CWE-426: CWE-426
Yearly Trend
Top Affected Vendors
All CWE-426 CVEs (124)
This Windows kernel vulnerability allows an authenticated attacker to execute arbitrary code with SYSTEM privileges by exploiting a flaw in how the ke...
Apr 9, 2024GitPython versions before 3.1.41 on Windows are vulnerable to untrusted search path attacks when using shell execution for git commands or bash.exe fo...
Jan 11, 2024This vulnerability allows remote code execution through Microsoft's Printer Metadata Troubleshooter Tool. An attacker could exploit this to run arbitr...
Jan 9, 2024This CVE describes a DLL hijacking vulnerability in Fortinet FortiClient for Windows where an attacker can place a malicious OpenSSL engine library in...
Nov 14, 2023This vulnerability in Microsoft Windows Defender allows attackers to elevate privileges on affected systems. An authenticated attacker could exploit t...
Nov 14, 2023This vulnerability allows remote code execution through the Windows User Interface Application Core component. Attackers can exploit this to execute a...
Nov 14, 2023This vulnerability in Zscaler Client Connector for macOS allows local attackers to execute arbitrary code with root privileges by exploiting an unquot...
Oct 23, 2023CVE-2023-4736 is an untrusted search path vulnerability in Vim that allows attackers to execute arbitrary code by placing malicious files in directori...
Sep 2, 2023GitPython on Windows systems can execute malicious git binaries from the current working directory instead of the system PATH, allowing arbitrary comm...
Aug 28, 2023This is an untrusted search path vulnerability in Trend Micro Apex One and Apex One as a Service security agents that allows local attackers to escala...
Jun 26, 2023This vulnerability in Wondershare Edrawmind allows remote attackers to execute arbitrary commands through a malicious WindowsCodescs.dll file. Attacke...
Apr 4, 2023This vulnerability allows remote attackers to execute arbitrary commands on systems running vulnerable versions of Wondershare UniConverter. Attackers...
Apr 4, 2023This vulnerability allows remote attackers to execute arbitrary commands on systems running Wondershare MobileTrans v4.0.2. Attackers can exploit this...
Apr 4, 2023This vulnerability allows remote attackers to execute arbitrary commands on systems running vulnerable versions of Wondershare Recoverit. Attackers ca...
Apr 4, 2023This vulnerability in Wondershare Dr.Fone allows remote attackers to execute arbitrary commands through a malicious drfone_setup_full3360.exe file. It...
Apr 4, 2023This vulnerability in Wondershare PDF Reader allows remote attackers to execute arbitrary commands via a malicious setup file. Users running version 1...
Apr 4, 2023This vulnerability allows remote attackers to execute arbitrary commands on systems running Wondershare Creative Center v1.0.8. Attackers can exploit ...
Apr 4, 2023This vulnerability allows an attacker to gain SYSTEM-level privileges on Windows systems by exploiting a flaw in the Client Server Runtime Subsystem (...
Jul 12, 2022This vulnerability in Acer Care Center allows local attackers to perform DLL hijacking attacks by placing malicious DLL files on the system. When the ...
Jan 26, 2022CVE-2021-26556 is a local privilege escalation vulnerability in Octopus Server where incorrect folder ACLs when installed to custom locations allow un...
Oct 7, 2021This vulnerability allows attackers to escalate privileges by placing a malicious DLL in a specific directory when the Teradici PCoIP Software Client ...
Jul 21, 2021CVE-2021-26807 is a DLL hijacking vulnerability in GOG Galaxy Client version 2.0.28.9 that loads unsigned DLLs from the PATH environment variable. Thi...
Apr 30, 2021CVE-2021-3146 is a local privilege escalation vulnerability in Dolby Audio X2 (DAX2) API service on Windows. It allows local users to execute arbitrar...
Apr 8, 2021This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands during PgBouncer authentication by manipulating the search_path ...
Dec 3, 2025This CVE describes an untrusted search path vulnerability in .NET and Visual Studio that allows attackers to execute arbitrary code by manipulating th...
Jun 13, 2025MongoDB Compass versions before 1.42.1 are vulnerable to local privilege escalation when a malicious file is placed in the C:\node_modules\ directory....
Feb 27, 2025MongoDB Shell (mongosh) versions before 2.3.0 are vulnerable to local privilege escalation when a malicious file is placed in C:\node_modules\. This a...
Feb 27, 2025CVE-2024-23304 is a denial-of-service vulnerability in Cybozu KUNAI for Android that allows remote unauthenticated attackers to crash the application ...
Feb 6, 2024This vulnerability allows local users to escalate privileges to root by exploiting relative library resolution in Apache Hadoop's container-executor b...
Nov 16, 2023A vulnerability in Python 3.11 through 3.11.4 allows path truncation via null bytes in os.path.normpath(). This can bypass security checks that previo...
Aug 23, 2023Kodbox versions 1.2.x through 1.3.7 have a sensitive information leakage vulnerability that allows attackers to access confidential data without authe...
May 12, 2023This vulnerability in Microsoft Edge (Chromium-based) allows an attacker to elevate privileges on a compromised system. It affects users running vulne...
Jan 17, 2025Notepad++ versions before 8.9.2 have an unsafe search path vulnerability when launching Windows Explorer. This could allow an attacker to execute mali...
Feb 19, 2026AMD StoreMI software versions before 3.2.0.031 have incorrect default permissions that could allow a local attacker to escalate privileges. This affec...
Nov 23, 2025This DLL hijacking vulnerability in AMD StoreMI allows attackers to place malicious DLLs in directories where the software searches for them, enabling...
Nov 23, 2025An untrusted search path vulnerability in Esri ArcGIS AllSource versions 1.2 and 1.3 allows attackers with local file system write access to place mal...
Feb 25, 2025CVE-2024-50986 is a DLL hijacking vulnerability in Clementine music player version 1.3.1 that allows local attackers to execute arbitrary code by plac...
Nov 15, 2024This CVE describes a DLL hijacking vulnerability in Fortinet FortiClient for Windows where an attacker can place a malicious DLL in a location that Fo...
Nov 12, 2024Dell SupportAssist for Home PCs Installer version 4.0.3 contains a local privilege escalation vulnerability where a low-privileged authenticated attac...
Aug 21, 2024This vulnerability in Zoom Desktop Client for Windows allows an authenticated local user to escalate privileges through an untrusted search path in th...
Aug 8, 2023This vulnerability allows an authenticated user on a Windows system to escalate privileges by exploiting an untrusted search path in Zoom's 32-bit cli...
Feb 14, 2024CVE-2023-36780 is a remote code execution vulnerability in Skype for Business that allows attackers to execute arbitrary code on affected systems by s...
Oct 10, 2023This CVE describes an untrusted search path vulnerability in CleanZoom (Zoom's cleaning utility) that allows a privileged user to escalate privileges ...
Sep 12, 2023CVE-2023-22743 is a DLL side-loading vulnerability in Git for Windows that allows local attackers to execute arbitrary code with elevated privileges. ...
Feb 14, 2023This CVE describes a DLL hijacking vulnerability in Flos Freeware Notepad2 versions 4.2.22 through 4.2.25. Attackers can exploit uncontrolled search p...
Feb 16, 2026This vulnerability in Unidocs ezPDF DRM Reader and ezPDF Reader allows local attackers to exploit an uncontrolled search path issue in SHFOLDER.dll, p...
Feb 15, 2026This vulnerability in Artifex MuPDF on Windows allows local attackers to exploit an uncontrolled search path issue in the get_system_dpi function. Att...
Feb 10, 2026OpenTelemetry-Go SDK versions v1.20.0 through v1.39.0 on macOS/Darwin systems are vulnerable to path hijacking attacks. An attacker with local access ...
Feb 2, 2026This vulnerability allows an unauthorized attacker to execute arbitrary code on a local system by exploiting an untrusted search path in Microsoft Off...
Jan 13, 2026This CVE describes an unquoted search path vulnerability in Muse Group MuseHub's Windows Service updater component. Attackers with local access could ...
Nov 20, 2025About CWE-426 (CWE-426)
Our database tracks 124 CVEs classified as CWE-426, with 10 rated critical and 103 rated high severity. The average CVSS score for CWE-426 vulnerabilities is 7.6.
External reference: View CWE-426 on MITRE CWE →
Monitor CWE-426 Vulnerabilities
Get alerted when new CWE-426 CVEs affect your infrastructure.
Start Monitoring Free