CVE & Exploit Intelligence Database

Updated 50m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
1,099 results Clear all
CVE-2022-2006 7.8 HIGH EPSS 0.00
Automationdirect C-more Ea9-t6cl Firmware - Uncontrolled Search Path
AutomationDirect DirectLOGIC has a DLL vulnerability in the install directory that may allow an attacker to execute code during the installation process. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73;
CWE-427 Aug 31, 2022
CVE-2022-28696 7.8 HIGH EPSS 0.00
Intel(R) Distribution for Python <2022.0.3 - Privilege Escalation
Uncontrolled search path in the Intel(R) Distribution for Python before version 2022.0.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 18, 2022
CVE-2022-26374 7.8 HIGH EPSS 0.00
Intel(R) SEAPI - Privilege Escalation
Uncontrolled search path in the installation binaries for Intel(R) SEAPI all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 18, 2022
CVE-2022-25999 7.8 HIGH EPSS 0.00
Intel(R) Enpirion(R) Digital Power Configurator - Privilege Escalation
Uncontrolled search path element in the Intel(R) Enpirion(R) Digital Power Configurator GUI software, all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 18, 2022
CVE-2022-25841 7.8 HIGH EPSS 0.00
Intel Datacenter Group Event - Uncontrolled Search Path
Uncontrolled search path elements in the Intel(R) Datacenter Group Event Android application, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 18, 2022
CVE-2022-21807 7.8 HIGH EPSS 0.00
Intel Vtune Profiler < 2022.2.0 - Uncontrolled Search Path
Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Aug 18, 2022
CVE-2022-2334 7.2 HIGH 1 PoC Analysis EPSS 0.62
Softing Secure Integration Server V1.22 - RCE
The application searches for a library dll that is not found. If an attacker can place a dll with this name, then the attacker can leverage it to execute arbitrary code on the targeted Softing Secure Integration Server V1.22.
CWE-427 Aug 17, 2022
CVE-2022-34235 7.8 HIGH EPSS 0.00
Adobe Premiere Elements <2020v20 - Privilege Escalation
Adobe Premiere Elements version 2020v20 (and earlier) is affected by an Uncontrolled Search Path Element which could lead to Privilege Escalation. An attacker could leverage this vulnerability to obtain admin using an existing low-privileged user. Exploitation of this issue does not require user interaction.
CWE-427 Aug 11, 2022
CVE-2022-36840 4.5 MEDIUM EPSS 0.00
Samsung Update < 2.2.9.50 - Uncontrolled Search Path
DLL hijacking vulnerability in Samsung Update Setup prior to version 2.2.9.50 allows attackers to execute arbitrary code.
CWE-427 Aug 05, 2022
CVE-2021-38410 7.3 HIGH EPSS 0.00
Aveva Batch Management - Uncontrolled Search Path
AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.
CWE-427 Jul 27, 2022
CVE-2022-2313 8.2 HIGH EPSS 0.00
MA Smart Installer <5.7.7 - Code Injection
A DLL hijacking vulnerability in the MA Smart Installer for Windows prior to 5.7.7, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL into the folder from where the Smart installer is being executed.
CWE-427 Jul 27, 2022
CVE-2022-36415 7.8 HIGH EPSS 0.00
Scooter Beyond Compare <4.4.3 - Code Injection
A DLL hijacking vulnerability exists in the uninstaller in Scooter Beyond Compare 1.8a through 4.4.2 before 4.4.3 when installed via the EXE installer. The uninstaller attempts to load DLLs out of a Windows Temp folder. If a standard user places malicious DLLs in the C:\Windows\Temp\ folder, and then the uninstaller is run as SYSTEM, the DLLs will execute with elevated privileges.
CWE-427 Jul 23, 2022
CVE-2022-32498 5.5 MEDIUM EPSS 0.00
Dell Powerstore Command Line Interface - Uncontrolled Search Path
Dell EMC PowerStore, Versions prior to v3.0.0.0 contain a DLL Hijacking vulnerability in PSTCLI. A local attacker can potentially exploit this vulnerability to execute arbitrary code, escalate privileges, and bypass software allow list solutions, leading to system takeover or IP exposure.
CWE-427 Jul 21, 2022
CVE-2022-34902 7.8 HIGH EPSS 0.00
Parallels Access - Uncontrolled Search Path
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access 6.5.4 (39316) Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Desktop Control Agent service. The service loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-15787.
CWE-427 Jul 18, 2022
CVE-2022-34901 7.8 HIGH EPSS 0.00
Parallels Access - Uncontrolled Search Path
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access 6.5.4 (39316) Agent. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. The service executes files from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-16137.
CWE-427 Jul 18, 2022
CVE-2022-34900 7.8 HIGH EPSS 0.00
Parallels Access - Uncontrolled Search Path
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access 6.5.3 (39313) Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Dispatcher service. The service loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-15213.
CWE-427 Jul 18, 2022
CVE-2021-42923 7.3 HIGH EPSS 0.00
Showmypc - Uncontrolled Search Path
ShowMyPC 3606 on Windows suffers from a DLL hijack vulnerability. If an attacker overwrites the file %temp%\ShowMyPC\-ShowMyPC3606\wodVPN.dll, it will run any malicious code contained in that file. The code will run with normal user privileges unless the user specifically runs ShowMyPC as administrator.
CWE-427 Jul 18, 2022
CVE-2022-32223 7.3 HIGH 1 PoC Analysis EPSS 0.06
Nodejs Node.js < 14.14.0 - Uncontrolled Search Path
Node.js is vulnerable to Hijack Execution Flow: DLL Hijacking under certain conditions on Windows platforms.This vulnerability can be exploited if the victim has the following dependencies on a Windows machine:* OpenSSL has been installed and “C:\Program Files\Common Files\SSL\openssl.cnf” exists.Whenever the above conditions are present, `node.exe` will search for `providers.dll` in the current user directory.After that, `node.exe` will try to search for `providers.dll` by the DLL Search Order in Windows.It is possible for an attacker to place the malicious file `providers.dll` under a variety of paths and exploit this vulnerability.
CWE-427 Jul 14, 2022
CVE-2022-32222 5.3 MEDIUM EPSS 0.01
Nodejs Node.js < 18.5.0 - Uncontrolled Search Path
A cryptographic vulnerability exists on Node.js on linux in versions of 18.x prior to 18.40.0 which allowed a default path for openssl.cnf that might be accessible under some circumstances to a non-admin user instead of /etc/ssl as was the case in versions prior to the upgrade to OpenSSL 3.
CWE-310 Jul 14, 2022
CVE-2022-29187 7.8 HIGH EPSS 0.00
Git <2.37.1-2.30.5 - Privilege Escalation
Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.
CWE-427 Jul 12, 2022