CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
1,099 results Clear all
CVE-2021-25247 7.8 HIGH EPSS 0.00
Trend Micro HouseCall <5.3.1063 - Privilege Escalation
A DLL hijacking vulnerability Trend Micro HouseCall for Home Networks version 5.3.1063 and below could allow an attacker to use a malicious DLL to escalate privileges and perform arbitrary code execution. An attacker must already have user privileges on the machine to exploit this vulnerability.
CWE-427 Jan 27, 2021
CVE-2021-3115 7.5 HIGH EPSS 0.00
GO < 1.14.14 - Uncontrolled Search Path
Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).
CWE-427 Jan 26, 2021
CVE-2021-1280 7.8 HIGH EPSS 0.00
Cisco Advanced Malware Protection For... - Uncontrolled Search Path
A vulnerability in the loading mechanism of specific DLLs of Cisco Advanced Malware Protection (AMP) for Endpoints for Windows and Immunet for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack. To exploit this vulnerability, the attacker would need valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with SYSTEM privileges.
CWE-427 Jan 20, 2021
CVE-2021-21011 7.0 HIGH EPSS 0.01
Adobe Captivate <11.5.1.499 - Privilege Escalation
Adobe Captivate 2019 version 11.5.1.499 (and earlier) is affected by an uncontrolled search path element vulnerability that could lead to privilege escalation. An attacker with permissions to write to the file system could leverage this vulnerability to escalate privileges.
CWE-427 Jan 13, 2021
CVE-2021-21010 7.0 HIGH EPSS 0.02
InCopy <15.1.1 - RCE
InCopy version 15.1.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 Jan 13, 2021
CVE-2021-21008 7.0 HIGH EPSS 0.01
Adobe Animate <21.0 - RCE
Adobe Animate version 21.0 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 Jan 13, 2021
CVE-2021-21007 7.0 HIGH EPSS 0.01
Adobe Illustrator <25.0 - RCE
Adobe Illustrator version 25.0 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 Jan 13, 2021
CVE-2021-1240 4.8 MEDIUM EPSS 0.00
Cisco Proximity < 3.1.0 - Uncontrolled Search Path
A vulnerability in the loading process of specific DLLs in Cisco Proximity Desktop for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user&rsquo;s account.
CWE-427 Jan 13, 2021
CVE-2021-1237 7.8 HIGH EPSS 0.00
Cisco AnyConnect Secure Mobility Client for Windows - DLL Injection
A vulnerability in the Network Access Manager and Web Security Agent components of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL injection attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system which, in turn, causes a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges.
CWE-427 Jan 13, 2021
CVE-2021-20616 7.8 HIGH EPSS 0.00
SKYSEA Client View <16.001.01g - Privilege Escalation
Untrusted search path vulnerability in the installer of SKYSEA Client View Ver.1.020.05b to Ver.16.001.01g allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CWE-427 Jan 13, 2021
CVE-2020-26050 7.8 HIGH EPSS 0.00
Safervpn < 5.0.4.15 - Uncontrolled Search Path
SaferVPN for Windows Ver 5.0.3.3 through 5.0.4.15 could allow local privilege escalation from low privileged users to SYSTEM via a crafted openssl configuration file. This issue is similar to CVE-2019-12572.
CWE-427 Jan 12, 2021
CVE-2020-35483 7.8 HIGH EPSS 0.00
Anydesk < 6.1.0 - Uncontrolled Search Path
AnyDesk before 6.1.0 on Windows, when run in portable mode on a system where the attacker has write access to the application directory, allows this attacker to compromise a local user account via a read-only setting for a Trojan horse gcapi.dll file.
CWE-427 Jan 11, 2021
CVE-2020-5681 7.8 HIGH EPSS 0.00
EpsonNet SetupManager <2.2.14 - Privilege Escalation
Untrusted search path vulnerability in self-extracting files created by EpsonNet SetupManager versions 2.2.14 and earlier, and Offirio SynergyWare PrintDirector versions 1.6x/1.6y and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CWE-427 Dec 24, 2020
CVE-2020-24578 6.5 MEDIUM EPSS 0.20
D-Link DSL-2888A <AU_2.31_V1.1.47ae55 - Info Disclosure
An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. It has a misconfigured FTP service that allows a malicious network user to access system folders and download sensitive files (such as the password hash file).
CWE-427 Dec 22, 2020
CVE-2020-29654 7.8 HIGH EPSS 0.00
Western Digital Dashboard <3.2.2.9 - Privilege Escalation
Western Digital Dashboard before 3.2.2.9 allows DLL Hijacking that leads to compromise of the SYSTEM account.
CWE-427 Dec 12, 2020
CVE-2020-24447 7.0 HIGH EPSS 0.00
Adobe Lightroom Classic <10.0 - RCE
Adobe Lightroom Classic version 10.0 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 Dec 11, 2020
CVE-2020-24440 7.0 HIGH EPSS 0.00
Adobe Prelude <9.0.1 - Code Injection
Adobe Prelude version 9.0.1 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-427 Dec 11, 2020
CVE-2020-2049 7.8 HIGH EPSS 0.00
Paloaltonetworks Cortex Xdr Agent < 7.1.3 - Uncontrolled Search Path
A local privilege escalation vulnerability exists in Palo Alto Networks Cortex XDR Agent on the Windows platform that allows an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory. This issue impacts: All versions of Cortex XDR Agent 7.1 with content update 149 and earlier versions; All versions of Cortex XDR Agent 7.2 with content update 149 and earlier versions.
CWE-427 Dec 09, 2020
CVE-2020-28950 7.8 HIGH EPSS 0.00
Kaspersky Anti-ransomware Tool < 4.0 - Uncontrolled Search Path
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CWE-427 Dec 04, 2020
CVE-2020-27348 6.8 MEDIUM EPSS 0.00
snapcraft <4.4.4, <2.43.1+16.04.1, <2.43.1+18.04.1 - RCE
In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.
CWE-427 Dec 04, 2020