CVE & Exploit Intelligence Database

Updated 36m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
1,099 results Clear all
CVE-2021-25694 7.8 HIGH EPSS 0.00
Teradici Pcoip Graphics Agent < 21.03 - Uncontrolled Search Path
Teradici PCoIP Graphics Agent for Windows prior to 21.03 does not validate NVENC.dll. An attacker could replace the .dll and redirect pixels elsewhere.
CWE-427 May 13, 2021
CVE-2021-1496 7.0 HIGH EPSS 0.00
Cisco AnyConnect Secure Mobility Client for Windows - Privilege Esc...
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-378 May 06, 2021
CVE-2021-1430 7.0 HIGH EPSS 0.00
Cisco AnyConnect Secure Mobility Client for Windows - Privilege Esc...
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-378 May 06, 2021
CVE-2021-1429 7.0 HIGH EPSS 0.00
Cisco AnyConnect Secure Mobility Client for Windows - Privilege Esc...
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-378 May 06, 2021
CVE-2021-1428 7.0 HIGH EPSS 0.00
Cisco AnyConnect Secure Mobility Client for Windows - Privilege Esc...
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-378 May 06, 2021
CVE-2021-1427 7.0 HIGH EPSS 0.00
Cisco AnyConnect Secure Mobility Client for Windows - Privilege Esc...
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-378 May 06, 2021
CVE-2021-1426 7.0 HIGH EPSS 0.00
Cisco AnyConnect Secure Mobility Client for Windows - Privilege Esc...
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-378 May 06, 2021
CVE-2021-3464 7.8 HIGH EPSS 0.00
Lenovo Pcmanager < 3.0.400.3252 - Uncontrolled Search Path
A DLL search path vulnerability was reported in Lenovo PCManager, prior to version 3.0.400.3252, that could allow privilege escalation.
CWE-427 Apr 27, 2021
CVE-2020-25244 8.4 HIGH EPSS 0.00
Siemens Logo! Soft Comfort - Uncontrolled Search Path
A vulnerability has been identified in LOGO! Soft Comfort (All versions < V8.4). The software insecurely loads libraries which makes it vulnerable to DLL hijacking. Successful exploitation by a local attacker could lead to a takeover of the system where the software is installed.
CWE-427 Apr 22, 2021
CVE-2021-21070 6.5 MEDIUM EPSS 0.00
Adobe Robohelp <2020.0.3 - Privilege Escalation
Adobe Robohelp version 2020.0.3 (and earlier) is affected by an uncontrolled search path element vulnerability that could lead to privilege escalation. An attacker with admin permissions to write to the file system could leverage this vulnerability to escalate privileges.
CWE-427 Apr 19, 2021
CVE-2020-9681 6.5 MEDIUM EPSS 0.00
Adobe Genuine Service < 6.6 - Uncontrolled Search Path
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction.
CWE-427 Apr 16, 2021
CVE-2020-9667 6.5 MEDIUM EPSS 0.00
Adobe Genuine Service < 6.6 - Uncontrolled Search Path
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker with admin privileges could plant custom binaries and execute them with System permissions. Exploitation of this issue requires user interaction.
CWE-427 Apr 16, 2021
CVE-2021-28098 7.8 HIGH EPSS 0.00
Forescout CounterACT <8.1.4 - Privilege Escalation
An issue was discovered in Forescout CounterACT before 8.1.4. A local privilege escalation vulnerability is present in the logging function. SecureConnector runs with administrative privileges and writes logs entries to a file in %PROGRAMDATA%\ForeScout SecureConnector\ that has full permissions for the Everyone group. Using a symbolic link allows an attacker to point the log file to a privileged location such as %WINDIR%\System32. The resulting log file adopts the file permissions of the source of the symbolic link (in this case, the Everyone group). The log file in System32 can be replaced and renamed with a malicious DLL for DLL hijacking.
CWE-427 Apr 14, 2021
CVE-2021-28647 7.8 HIGH EPSS 0.00
Trendmicro Password Manager < 5.0.0.1217 - Uncontrolled Search Path
Trend Micro Password Manager version 5 (Consumer) is vulnerable to a DLL Hijacking vulnerability which could allow an attacker to inject a malicious DLL file during the installation progress and could execute a malicious program each time a user installs a program.
CWE-427 Apr 13, 2021
CVE-2021-21545 7.8 HIGH EPSS 0.00
Dell Peripheral Manager < 1.3.1 - Uncontrolled Search Path
Dell Peripheral Manager 1.3.1 or greater contains remediation for a local privilege escalation vulnerability that could be potentially exploited to gain arbitrary code execution on the system with privileges of the system user.
CWE-427 Apr 12, 2021
CVE-2021-1386 7.0 HIGH EPSS 0.00
Cisco Advanced Malware Protection For... - Uncontrolled Search Path
A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.
CWE-427 Apr 08, 2021
CVE-2021-22195 8.6 HIGH EPSS 0.00
Gitlab-vscode-extension < 3.15.0 - Uncontrolled Search Path
Client side code execution in gitlab-vscode-extension v3.15.0 and earlier allows attacker to execute code on user system
CWE-427 Apr 01, 2021
CVE-2020-6790 7.8 HIGH EPSS 0.00
Bosch Video Streaming Gateway < 6.45.10 - Uncontrolled Search Path
Calling an executable through an Uncontrolled Search Path Element in the Bosch Video Streaming Gateway installer up to and including version 6.45.10 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious exe in the same directory where the installer is started from.
CWE-427 Mar 25, 2021
CVE-2020-6789 7.8 HIGH EPSS 0.00
Bosch Monitor Wall < 10.00.0164 - Uncontrolled Search Path
Loading a DLL through an Uncontrolled Search Path Element in the Bosch Monitor Wall installer up to and including version 10.00.0164 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from.
CWE-427 Mar 25, 2021
CVE-2020-6788 7.8 HIGH EPSS 0.00
Bosch Configuration Manager < 7.21.0078 - Uncontrolled Search Path
Loading a DLL through an Uncontrolled Search Path Element in the Bosch Configuration Manager installer up to and including version 7.21.0078 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from.
CWE-427 Mar 25, 2021