CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
1,099 results Clear all
CVE-2023-37490 7.6 HIGH EPSS 0.00
SAP Businessobjects Business Intelligence - Uncontrolled Search Path
SAP Business Objects Installer - versions 420, 430, allows an authenticated attacker within the network to overwrite an executable file created in a temporary directory during the installation process. On replacing this executable with a malicious file, an attacker can completely compromise the confidentiality, integrity, and availability of the system
CWE-427 Aug 08, 2023
CVE-2023-3662 7.3 HIGH EPSS 0.00
Codesys Development System < 3.5.19.20 - Uncontrolled Search Path
In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows for execution of binaries from the current working directory in the users context .
CWE-427 Aug 03, 2023
CVE-2022-43703 7.8 HIGH EPSS 0.00
Installer - Path Traversal
An installer that loads or executes files using an unconstrained search path may be vulnerable to substitute files under control of an attacker being loaded or executed instead of the intended files.
CWE-427 Jul 27, 2023
CVE-2023-36853 7.8 HIGH EPSS 0.00
Keysight Geolocation Server <v2.4.2 - Code Injection
​In Keysight Geolocation Server v2.4.2 and prior, a low privileged attacker could create a local ZIP file containing a malicious script in any location. The attacker could abuse this to load a DLL with SYSTEM privileges.
CWE-749 Jul 19, 2023
CVE-2023-37849 6.5 MEDIUM EPSS 0.00
Watchguard Panda Security VPN < 15.14.8 - Uncontrolled Search Path
A DLL hijacking vulnerability in Panda Security VPN for Windows prior to version v15.14.8 allows attackers to execute arbitrary code via placing a crafted DLL file in the same directory as PANDAVPN.exe.
CWE-427 Jul 13, 2023
CVE-2023-31543 9.8 CRITICAL EPSS 0.01
pipreqs <0.5 - RCE
A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.
CWE-427 Jun 30, 2023
CVE-2023-28929 7.8 HIGH EPSS 0.00
Trend Micro Security <2023 - DLL Hijacking
Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started.
CWE-427 Jun 26, 2023
CVE-2023-2005 6.3 MEDIUM EPSS 0.00
Tenable Nessus - Uncontrolled Search Path
Vulnerability in Tenable Tenable.Io, Tenable Nessus, Tenable Security Center.This issue affects Tenable.Io: before Plugin Feed ID #202306261202 ; Nessus: before Plugin Feed ID #202306261202 ; Security Center: before Plugin Feed ID #202306261202 . This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges.
CWE-427 Jun 26, 2023
CVE-2023-27908 7.8 HIGH EPSS 0.00
Autodesk Installer < 1.39.0.216 - Uncontrolled Search Path
A maliciously crafted DLL file can be forced to write beyond allocated boundaries in the Autodesk installer when parsing the DLL files and could lead to a Privilege Escalation vulnerability.
CWE-427 Jun 23, 2023
CVE-2023-0142 6.5 MEDIUM EPSS 0.00
Synology DSM <7.1 - Privilege Escalation
Uncontrolled search path element vulnerability in Backup Management functionality in Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.0.1-42218-7 and 7.1-42661 allows remote authenticated users with administrator privileges to read or write arbitrary files via unspecified vectors.
CWE-427 Jun 13, 2023
CVE-2023-0976 6.3 MEDIUM EPSS 0.00
Trellix Agent < 5.7.9 - Uncontrolled Search Path
A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree.
CWE-427 Jun 07, 2023
CVE-2023-3091 7.0 HIGH EPSS 0.00
Captura <8.0.0 - Uncontrolled Search Path
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Captura up to 8.0.0. It has been declared as critical. This vulnerability affects unknown code in the library CRYPTBASE.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation appears to be difficult. The identifier of this vulnerability is VDB-230668. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-427 Jun 04, 2023
CVE-2023-28080 6.7 MEDIUM EPSS 0.00
Dell Powerpath - Uncontrolled Search Path
PowerPath for Windows, versions 7.0, 7.1 & 7.2 contains DLL Hijacking Vulnerabilities. A regular user (non-admin) can exploit these issues to potentially escalate privileges and execute arbitrary code in the context of NT AUTHORITY\SYSTEM.
CWE-427 May 30, 2023
CVE-2023-25005 7.8 HIGH EPSS 0.00
Autodesk Infraworks < 2021.2 - Uncontrolled Search Path
A maliciously crafted DLL file can be forced to read beyond allocated boundaries in Autodesk InfraWorks 2023, and 2021 when parsing the DLL files could lead to a resource injection vulnerability.
CWE-427 May 12, 2023
CVE-2023-25428 7.8 HIGH EPSS 0.00
Soft-o Free Password Manager - Uncontrolled Search Path
A DLL Hijacking issue discovered in Soft-o Free Password Manager 1.1.20 allows attackers to create arbitrary DLLs leading to code execution.
CWE-427 May 12, 2023
CVE-2023-31197 6.7 MEDIUM EPSS 0.00
Intel(R) Trace Analyzer and Collector <2020-3 - Privilege Escalation
Uncontrolled search path in the Intel(R) Trace Analyzer and Collector before version 2020 update 3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 May 12, 2023
CVE-2023-27386 6.7 MEDIUM EPSS 0.00
Intel Pathfinder For Risc-v - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) Pathfinder for RISC-V software may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-428 May 10, 2023
CVE-2023-27298 8.8 HIGH EPSS 0.00
Intel(R) WULT <1.0.0 - Privilege Escalation
Uncontrolled search path in the WULT software maintained by Intel(R) before version 1.0.0 (commit id 592300b) may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CWE-428 May 10, 2023
CVE-2023-22355 6.7 MEDIUM EPSS 0.00
Intel oneAPI Toolkit <4.3.0.251 - Privilege Escalation
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 May 10, 2023
CVE-2022-43474 6.7 MEDIUM EPSS 0.00
Intel(R) FPGAs Pro Edition <22.4 - Privilege Escalation
Uncontrolled search path for the DSP Builder software installer before version 22.4 for Intel(R) FPGAs Pro Edition may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-428 May 10, 2023