CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
1,099 results Clear all
CVE-2021-44206 7.3 HIGH EPSS 0.00
Acronis True Image - Uncontrolled Search Path
Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
CWE-427 Feb 04, 2022
CVE-2021-44205 7.3 HIGH EPSS 0.00
Acronis True Image - Uncontrolled Search Path
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
CWE-427 Feb 04, 2022
CVE-2020-12891 7.8 HIGH EPSS 0.00
AMD Radeon Software - DLL Hijacking
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.
CWE-427 Feb 04, 2022
CVE-2021-44463 8.1 HIGH EPSS 0.00
Emerson Deltav - Uncontrolled Search Path
Missing DLLs, if replaced by an insider, could allow an attacker to achieve local privilege escalation on the DeltaV Distributed Control System Controllers and Workstations (All versions) when some DeltaV services are started.
CWE-427 Jan 28, 2022
CVE-2022-0166 7.8 HIGH EPSS 0.00
McAfee Agent <5.7.5 - Privilege Escalation
A privilege escalation vulnerability in the McAfee Agent prior to 5.7.5. McAfee Agent uses openssl.cnf during the build process to specify the OPENSSLDIR variable as a subdirectory within the installation directory. A low privilege user could have created subdirectories and executed arbitrary code with SYSTEM privileges by creating the appropriate pathway to the specifically created malicious openssl.cnf file.
CWE-427 Jan 19, 2022
CVE-2022-0015 7.8 HIGH EPSS 0.00
Paloaltonetworks Cortex Xdr Agent < 5.0.12 - Uncontrolled Search Path
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9.
CWE-427 Jan 12, 2022
CVE-2022-0129 7.4 HIGH EPSS 0.00
McAfee TechCheck <4.0.0.2 - Privilege Escalation
Uncontrolled search path element vulnerability in McAfee TechCheck prior to 4.0.0.2 allows a local administrator to load their own Dynamic Link Library (DLL) gaining elevation of privileges to system user. This was achieved through placing the malicious DLL in the same directory that the process was run from.
CWE-427 Jan 11, 2022
CVE-2022-21668 8.0 HIGH 1 PoC Analysis EPSS 0.01
Pypa Pipenv < 2022.1.8 - Command Injection
pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). When pip installs from a source distribution, any code in the setup.py is executed by the install process. This issue is patched in version 2022.1.8. The GitHub Security Advisory contains more information about this vulnerability.
CWE-1284 Jan 10, 2022
CVE-2021-30360 7.8 HIGH 1 Writeup EPSS 0.00
Check Point Remote Access Client - Code Injection
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
CWE-427 Jan 10, 2022
CVE-2021-4007 7.8 HIGH EPSS 0.00
Rapid7 Insight Agent <3.1.2.34 - Privilege Escalation
Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 3.1.2.35. This vulnerability is a regression of CVE-2019-5629.
CWE-427 Dec 14, 2021
CVE-2021-20047 7.8 HIGH EPSS 0.00
Sonicwall Global VPN Client < 4.10.6 - Uncontrolled Search Path
SonicWall Global VPN client version 4.10.6 (32-bit and 64-bit) and earlier have a DLL Search Order Hijacking vulnerability. Successful exploitation via a local attacker could result in remote code execution in the target system.
CWE-427 Dec 08, 2021
CVE-2021-43037 7.8 HIGH EPSS 0.00
Kaseya Unitrends <10.5.5 - Privilege Escalation
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Unitrends Windows agent was vulnerable to DLL injection and binary planting due to insecure default permissions. This allowed privilege escalation from an unprivileged user to SYSTEM.
CWE-427 Dec 06, 2021
CVE-2021-32592 7.8 HIGH EPSS 0.00
Fortinet Forticlient < 6.0.9 - Uncontrolled Search Path
An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path.
CWE-427 Dec 01, 2021
CVE-2021-44199 5.5 MEDIUM EPSS 0.00
Acronis Agent < 15 - Uncontrolled Search Path
DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612
CWE-427 Nov 29, 2021
CVE-2021-44198 7.8 HIGH EPSS 0.00
Acronis Cyber Protect < 15 - Uncontrolled Search Path
DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035
CWE-427 Nov 29, 2021
CVE-2021-0082 7.8 HIGH EPSS 0.00
Intel Ax210 Firmware < 22.40 - Uncontrolled Search Path
Uncontrolled search path in software installer for Intel(R) PROSet/Wireless WiFi in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Nov 17, 2021
CVE-2021-3840 8.8 HIGH EPSS 0.01
Antilles <1.0.1 - RCE
A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi.
CWE-427 Nov 12, 2021
CVE-2021-31853 7.8 HIGH EPSS 0.00
Mcafee Drive Encryption < 7.2.10 - Uncontrolled Search Path
DLL Search Order Hijacking Vulnerability in McAfee Drive Encryption (MDE) prior to 7.3.0 HF2 (7.3.0.183) allows local users to execute arbitrary code and escalate privileges via execution from a compromised folder.
CWE-427 Nov 10, 2021
CVE-2021-38420 7.8 HIGH EPSS 0.00
Delta Electronics DIALink <1.2.4.0 - Privilege Escalation
Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files.
CWE-427 Nov 03, 2021
CVE-2021-38416 7.8 HIGH EPSS 0.00
Delta Electronics DIALink <1.2.4.0 - Code Injection
Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed.
CWE-427 Nov 03, 2021