CWE-427: CWE-427
Yearly Trend
Top Affected Vendors
All CWE-427 CVEs (391)
A DLL hijacking vulnerability in SanDisk PrivateAccess for Windows allows local attackers to execute arbitrary code with system privileges. This requi...
Mar 13, 2024This vulnerability allows attackers to execute arbitrary code with administrative privileges by exploiting insecure DLL loading in the RICOH job log a...
Feb 20, 2026The M-Track Duo HD installer version 1.0.0 has a DLL hijacking vulnerability where attackers can place malicious DLLs in directories searched by the i...
Feb 12, 2026A vulnerability in SINEC NMS allows low-privileged users to modify configuration files, enabling DLL hijacking attacks. This could lead to arbitrary c...
Feb 10, 2026A low-privileged user can modify configuration files in SINEC NMS User Management Component, allowing malicious DLL loading. This leads to arbitrary c...
Feb 10, 2026This vulnerability allows attackers to execute arbitrary code by exploiting insecure DLL loading in Roland Cloud Manager. Attackers can plant maliciou...
Feb 3, 2026This vulnerability allows attackers to execute arbitrary code with administrator privileges by exploiting insecure DLL loading in the ServerView Agent...
Jan 21, 2026This vulnerability allows attackers to execute arbitrary code by exploiting DLL hijacking in PIONEER CORPORATION installers. When users run affected i...
Jan 8, 2026This vulnerability allows non-admin users on Windows systems to perform DLL hijacking during Samsung Magician installation, leading to privilege escal...
Jan 5, 2026The Eaton UPS Companion software has a vulnerability where insecure library loading allows attackers with access to the software package to execute ar...
Dec 26, 2025This vulnerability allows local attackers to escalate privileges on TradingView Desktop installations by exploiting an uncontrolled search path in the...
Dec 23, 2025Soda PDF Desktop contains an uncontrolled search path vulnerability where it loads OpenSSL configuration files from insecure locations. This allows lo...
Dec 23, 2025Hubstaff 1.6.14 has a DLL search order hijacking vulnerability where attackers can place a malicious wow64log.dll in the system32 directory. When Hubs...
Dec 18, 2025This vulnerability allows arbitrary code execution when converting Jupyter notebooks containing SVG output to PDF on Windows systems. Attackers can cr...
Dec 17, 2025MailEnable versions before 10.54 have a DLL hijacking vulnerability where the administrative executable loads MEAIAU.DLL from its installation directo...
Dec 10, 2025This vulnerability allows local attackers to execute arbitrary code on MailEnable servers by planting a malicious DLL in the installation directory. A...
Dec 10, 2025MailEnable versions before 10.54 have a DLL hijacking vulnerability where the administrative executable loads MEAISO.DLL from its installation directo...
Dec 10, 2025MailEnable versions before 10.54 have a DLL hijacking vulnerability where the administrative executable loads MEAIMF.DLL from its installation directo...
Dec 10, 2025This vulnerability allows local attackers with write access to MailEnable's installation directory to execute arbitrary code by planting a malicious D...
Dec 10, 2025MailEnable versions before 10.54 have a DLL hijacking vulnerability where the administrative executable loads MEAIAM.DLL from its installation directo...
Dec 10, 2025MailEnable versions before 10.54 have a DLL hijacking vulnerability where the administrative executable loads MEAISP.DLL from its installation directo...
Dec 10, 2025MailEnable versions before 10.54 have a DLL hijacking vulnerability where the administrative executable loads MEAIPC.DLL from its installation directo...
Dec 10, 2025This vulnerability allows local attackers with write access to MailEnable's installation directory to execute arbitrary code by planting a malicious D...
Dec 10, 2025A DLL hijacking vulnerability in Lenovo One Client allows local authenticated users to execute arbitrary code with elevated privileges by placing a ma...
Dec 10, 2025A DLL hijacking vulnerability in Lenovo App Store and Lenovo Browser allows local authenticated users to execute arbitrary code with elevated privileg...
Dec 10, 2025This CVE describes a Search Order Hijacking vulnerability in Yandex Telemost on macOS, where an attacker could place a malicious library in a location...
Dec 9, 2025This CVE describes an uncontrolled search path vulnerability in Vim on Windows that allows arbitrary code execution. When Vim runs external commands v...
Dec 2, 2025This vulnerability allows attackers to execute arbitrary code by exploiting insecure DLL loading in the INZONE Hub installer. When users run the insta...
Dec 1, 2025This vulnerability allows attackers to execute arbitrary code by exploiting an uncontrolled search path element in the LogStare Collector installer fo...
Nov 21, 2025This DLL hijacking vulnerability in Siemens Software Center and Solid Edge allows attackers to execute arbitrary code by placing a malicious DLL file ...
Nov 11, 2025A vulnerability in Altair Grid Engine allows local attackers to execute arbitrary code with superuser privileges by manipulating environment variables...
Nov 11, 2025This vulnerability in HP Client Management Script Library allows attackers to escalate privileges during software installation. It affects systems run...
Nov 3, 2025This vulnerability allows attackers to execute arbitrary code by placing malicious DLL files in locations where the WTW EAGLE installer searches for t...
Oct 29, 2025A DLL hijacking vulnerability in Lenovo PC Manager allows local authenticated users to execute arbitrary code with elevated privileges by placing a ma...
Oct 15, 2025CVE-2025-26860 is a DLL hijacking vulnerability in RemoteCall Remote Support Program (for Operator) that allows attackers to execute arbitrary code by...
Oct 15, 2025This vulnerability allows attackers to execute arbitrary code by placing a malicious DLL in the same directory as the RemoteView PC Application Consol...
Oct 15, 2025This vulnerability allows local privilege escalation on Windows systems running affected Checkmk Windows Agent versions. An attacker with local access...
Oct 9, 2025This vulnerability allows attackers to execute arbitrary code by exploiting insecure DLL loading in DENSO TEN drive recorder viewer installers. Attack...
Oct 6, 2025A local privilege escalation vulnerability in Asterisk's safe_asterisk script allows non-root users with write access to /etc/asterisk to execute arbi...
Sep 23, 2025A DLL hijacking vulnerability in CYRISMA Agent versions before 444 allows local users to escalate privileges and execute arbitrary code by placing mal...
Sep 16, 2025A DLL hijacking vulnerability in Lenovo Browser allows local attackers to execute arbitrary code with elevated privileges by placing malicious DLLs in...
Sep 11, 2025This DLL search path hijacking vulnerability in UPDF for Windows allows attackers with local access to execute arbitrary code by placing a malicious F...
Sep 10, 2025This DLL search path hijacking vulnerability in UPDF.exe allows attackers with local access to execute arbitrary code by placing a malicious dxtn.dll ...
Sep 10, 2025Sunshine for Windows v2025.122.141614 has a DLL search-order hijacking vulnerability where attackers can place malicious DLLs in user-writable PATH di...
Sep 9, 2025This vulnerability in Foxit PDF Reader's Update Service allows local attackers to escalate privileges by loading a malicious library from an unsecured...
Sep 2, 2025This DLL hijacking vulnerability in a setup component allows attackers to execute arbitrary code when legitimate users install applications using the ...
Aug 12, 2025This vulnerability allows local attackers to escalate privileges on Action1 installations by exploiting an insecure OpenSSL configuration file loading...
Jun 6, 2025CVE-2025-43553 is an uncontrolled search path vulnerability in Substance3D Modeler that allows attackers to execute arbitrary code by tricking users i...
May 13, 2025This vulnerability allows local attackers to escalate privileges on Bdrive NetDrive installations by exploiting an insecure OpenSSL configuration file...
Apr 23, 2025This vulnerability in Wondershare Filmora 9.2.11 allows attackers to perform DLL hijacking attacks, potentially leading to privilege escalation. Attac...
Mar 4, 2025About CWE-427 (CWE-427)
Our database tracks 391 CVEs classified as CWE-427, with 7 rated critical and 276 rated high severity. The average CVSS score for CWE-427 vulnerabilities is 7.5.
External reference: View CWE-427 on MITRE CWE →
Monitor CWE-427 Vulnerabilities
Get alerted when new CWE-427 CVEs affect your infrastructure.
Start Monitoring Free