CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
1,099 results Clear all
CVE-2024-29734 7.8 HIGH EPSS 0.00
SonicDICOM Media Viewer <2.3.2 - Code Injection
Uncontrolled search path element issue exists in SonicDICOM Media Viewer 2.3.2 and earlier, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with the privileges of the running application.
CWE-427 Apr 03, 2024
CVE-2024-0980 7.1 HIGH EPSS 0.00
Okta Verify for Windows - RCE
The Auto-update service for Okta Verify for Windows is vulnerable to two flaws which in combination could be used to execute arbitrary code.
CWE-22 Mar 28, 2024
CVE-2024-28131 7.8 HIGH EPSS 0.00
EasyRange Ver 1.41 - Code Injection
EasyRange Ver 1.41 contains an issue with the executable file search path when displaying an extracted file on Explorer, which may lead to loading an executable file resides in the same folder where the extracted file is placed. If this vulnerability is exploited, arbitrary code may be executed with the privilege of the running program. Note that the developer was unreachable, therefore, users should consider stop using EasyRange Ver 1.41.
CWE-427 Mar 26, 2024
CVE-2023-42920 7.8 HIGH EPSS 0.00
Claris Pro < 20.2 - Uncontrolled Search Path
Claris International has fixed a dylib hijacking vulnerability in the FileMaker Pro.app and Claris Pro.app versions on macOS.
CWE-427 Mar 19, 2024
CVE-2024-22346 8.4 HIGH EPSS 0.00
Db2 for IBM i <7.6 - Privilege Escalation
Db2 for IBM i 7.2, 7.3, 7.4, and 7.5 infrastructure could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: 280203.
CWE-427 Mar 14, 2024
CVE-2024-22167 7.9 HIGH EPSS 0.00
SanDisk PrivateAccess - RCE
A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user's vault or has already gained access into a user's system. This attack is limited to the system in context and cannot be propagated.
CWE-427 Mar 13, 2024
CVE-2024-0670 8.8 HIGH 7 PoCs Analysis EPSS 0.00
Checkmk <2.2.0p23-2.0.0 - Privilege Escalation
Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges
CWE-427 Mar 11, 2024
CVE-2024-27303 7.3 HIGH 1 Writeup EPSS 0.00
electron-builder <24.13.2 - Command Injection
electron-builder is a solution to package and build a ready for distribution Electron, Proton Native app for macOS, Windows and Linux. A vulnerability that only affects eletron-builder prior to 24.13.2 in Windows, the NSIS installer makes a system call to open cmd.exe via NSExec in the `.nsh` installer script. NSExec by default searches the current directory of where the installer is located before searching `PATH`. This means that if an attacker can place a malicious executable file named cmd.exe in the same folder as the installer, the installer will run the malicious file. Version 24.13.2 fixes this issue. No known workaround exists. The code executes at the installer-level before the app is present on the system, so there's no way to check if it exists in a current installer.
CWE-427 Mar 06, 2024
CVE-2024-20338 7.3 HIGH 1 PoC Analysis EPSS 0.00
Cisco Secure Client for Linux - Privilege Escalation
A vulnerability in the ISE Posture (System Scan) module of Cisco Secure Client for Linux could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to the use of an uncontrolled search path element. An attacker could exploit this vulnerability by copying a malicious library file to a specific directory in the filesystem and persuading an administrator to restart a specific process. A successful exploit could allow the attacker to execute arbitrary code on an affected device with root privileges.
CWE-427 Mar 06, 2024
CVE-2023-39254 6.7 MEDIUM EPSS 0.00
Dell Update Package Framework < 4.9.10 - Uncontrolled Search Path
Dell Update Package (DUP), Versions prior to 4.9.10 contain an Uncontrolled Search Path vulnerability. A malicious user with local access to the system could potentially exploit this vulnerability to run arbitrary code as admin.
CWE-427 Mar 01, 2024
CVE-2024-1595 7.8 HIGH EPSS 0.00
Deltaww Cncsoft-b < 1.0.0.4 - Uncontrolled Search Path
Delta Electronics CNCSoft-B DOPSoft prior to v4.0.0.82 insecurely loads libraries, which may allow an attacker to use DLL hijacking and take over the system where the software is installed.
CWE-427 Feb 29, 2024
CVE-2023-6132 7.3 HIGH EPSS 0.00
AVEVA Edge - RCE
The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
CWE-427 Feb 29, 2024
CVE-2023-49114 6.7 MEDIUM EPSS 0.00
Qognify VMS Client Viewer >=7.1 - RCE
A DLL hijacking vulnerability was identified in the Qognify VMS Client Viewer version 7.1 or higher, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL, if some specific pre-conditions are met.
CWE-427 Feb 26, 2024
CVE-2023-41091 6.7 MEDIUM EPSS 0.00
Intel(R) MPI Library <2021.11 - Privilege Escalation
Uncontrolled search path for some Intel(R) MPI Library Software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 14, 2024
CVE-2023-40156 6.7 MEDIUM EPSS 0.00
Intel System Support Utility < 3.0.0.2 - Uncontrolled Search Path
Uncontrolled search path element in some Intel(R) SSU software before version 3.0.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 14, 2024
CVE-2023-39932 6.7 MEDIUM EPSS 0.00
Intel System Usage Report For Gameplay - Uncontrolled Search Path
Uncontrolled search path in the Intel(R) SUR for Gameplay Software before version 2.0.1901 may allow a privillaged user to potentially enable escalation of privilege via local access.
CWE-427 Feb 14, 2024
CVE-2023-38566 6.7 MEDIUM EPSS 0.00
Intel(R) ISPC <1.21.0 - Privilege Escalation
Uncontrolled search path in some Intel(R) ISPC software before version 1.21.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 14, 2024
CVE-2023-36493 6.7 MEDIUM EPSS 0.00
Intel(R) SDK for OpenCL(TM) < - Privilege Escalation
Uncontrolled search path in some Intel(R) SDK for OpenCL(TM) Applications software may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 14, 2024
CVE-2023-35769 6.7 MEDIUM EPSS 0.00
Intel Computing Improvement Program - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) CIP software before version 2.4.10577 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 14, 2024
CVE-2023-35060 6.7 MEDIUM EPSS 0.00
Intel Battery Life Diagnostic Tool < 2.3.1 - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) Battery Life Diagnostic Tool software before version 2.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 14, 2024