CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
1,099 results Clear all
CVE-2023-1745 5.3 MEDIUM 1 Writeup EPSS 0.00
KMPlayer 4.2.2.73 - Path Traversal
A vulnerability, which was classified as problematic, has been found in KMPlayer 4.2.2.73. This issue affects some unknown processing in the library SHFOLDER.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224633 was assigned to this vulnerability.
CWE-427 Mar 30, 2023
CVE-2022-28688 7.8 HIGH EPSS 0.02
AVEVA Edge 2020 SP2 Patch 4201.2111.1802.0000 - RCE
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17201.
CWE-427 Mar 29, 2023
CVE-2022-28687 7.8 HIGH EPSS 0.01
AVEVA Edge 2020 SP2 Patch 4201.2111.1802.0000 - RCE
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16257.
CWE-427 Mar 29, 2023
CVE-2022-28686 7.8 HIGH EPSS 0.01
AVEVA Edge 2020 SP2 Patch 4201.2111.1802.0000 - RCE
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17114.
CWE-427 Mar 29, 2023
CVE-2023-0213 8.8 HIGH EPSS 0.00
M-Files Installer <22.6 - Privilege Escalation
Elevation of privilege issue in M-Files Installer versions before 22.6 on Windows allows user to gain SYSTEM privileges via DLL hijacking.
CWE-427 Mar 29, 2023
CVE-2023-28596 7.8 HIGH EPSS 0.00
Zoom Client for IT Admin <5.13.5 - Privilege Escalation
Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to privileges to root.
CWE-427 Mar 27, 2023
CVE-2022-38745 7.8 HIGH EPSS 0.00
Apache OpenOffice <4.1.14 - Code Injection
Apache OpenOffice versions before 4.1.14 may be configured to add an empty entry to the Java class path. This may lead to run arbitrary Java code from the current directory.
CWE-1188 Mar 24, 2023
CVE-2023-28759 7.8 HIGH EPSS 0.00
Veritas NetBackup <10.0 - Privilege Escalation
An issue was discovered in Veritas NetBackup before 10.0 on Windows. A vulnerability in the way the client validates the path to a DLL prior to loading may allow a lower-level user to elevate privileges and compromise the system.
CWE-427 Mar 23, 2023
CVE-2022-48422 7.8 HIGH EPSS 0.00
Onlyoffice Document Server < 7.3.0 - Uncontrolled Search Path
ONLYOFFICE Docs through 7.3 on certain Linux distributions allows local users to gain privileges via a Trojan horse libgcc_s.so.1 in the current working directory, which may be any directory in which an ONLYOFFICE document is located.
CWE-427 Mar 19, 2023
CVE-2021-31637 7.8 HIGH EPSS 0.00
Uwamp < 3.0.2 - Uncontrolled Search Path
An issue found in UwAmp v.1.1, 1.2, 1.3, 2.0, 2.1, 2.2, 2.2.1, 3.0.0, 3.0.1, 3.0.2 allows a remote attacker to execute arbitrary code via a crafted DLL.
CWE-427 Mar 16, 2023
CVE-2022-4313 8.8 HIGH EPSS 0.00
Tenable - Command Injection
A vulnerability was reported where through modifying the scan variables, an authenticated user in Tenable products, that has Scan Policy Configuration roles, could manipulate audit policy variables to execute arbitrary commands on credentialed scan targets.
CWE-427 Mar 15, 2023
CVE-2023-24578 5.5 MEDIUM EPSS 0.00
McAfee Total Protection <16.0.49 - Privilege Escalation
McAfee Total Protection prior to 16.0.49 allows attackers to elevate user privileges due to DLL sideloading. This could enable a user with lower privileges to execute unauthorized tasks.
CWE-427 Mar 13, 2023
CVE-2023-25147 6.7 MEDIUM EPSS 0.00
Trendmicro Apex One < 14.0.11960 - Uncontrolled Search Path
An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this.
CWE-427 Mar 10, 2023
CVE-2023-25143 9.8 CRITICAL EPSS 0.06
Trendmicro Apex One < 14.0.11960 - Uncontrolled Search Path
An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products.
CWE-427 Mar 10, 2023
CVE-2023-23554 8.8 HIGH 1 Writeup EPSS 0.01
Sraoss PG Ivm < 1.5.1 - Uncontrolled Search Path
Uncontrolled search path element vulnerability exists in pg_ivm versions prior to 1.5.1. When refreshing an IMMV, pg_ivm executes functions without specifying schema names. Under certain conditions, pg_ivm may be tricked to execute unexpected functions from other schemas with the IMMV owner's privilege. If this vulnerability is exploited, an unexpected function provided by an attacker may be executed with the privilege of the materialized view owner.
CWE-427 Mar 07, 2023
CVE-2023-26266 7.3 HIGH EPSS 0.00
AFL++ 4.05c - Code Injection
In AFL++ 4.05c, the CmpLog component uses the current working directory to resolve and execute unprefixed fuzzing targets, allowing code execution.
CWE-427 Feb 21, 2023
CVE-2022-32972 7.8 HIGH EPSS 0.00
Infoblox BloxOne Endpoint <2.2.7 - Code Injection
Infoblox BloxOne Endpoint for Windows through 2.2.7 allows DLL injection that can result in local privilege escalation.
CWE-427 Feb 17, 2023
CVE-2022-41314 6.7 MEDIUM EPSS 0.00
Intel(R) Network Adapter - Privilege Escalation
Uncontrolled search path in some Intel(R) Network Adapter installer software may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 16, 2023
CVE-2022-37340 6.7 MEDIUM EPSS 0.00
Intel Quickassist Technology < 1.6 - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) QAT drivers for Windows before version 1.6 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 16, 2023
CVE-2022-37329 6.7 MEDIUM EPSS 0.00
Intel Fpga Software Development Kit < 22.1 - Uncontrolled Search Path
Uncontrolled search path in some Intel(R) Quartus(R) Prime Pro and Standard Edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 16, 2023