CWE-427: CWE-427
Yearly Trend
Top Affected Vendors
All CWE-427 CVEs (388)
This vulnerability allows authenticated Mattermost users to write files to arbitrary locations on the filesystem by uploading archives containing path...
Jun 20, 2025CVE-2025-65741 allows attackers to inject malicious dynamic libraries (.dylib files) into Sublime Text 3 on macOS, enabling arbitrary code execution w...
Dec 9, 2025This dependency confusion vulnerability in pipreqs allows attackers to execute arbitrary code by uploading malicious packages to a PyPI repository ser...
Jun 30, 2023This vulnerability in Trend Micro Apex One Server installer allows attackers to execute arbitrary code remotely by exploiting an uncontrolled search p...
Mar 10, 2023CVE-2022-24955 is a DLL hijacking vulnerability in Foxit PDF software that allows attackers to execute arbitrary code by placing malicious DLL files i...
Feb 11, 2022This vulnerability allows arbitrary code execution when git-bug executes git.bat from the current directory due to an uncontrolled search path element...
Mar 22, 2021This vulnerability allows DLL hijacking through uncontrolled search paths in industrial control systems. Attackers can place malicious DLLs in directo...
Oct 22, 2021OpenClaw versions before 2026.2.14 have a command hijacking vulnerability where attackers can manipulate PATH environment variables to execute malicio...
Mar 5, 2026Dell Command | Intel vPro Out of Band versions before 4.7.0 have a path traversal vulnerability that allows local low-privileged attackers to execute ...
Mar 3, 2026This vulnerability allows authenticated standard users to trick Process Optimization services into loading arbitrary code, leading to privilege escala...
Jan 16, 2026This vulnerability in NVIDIA TAO allows attackers to load malicious resources via uncontrolled search paths, potentially leading to privilege escalati...
Dec 3, 2025DigiSign DigiSigner ONE 1.0.4.60 is vulnerable to DLL hijacking, allowing attackers to execute arbitrary code by placing a malicious DLL in a location...
Oct 1, 2025This vulnerability allows attackers to replace trusted executables in Salesforce CLI on Windows by exploiting an uncontrolled search path element. Att...
Sep 23, 2025IBM Cognos Dashboards on Cloud Pak for Data is vulnerable to dependency confusion attacks, allowing remote attackers to execute unauthorized actions b...
Jan 24, 2025This vulnerability in HP PC audio drivers allows local attackers to escalate privileges on affected systems. Attackers could gain SYSTEM-level access ...
Nov 12, 2024This vulnerability allows local authenticated attackers to perform DLL hijacking in Ivanti Workspace Control's management console, enabling privilege ...
Sep 10, 2024This vulnerability in Ubuntu's wpa_supplicant allows local unprivileged users to load arbitrary shared objects, leading to privilege escalation to roo...
Aug 7, 2024This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Xenon installations by tricking users into opening malicious fil...
May 3, 2024This vulnerability allows local users on Windows systems running vulnerable Checkmk agent plugins to escalate privileges to SYSTEM level. It affects C...
Mar 11, 2024This vulnerability in EnterpriseDB Postgres Advanced Server (EPAS) allows attackers to execute arbitrary code by exploiting search_path attacks agains...
Dec 12, 2023This vulnerability in Intel AI Hackathon software allows attackers to place malicious files in locations the software searches, potentially enabling p...
Aug 11, 2023This vulnerability in Intel's WULT software allows attackers to escalate privileges by exploiting an uncontrolled search path. Unauthenticated users c...
May 10, 2023This vulnerability allows local attackers to escalate privileges to SYSTEM level on Windows systems by exploiting DLL hijacking in M-Files Installer. ...
Mar 29, 2023This vulnerability allows authenticated users with Scan Policy Configuration roles in Tenable products to manipulate audit policy variables and execut...
Mar 15, 2023This vulnerability in pg_ivm allows attackers to execute arbitrary functions with the privileges of the materialized view owner by exploiting an uncon...
Mar 7, 2023This vulnerability allows a local Windows user with lower privileges to escalate to the Splunk user account through a path misconfiguration. It affect...
May 6, 2022The Eaton UPS Companion software installer fails to properly authenticate library files, allowing attackers who can modify the software package to exe...
Dec 26, 2025The Eaton IPP software installer improperly authenticates library files, allowing attackers with access to the software package to execute arbitrary c...
Oct 14, 2025This DLL hijacking vulnerability in the ToolStick installer allows attackers to place malicious DLLs in directories searched by the installer, leading...
Jan 24, 2025This DLL hijacking vulnerability in the CP210 VCP Win 2k installer allows attackers to escalate privileges and execute arbitrary code by placing malic...
Jan 24, 2025This CVE describes a DLL hijacking vulnerability in the CP210x VCP Windows installer that allows attackers to escalate privileges and execute arbitrar...
Jan 24, 2025This CVE describes a DLL hijacking vulnerability in the USBXpress Dev Kit installer where an uncontrolled search path allows attackers to place malici...
Jan 24, 2025This CVE describes a DLL hijacking vulnerability in the USBXpress 4 SDK installer that allows attackers to execute arbitrary code with elevated privil...
Jan 24, 2025This CVE describes a DLL hijacking vulnerability in the USBXpress SDK installer where an uncontrolled search path allows attackers to place malicious ...
Jan 24, 2025This DLL hijacking vulnerability in the USBXpress Win 98SE Dev Kit installer allows attackers to escalate privileges and execute arbitrary code by pla...
Jan 24, 2025This CVE describes a DLL hijacking vulnerability in Silicon Labs 8-bit IDE installer where an uncontrolled search path allows attackers to place malic...
Jan 24, 2025This DLL hijacking vulnerability in Configuration Wizard 2 installer allows attackers to escalate privileges and execute arbitrary code by placing mal...
Jan 24, 2025This DLL hijacking vulnerability in the Flash Programming Utility installer allows attackers to escalate privileges and execute arbitrary code by plac...
Jan 24, 2025This vulnerability in GitLab's Visual Studio Code extension allows attackers to execute arbitrary code on users' systems through client-side exploitat...
Apr 1, 2021This vulnerability allows users with program compilation or restoration capabilities on IBM i systems to gain elevated privileges through an unqualifi...
Feb 24, 2025A DLL hijacking vulnerability in Evope Collector 1.1.6.9.0 allows local unprivileged attackers to execute arbitrary code with SYSTEM privileges by pla...
Oct 29, 2025CVE-2025-56383 is a DLL hijacking vulnerability in Notepad++ v8.8.3 that allows attackers to replace legitimate DLL files with malicious ones, potenti...
Sep 26, 2025This vulnerability in Blizzard Battle.net allows attackers to escalate privileges by placing a malicious script or executable in the C:\ProgramData di...
May 21, 2025This vulnerability in IBM i and IBM Rational Development Studio for i allows a local user to execute arbitrary code with administrator privileges due ...
Apr 28, 2024This vulnerability in IBM Db2 for i allows a local user to escalate privileges through an unqualified library call, enabling execution of user-control...
Mar 14, 2024CVE-2020-25244 is a DLL hijacking vulnerability in Siemens LOGO! Soft Comfort software that allows local attackers to execute arbitrary code by placin...
Apr 22, 2021CVE-2021-28570 is an uncontrolled search path vulnerability in Adobe After Effects that allows attackers to plant malicious binaries in specific locat...
Jun 28, 2021NVIDIA Display Driver has a DLL hijacking vulnerability (CWE-427) where attackers can place malicious DLLs in uncontrolled search paths. This allows l...
Oct 10, 2025This vulnerability in NVIDIA GPU Display Driver for Windows allows low-privileged users to escalate privileges when an administrator updates GPU drive...
Nov 2, 2023PostgreSQL Anonymizer extension contains a privilege escalation vulnerability where users can create malicious operators in schemas with CREATE permis...
Feb 11, 2026About CWE-427 (CWE-427)
Our database tracks 388 CVEs classified as CWE-427, with 7 rated critical and 273 rated high severity. The average CVSS score for CWE-427 vulnerabilities is 7.5.
External reference: View CWE-427 on MITRE CWE →
Monitor CWE-427 Vulnerabilities
Get alerted when new CWE-427 CVEs affect your infrastructure.
Start Monitoring Free