CVE & Exploit Intelligence Database

Updated 50m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,613 CVEs tracked 53,239 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,918 Nuclei templates 37,790 vendors 42,464 researchers
159 results Clear all
CVE-2022-3807 4.3 MEDIUM EPSS 0.00
Axiomatic Bento4 - DoS
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Incomplete Fix CVE-2019-13238. The manipulation leads to resource consumption. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212660.
CWE-252 Nov 01, 2022
CVE-2022-25718 9.1 CRITICAL EPSS 0.00
Snapdragon - Cryptographic Issue
Cryptographic issue in WLAN due to improper check on return value while authentication handshake in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE-252 Oct 19, 2022
CVE-2022-22233 5.5 MEDIUM EPSS 0.00
Juniper Networks Junos OS/Junos OS Evolved - DoS
An Unchecked Return Value to NULL Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). In Segment Routing (SR) to Label Distribution Protocol (LDP) interworking scenario, configured with Segment Routing Mapping Server (SRMS) at any node, when an Area Border Router (ABR) leaks the SRMS entries having "S" flag set from IS-IS Level 2 to Level 1, an rpd core might be observed when a specific low privileged CLI command is issued. This issue affects: Juniper Networks Junos OS 21.4 versions prior to 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 21.4-EVO versions prior to 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO. This issue does not affect: Juniper Networks Junos OS versions prior to 21.4R1. Juniper Networks Junos OS Evolved versions prior to 21.4R1-EVO.
CWE-252 Oct 18, 2022
CVE-2022-22231 7.5 HIGH EPSS 0.00
Juniper Networks Junos OS <21 - DoS
An Unchecked Return Value to NULL Pointer Dereference vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series if Unified Threat Management (UTM) Enhanced Content Filtering (CF) and AntiVirus (AV) are enabled together and the system processes specific valid transit traffic the Packet Forwarding Engine (PFE) will crash and restart. This issue affects Juniper Networks Junos OS 21.4 versions prior to 21.4R1-S2, 21.4R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 21.4R1.
CWE-252 Oct 18, 2022
CVE-2022-40279 7.5 HIGH 1 Writeup EPSS 0.01
Samsung Tizenrt - Denial of Service
An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). l2_packet_receive_timeout in wpa_supplicant/src/l2_packet/l2_packet_pcap.c has a missing check on the return value of pcap_dispatch, leading to a denial of service (malfunction).
CWE-252 Sep 29, 2022
CVE-2022-40716 6.5 MEDIUM EPSS 0.00
HashiCorp Consul <1.11.8-1.13.1 - Privilege Escalation
HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."
CWE-252 Sep 23, 2022
CVE-2022-38936 7.5 HIGH EPSS 0.00
PBC <2022-8-27 - Memory Corruption
An issue has been found in PBC through 2022-8-27. A SEGV issue detected in the function pbc_wmessage_integer in src/wmessage.c:137.
CWE-252 Sep 23, 2022
CVE-2022-31225 3.0 LOW EPSS 0.00
Dell BIOS - Privilege Escalation
Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user could potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.
CWE-252 Sep 12, 2022
CVE-2022-31220 3.0 LOW EPSS 0.00
Dell BIOS - Privilege Escalation
Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user could potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.
CWE-252 Sep 12, 2022
CVE-2022-1319 7.5 HIGH 1 Writeup EPSS 0.01
Undertow - Info Disclosure
A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
CWE-252 Aug 31, 2022
CVE-2022-0485 4.8 MEDIUM 1 Writeup EPSS 0.00
libnbd - Copying Tool Vuln
A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-threaded copies using asynchronous nbd calls, nbdcopy was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. This could result in the silent creation of a corrupted destination image.
CWE-252 Aug 29, 2022
CVE-2021-4189 5.3 MEDIUM 1 Writeup EPSS 0.01
Python - Info Disclosure
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
CWE-252 Aug 24, 2022
CVE-2021-3998 7.5 HIGH EPSS 0.00
GNU Glibc < 2.35 - Information Disclosure
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
CWE-125 Aug 24, 2022
CVE-2021-3659 5.5 MEDIUM EPSS 0.00
Linux Kernel < 5.12 - NULL Pointer Dereference
A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.
CWE-252 Aug 22, 2022
CVE-2022-31170 7.5 HIGH EPSS 0.00
OpenZeppelin Contracts <4.7.1 - Info Disclosure
OpenZeppelin Contracts is a library for smart contract development. Versions 4.0.0 until 4.7.1 are vulnerable to ERC165Checker reverting instead of returning `false`. `ERC165Checker.supportsInterface` is designed to always successfully return a boolean, and under no circumstance revert. However, an incorrect assumption about Solidity 0.8's `abi.decode` allows some cases to revert, given a target contract that doesn't implement EIP-165 as expected, specifically if it returns a value other than 0 or 1. The contracts that may be affected are those that use `ERC165Checker` to check for support for an interface and then handle the lack of support in a way other than reverting. The issue was patched in version 4.7.1.
CWE-252 Jul 22, 2022
CVE-2022-31089 7.5 HIGH 1 Writeup EPSS 0.00
Parse Server <4.10.12, <5.2.3 - DoS
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions certain types of invalid files requests are not handled properly and can crash the server. If you are running multiple Parse Server instances in a cluster, the availability impact may be low; if you are running Parse Server as single instance without redundancy, the availability impact may be high. This issue has been addressed in versions 4.10.12 and 5.2.3. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-252 Jun 27, 2022
CVE-2022-21211 5.9 MEDIUM EPSS 0.00
posix - Info Disclosure
This affects all versions of package posix. When invoking the toString method, it will fallback to 0x0 value, as the value of toString is not invokable (not a function), and then it will crash with type-check.
CWE-252 Jun 10, 2022
CVE-2022-30783 6.7 MEDIUM EPSS 0.00
NTFS-3G <2021.8.22 - Info Disclosure
An invalid return code in fuse_kern_mount enables intercepting of libfuse-lite protocol traffic between NTFS-3G and the kernel in NTFS-3G through 2021.8.22 when using libfuse-lite.
CWE-252 May 26, 2022
CVE-2021-0155 5.5 MEDIUM EPSS 0.00
Intel(R) Processors - Info Disclosure
Unchecked return value in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
CWE-252 May 12, 2022
CVE-2021-41041 5.3 MEDIUM EPSS 0.00
Eclipse Openj9 <0.32.0 - Code Injection
In Eclipse Openj9 before version 0.32.0, Java 8 & 11 fail to throw the exception captured during bytecode verification when verification is triggered by a MethodHandle invocation, allowing unverified methods to be invoked using MethodHandles.
CWE-252 Apr 27, 2022