CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
1,099 results Clear all
CVE-2025-14406 7.8 HIGH EPSS 0.00
Soda PDF Desktop - Privilege Escalation
Soda PDF Desktop Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Soda PDF Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25793.
CWE-427 Dec 23, 2025
CVE-2025-14405 6.8 MEDIUM EPSS 0.00
PDFsam Enhanced - Privilege Escalation
PDFsam Enhanced Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows phyiscally-present attackers to escalate privileges on affected installations of PDFsam Enhanced. An attacker must first obtain the ability to mount a malicious drive onto the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-27867.
CWE-427 Dec 23, 2025
CVE-2023-53959 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
FileZilla Client 3.63.1 - Code Injection
FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches.
CWE-427 Dec 19, 2025
CVE-2023-53937 7.8 HIGH 1 PoC Analysis EPSS 0.00
Hubstaff 1.6.14 - DLL Search Order Hijacking
Hubstaff 1.6.14 contains a DLL search order hijacking vulnerability that allows attackers to replace a missing system32 wow64log.dll with a malicious library. Attackers can generate a custom DLL using Metasploit and place it in the system32 directory to obtain a reverse shell during application startup.
CWE-427 Dec 18, 2025
CVE-2025-53000 7.8 HIGH 1 Writeup EPSS 0.00
Jupyter Nbconvert < 7.16.6 - Uncontrolled Search Path
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. This issue has been patched in version 7.17.0.
CWE-427 Dec 17, 2025
CVE-2025-13670 6.7 MEDIUM EPSS 0.00
Intel High Level Synthesis Compiler < 24.3 - Uncontrolled Search Path
The High Level Synthesis Compiler i++ command for Windows is vulnerable to a DLL planting vulnerability
CWE-427 Dec 12, 2025
CVE-2025-13669 6.7 MEDIUM EPSS 0.00
Intel High Level Synthesis Compiler < 24.3 - Uncontrolled Search Path
Uncontrolled Search Path Element vulnerability in Altera High Level Synthesis Compiler on Windows allows Search Order Hijacking.This issue affects High Level Synthesis Compiler: from 19.1 through 24.3.
CWE-427 Dec 12, 2025
CVE-2025-13665 6.7 MEDIUM EPSS 0.00
Intel Quartus Prime < 24.1 - Uncontrolled Search Path
The System Console Utility for Windows is vulnerable to a DLL planting vulnerability
CWE-427 Dec 12, 2025
CVE-2025-13668 6.7 MEDIUM EPSS 0.00
Intel Quartus Prime < 25.1 - Uncontrolled Search Path
A potential security vulnerability in Quartus® Prime Pro Edition Design Software may allow escalation of privilege.
CWE-427 Dec 11, 2025
CVE-2025-13664 6.7 MEDIUM EPSS 0.00
Intel Quartus Prime < 24.1 - Uncontrolled Search Path
A potential security vulnerability in Quartus® Prime Standard Edition Design Software may allow escalation of privilege.
CWE-427 Dec 11, 2025
CVE-2025-64995 6.5 MEDIUM EPSS 0.00
Teamviewer Digital Employee Experience - Uncontrolled Search Path
A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction prior V3.4. Improper protection of the execution path on the local device allows attackers, with local access to the device during execution, to hijack the process and execute arbitrary code with SYSTEM privileges.
CWE-427 Dec 11, 2025
CVE-2025-64994 6.5 MEDIUM EPSS 0.00
Teamviewer Digital Employee Experience - Uncontrolled Search Path
A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-SetWorkRate instruction prior V17.1. The improper handling of executable search paths could allow local attackers with write access to a PATH directory on a device to escalate privileges and execute arbitrary code as SYSTEM.
CWE-427 Dec 11, 2025
CVE-2025-34424 7.8 HIGH EPSS 0.00
Mailenable < 10.54 - Uncontrolled Search Path
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAIDP.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAIDP.DLL, which is then loaded on execution, resulting in attacker-controlled code running with the privileges of the process.
CWE-427 Dec 10, 2025
CVE-2025-34423 7.8 HIGH EPSS 0.00
Mailenable < 10.54 - Uncontrolled Search Path
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAIAU.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAIAU.DLL, which is then loaded on execution, resulting in attacker-controlled code running with the privileges of the process.
CWE-427 Dec 10, 2025
CVE-2025-34422 7.8 HIGH EPSS 0.00
Mailenable < 10.54 - Uncontrolled Search Path
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAIPC.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAIPC.DLL, which is then loaded on execution, resulting in attacker-controlled code running with the privileges of the process.
CWE-427 Dec 10, 2025
CVE-2025-34421 7.8 HIGH EPSS 0.00
Mailenable < 10.54 - Uncontrolled Search Path
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAISP.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAISP.DLL, which is then loaded on execution, resulting in attacker-controlled code running with the privileges of the process.
CWE-427 Dec 10, 2025
CVE-2025-34420 7.8 HIGH EPSS 0.00
Mailenable < 10.54 - Uncontrolled Search Path
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAIAM.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAIAM.DLL, which is then loaded on execution, resulting in attacker-controlled code running with the privileges of the process.
CWE-427 Dec 10, 2025
CVE-2025-34419 7.8 HIGH EPSS 0.00
Mailenable < 10.54 - Uncontrolled Search Path
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAISM.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAISM.DLL, which is then loaded when the executable starts, resulting in execution of attacker-controlled code with the privileges of the process.
CWE-427 Dec 10, 2025
CVE-2025-34418 7.8 HIGH EPSS 0.00
Mailenable < 10.54 - Uncontrolled Search Path
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAIMF.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAIMF.DLL, which is then loaded when the executable starts, resulting in execution of attacker-controlled code with the privileges of the process.
CWE-427 Dec 10, 2025
CVE-2025-34417 7.8 HIGH EPSS 0.00
Mailenable < 10.54 - Uncontrolled Search Path
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAISO.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAISO.DLL, which is then loaded when the executable starts, resulting in execution of attacker-controlled code with the privileges of the process.
CWE-427 Dec 10, 2025