CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
1,099 results Clear all
CVE-2022-22996 7.8 HIGH EPSS 0.00
Westerndigital Sandisk Professional G... - Uncontrolled Search Path
The G-RAID 4/8 Software Utility setups for Windows were affected by a DLL hijacking vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the system user.
CWE-427 Mar 30, 2022
CVE-2021-44226 7.3 HIGH EPSS 0.00
Razer Synapse < 3.7.0228.022817 - Uncontrolled Search Path
Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
CWE-427 Mar 23, 2022
CVE-2020-25182 6.7 MEDIUM EPSS 0.00
Schneider-electric Easergy T300 Firmware - Uncontrolled Search Path
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.
CWE-427 Mar 18, 2022
CVE-2022-26511 7.8 HIGH EPSS 0.00
WPS Presentation <11.8.0.5745 - Buffer Overflow
WPS Presentation 11.8.0.5745 insecurely load d3dx9_41.dll when opening .pps files('current directory type' DLL loading).
CWE-427 Mar 17, 2022
CVE-2022-26081 7.8 HIGH EPSS 0.00
WPS Office <10.8.0.5745 - Code Injection
The installer of WPS Office Version 10.8.0.5745 insecurely load shcore.dll, allowing an attacker to execute arbitrary code with the privilege of the user invoking the installer.
CWE-427 Mar 17, 2022
CVE-2022-25969 7.8 HIGH EPSS 0.00
WPS Office <10.8.0.6186 - Code Injection
The installer of WPS Office Version 10.8.0.6186 insecurely load VERSION.DLL (or some other DLLs), allowing an attacker to execute arbitrary code with the privilege of the user invoking the installer.
CWE-427 Mar 17, 2022
CVE-2022-20001 7.8 HIGH EPSS 0.00
fish <3.3.1 - RCE
fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs `git` commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the `fish_git_prompt` function from the prompt.
CWE-74 Mar 14, 2022
CVE-2022-23401 7.8 HIGH EPSS 0.00
Yokogawa Centum CS 3000 Firmware < r3.09.00 - Uncontrolled Search Path
The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
CWE-427 Mar 11, 2022
CVE-2022-26337 7.8 HIGH EPSS 0.00
Trend Micro Password Manager (Consumer) <5.0.0.1262 - Buffer Overflow
Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an attacker to use a specially crafted file to exploit the vulnerability and escalate local privileges on the affected machine.
CWE-427 Mar 08, 2022
CVE-2022-26319 6.5 MEDIUM EPSS 0.00
Trend Micro Portable Security <3.0 Pro, 2.0 - Privilege Escalation
An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
CWE-427 Mar 08, 2022
CVE-2022-22943 6.7 MEDIUM EPSS 0.00
Vmware Tools < 12.0.0 - Uncontrolled Search Path
VMware Tools for Windows (11.x.y and 10.x.y prior to 12.0.0) contains an uncontrolled search path vulnerability. A malicious actor with local administrative privileges in the Windows guest OS, where VMware Tools is installed, may be able to execute code with system privileges in the Windows guest OS due to an uncontrolled search path element.
CWE-427 Mar 03, 2022
CVE-2022-23202 7.0 HIGH EPSS 0.07
Adobe Creative Cloud Desktop Application - Uncontrolled Search Path
Adobe Creative Cloud Desktop version 2.7.0.13 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must download a malicious DLL file. The attacker has to deliver the DLL on the same folder as the installer which makes it as a high complexity attack vector.
CWE-427 Feb 16, 2022
CVE-2021-43940 7.8 HIGH EPSS 0.00
Atlassian Confluence <7.4.10 & <7.12.3 - Privilege Escalation
Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. This vulnerability only affects installations of Confluence Server and Data Center on Windows. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
CWE-427 Feb 15, 2022
CVE-2022-23410 7.8 HIGH EPSS 0.01
Axis IP Utility < 4.18.0 - Uncontrolled Search Path
AXIS IP Utility before 4.18.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder.
CWE-427 Feb 14, 2022
CVE-2022-23853 7.8 HIGH EPSS 0.00
KDE Kate <21.12.2 & KTextEditor <5.91.0 - Path Traversal
The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.
CWE-427 Feb 11, 2022
CVE-2022-0483 7.8 HIGH EPSS 0.00
Acronis VSS Doctor <build 53 - Privilege Escalation
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis VSS Doctor (Windows) before build 53
CWE-427 Feb 11, 2022
CVE-2022-24955 9.8 CRITICAL EPSS 0.01
Foxit Pdf Reader < 11.1.0.52543 - Uncontrolled Search Path
Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have an Uncontrolled Search Path Element for DLL files.
CWE-427 Feb 11, 2022
CVE-2022-22528 7.8 HIGH EPSS 0.00
SAP ASE <16.0 - Privilege Escalation
SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries.
CWE-427 Feb 09, 2022
CVE-2021-33101 7.8 HIGH EPSS 0.00
Intel(R) GPA <21.2 - Privilege Escalation
Uncontrolled search path in the Intel(R) GPA software before version 21.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 09, 2022
CVE-2021-0169 6.7 MEDIUM EPSS 0.00
Intel PROSet/Wireless <11 - Privilege Escalation
Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
CWE-427 Feb 09, 2022