.00
Acronis Snap Deploy <4569 - Privilege Escalation
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.
CWE-427 Aug 29, 2024
CVE-2024-34017 7.3 HIGH EPSS 0.00
Acronis Snap Deploy <4569 - Privilege Escalation
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.
CWE-427 Aug 29, 2024
CVE-2024-5929 7.8 HIGH EPSS 0.00
Vipre Advanced Security - Uncontrolled Search Path
VIPRE Advanced Security PMAgent Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Patch Management Agent. The issue results from loading a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22316.
CWE-427 Aug 21, 2024
CVE-2024-7886 7.8 HIGH EPSS 0.00
Scooter Software Beyond Compare <3.3.5.15075 - Path Traversal
A vulnerability has been found in Scooter Software Beyond Compare up to 3.3.5.15075 and classified as critical. Affected by this vulnerability is an unknown functionality in the library 7zxa.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The real existence of this vulnerability is still doubted at the moment. The vendor explains that a system must be breached before exploiting this issue. They are not planning on making any changes to address it.
CWE-427 Aug 16, 2024
CVE-2024-29015 6.7 MEDIUM EPSS 0.00
Intel Oneapi Base Toolkit < 2024.1 - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) VTune(TM) Profiler software before versions 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-28953 6.7 MEDIUM EPSS 0.00
EMON <11.44 - Privilege Escalation
Uncontrolled search path in some EMON software before version 11.44 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-28887 6.7 MEDIUM EPSS 0.00
Intel Integrated Performance Primitives - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) IPP software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-28876 6.7 MEDIUM EPSS 0.00
Intel Mpi Library < 2021.12 - Uncontrolled Search Path
Uncontrolled search path for some Intel(R) MPI Library software before version 2021.12 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-28172 6.7 MEDIUM EPSS 0.00
Intel Oneapi Hpc Toolkit < 2024.1.0 - Uncontrolled Search Path
Uncontrolled search path for some Intel(R) Trace Analyzer and Collector software before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-28046 6.7 MEDIUM EPSS 0.00
Intel Graphics Performance Analyzers - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) GPA software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-26027 6.7 MEDIUM EPSS 0.00
Intel Simics Package Manager < 1.8.3 - Uncontrolled Search Path
Uncontrolled search path for some Intel(R) Simics Package Manager software before version 1.8.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-24977 6.7 MEDIUM EPSS 0.00
Intel(R) License Manager <11.19.5.0 - Privilege Escalation
Uncontrolled search path for some Intel(R) License Manager for FLEXlm product software before version 11.19.5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-23909 6.7 MEDIUM EPSS 0.00
Intel Field Programmable Gate Array S... - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) FPGA SDK for OpenCL(TM) software technology may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024
CVE-2024-23907 6.7 MEDIUM EPSS 0.00
Intel High Level Synthesis Compiler < 23.4 - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) High Level Synthesis Compiler software before version 23.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 14, 2024