CVE & Exploit Intelligence Database

Updated 36m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
1,099 results Clear all
CVE-2020-6787 7.8 HIGH EPSS 0.00
Bosch Video Client < 1.7.6.079 - Uncontrolled Search Path
Loading a DLL through an Uncontrolled Search Path Element in the Bosch Video Client installer up to and including version 1.7.6.079 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from.
CWE-427 Mar 25, 2021
CVE-2020-6786 7.8 HIGH EPSS 0.00
Bosch Video Recording Manager < 3.71 - Uncontrolled Search Path
Loading a DLL through an Uncontrolled Search Path Element in the Bosch Video Recording Manager installer up to and including version 3.82.0055 for 3.82, up to and including version 3.81.0064 for 3.81 and 3.71 and older potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from.
CWE-427 Mar 25, 2021
CVE-2020-6785 7.8 HIGH EPSS 0.00
Bosch Video Management System < 9.0 - Uncontrolled Search Path
Loading a DLL through an Uncontrolled Search Path Element in Bosch BVMS and BVMS Viewer in versions 10.1.0, 10.0.1, 10.0.0 and 9.0.0 and older potentially allows an attacker to execute arbitrary code on a victim's system. This affects both the installer as well as the installed application. This also affects Bosch DIVAR IP 7000 R2, Bosch DIVAR IP all-in-one 5000 and Bosch DIVAR IP all-in-one 7000 with installers and installed BVMS versions prior to BVMS 10.1.1.
CWE-427 Mar 25, 2021
CVE-2020-6771 7.8 HIGH EPSS 0.00
Bosch IP Helper < 1.00.0008 - Uncontrolled Search Path
Loading a DLL through an Uncontrolled Search Path Element in Bosch IP Helper up to and including version 1.00.0008 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same application directory as the portable IP Helper application.
CWE-427 Mar 25, 2021
CVE-2021-28822 8.8 HIGH EPSS 0.00
Tibco Enterprise Message Service < 8.5.1 - Uncontrolled Search Path
The Enterprise Message Service Server (tibemsd), Enterprise Message Service Central Administration (tibemsca), Enterprise Message Service JSON configuration generator (tibemsconf2json), and Enterprise Message Service C API components of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy. Affected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below.
CWE-427 Mar 23, 2021
CVE-2021-28820 8.8 HIGH EPSS 0.00
Tibco Ftl < 6.6.0 - Uncontrolled Search Path
The FTL Server (tibftlserver), FTL C API, FTL Golang API, FTL Java API, and FTL .Net API components of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.5.0 and below, TIBCO FTL - Developer Edition: versions 6.5.0 and below, and TIBCO FTL - Enterprise Edition: versions 6.5.0 and below.
CWE-427 Mar 23, 2021
CVE-2021-28955 9.8 CRITICAL EPSS 0.00
Git-bug < 0.7.2 - Uncontrolled Search Path
git-bug before 0.7.2 has an Uncontrolled Search Path Element. It will execute git.bat from the current directory in certain PATH situations (most often seen on Windows).
CWE-427 Mar 22, 2021
CVE-2021-28954 7.8 HIGH EPSS 0.00
Bit < 1.0.5 - Uncontrolled Search Path
In Chris Walz bit before 1.0.5 on Windows, attackers can run arbitrary code via a .exe file in a crafted repository.
CWE-427 Mar 21, 2021
CVE-2021-28953 7.8 HIGH EPSS 0.00
C/c++ Advanced Lint < 1.9.0 - Uncontrolled Search Path
The unofficial C/C++ Advanced Lint extension before 1.9.0 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted repository.
CWE-427 Mar 21, 2021
CVE-2020-9367 7.8 HIGH EPSS 0.00
Zohocorp Manageengine Desktop Central - Uncontrolled Search Path
The MPS Agent in Zoho ManageEngine Desktop Central MSP build MSP build 10.0.486 is vulnerable to DLL Hijacking: dcinventory.exe and dcconfig.exe try to load CSUNSAPI.dll without supplying the complete path. The issue is aggravated because this DLL is missing from the installation, thus making it possible to hijack the DLL and subsequently inject code, leading to an escalation of privilege to NT AUTHORITY\SYSTEM.
CWE-427 Mar 18, 2021
CVE-2021-22665 7.8 HIGH EPSS 0.00
Rockwell Automation DriveTools SP <5.13 - Privilege Escalation
Rockwell Automation DriveTools SP v5.13 and below and Drives AOP v4.12 and below both contain a vulnerability that a local attacker with limited privileges may be able to exploit resulting in privilege escalation and complete control of the system.
CWE-427 Mar 18, 2021
CVE-2020-26155 7.8 HIGH EPSS 0.00
Utimaco Block-safe Firmware < 4.31.0 - Uncontrolled Search Path
Multiple files and folders in Utimaco SecurityServer 4.20.0.4 and 4.31.1.0. are installed with Read/Write permissions for authenticated users, which allows for binaries to be manipulated by non-administrator users. Additionally, entries are made to the PATH environment variable which, in conjunction with these weak permissions, could enable an attacker to perform a DLL hijacking attack.
CWE-427 Mar 18, 2021
CVE-2021-21518 7.8 HIGH EPSS 0.00
Dell Supportassist Client Promanage - Uncontrolled Search Path
Dell SupportAssist Client for Consumer PCs versions 3.7.x, 3.6.x, 3.4.x, 3.3.x, Dell SupportAssist Client for Business PCs versions 2.0.x, 2.1.x, 2.2.x, and Dell SupportAssist Client ProManage 1.x contain a DLL injection vulnerability in the Costura Fody plugin. A local user with low privileges could potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with SYSTEM privileges.
CWE-427 Mar 12, 2021
CVE-2021-20674 7.8 HIGH EPSS 0.00
MagicConnect Client <2021-03-01 - Privilege Escalation
Untrusted search path vulnerability in Installer of MagicConnect Client program distributed before 2021 March 1 allows an attacker to gain privileges and via a Trojan horse DLL in an unspecified directory and to execute arbitrary code with the privilege of the user invoking the installer when a terminal is connected remotely using Remote desktop.
CWE-427 Mar 12, 2021
CVE-2020-28646 7.8 HIGH EPSS 0.00
Owncloud Desktop Client < 2.7 - Uncontrolled Search Path
ownCloud owncloud/client before 2.7 allows DLL Injection. The desktop client loaded development plugins from certain directories when they were present.
CWE-427 Feb 26, 2021
CVE-2021-1366 7.8 HIGH 1 PoC Analysis EPSS 0.01
Cisco Anyconnect Secure Mobility Client - Uncontrolled Search Path
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.
CWE-427 Feb 17, 2021
CVE-2020-24485 7.8 HIGH EPSS 0.00
Intel(R) FPGA OPAE Driver <4.17 - Privilege Escalation
Improper conditions check in the Intel(R) FPGA OPAE Driver for Linux before kernel version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 17, 2021
CVE-2020-24451 7.3 HIGH EPSS 0.00
Intel(R) Optane(TM) DC Persistent Memory <1.00.00.3506 - Privilege ...
Uncontrolled search path in the Intel(R) Optane(TM) DC Persistent Memory installer for Windows* before version 1.00.00.3506 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-427 Feb 17, 2021
CVE-2020-25238 7.8 HIGH EPSS 0.00
Siemens Simatic Process Control System Neo - Improper Access Control
A vulnerability has been identified in PCS neo (Administration Console) (All versions < V3.1), TIA Portal (V15, V15.1 and V16). Manipulating certain files in specific folders could allow a local attacker to execute code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system.
CWE-284 Feb 09, 2021
CVE-2020-35145 7.8 HIGH EPSS 0.00
Acronis True Image for Windows <2021-3 - Privilege Escalation
Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue.
CWE-427 Jan 29, 2021