CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
197 results Clear all
CVE-2022-44555 7.5 HIGH EPSS 0.00
DDMP/ODMF - DoS
The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable.
CWE-294 Nov 09, 2022
CVE-2022-44457 9.8 CRITICAL EPSS 0.00
Mendix SAML - Info Disclosure
A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 7 compatible) (All versions >= V1.17.0 < V1.17.2), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 8 compatible) (All versions >= V2.3.0 < V2.3.2), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.3.1 < V3.3.5), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.3.0 < V3.3.4). Affected versions of the module insufficiently protect from packet capture replay, only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled. This CVE entry describes the incomplete fix for CVE-2022-37011 in a specific non default configuration.
CWE-294 Nov 08, 2022
CVE-2020-35473 4.3 MEDIUM EPSS 0.00
Bluetooth Core Specification < 5.2 - Information Disclosure
An information leakage vulnerability in the Bluetooth Low Energy advertisement scan response in Bluetooth Core Specifications 4.0 through 5.2, and extended scan response in Bluetooth Core Specifications 5.0 through 5.2, may be used to identify devices using Resolvable Private Addressing (RPA) by their response or non-response to specific scan requests from remote addresses. RPAs that have been associated with a specific remote device may also be used to identify a peer in the same manner by using its reaction to an active scan request. This has also been called an allowlist-based side channel.
CWE-294 Nov 08, 2022
CVE-2022-29475 8.1 HIGH EPSS 0.00
Goabode Iota All-in-one Security Kit Firmware - Information Disclosure
An information disclosure vulnerability exists in the XFINDER functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted man-in-the-middle attack can lead to increased privileges. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
CWE-294 Oct 25, 2022
CVE-2022-41541 8.1 HIGH 1 Writeup EPSS 0.01
TP-Link AX10v1 - Open Redirect
TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to the web application as an admin user.
CWE-294 Oct 18, 2022
CVE-2022-2780 8.1 HIGH EPSS 0.00
Octopus Server - SSRF
In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.
CWE-294 Oct 14, 2022
CVE-2022-42731 7.5 HIGH 1 Writeup EPSS 0.00
django-mfa2 <2.5.1, <2.6.1 - Info Disclosure
mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.
CWE-294 Oct 11, 2022
CVE-2021-46835 4.3 MEDIUM EPSS 0.00
WS7200-10 11.0.2.13 - SSRF
There is a traffic hijacking vulnerability in WS7200-10 11.0.2.13. Successful exploitation of this vulnerability can cause packets to be hijacked by attackers.
CWE-294 Sep 20, 2022
CVE-2022-40621 7.5 HIGH EPSS 0.00
WAVLINK Quantum D4G - Info Disclosure
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack.
CWE-294 Sep 13, 2022
CVE-2022-37011 9.8 CRITICAL EPSS 0.01
Mendix SAML <1.17.0, <2.3.0, <3.3.0 - Auth Bypass
A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0). Affected versions of the module insufficiently protect from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. For compatibility reasons, fix versions still contain this issue, but only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled.
CWE-294 Sep 13, 2022
CVE-2022-36089 8.2 HIGH EPSS 0.00
KubeVela <1.4.11, <1.5.4 - Auth Bypass
KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue.
CWE-294 Sep 07, 2022
CVE-2022-37418 6.4 MEDIUM 1 PoC Analysis EPSS 0.02
Nissan-Kia-Hyundai <2017 - RCE
The Remote Keyless Entry (RKE) receiving unit on certain Nissan, Kia, and Hyundai vehicles through 2017 allows remote attackers to perform unlock operations and force a resynchronization after capturing two consecutive valid key fob signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely.
CWE-294 Aug 24, 2022
CVE-2022-37305 6.4 MEDIUM EPSS 0.02
Honda - Privilege Escalation
The Remote Keyless Entry (RKE) receiving unit on certain Honda vehicles through 2018 allows remote attackers to perform unlock operations and force a resynchronization after capturing five consecutive valid RKE signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely.
CWE-294 Aug 24, 2022
CVE-2022-36945 6.4 MEDIUM EPSS 0.02
Mazda - RCE
The Remote Keyless Entry (RKE) receiving unit on certain Mazda vehicles through 2020 allows remote attackers to perform unlock operations and force a resynchronization after capturing three consecutive valid key-fob signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely.
CWE-294 Aug 24, 2022
CVE-2021-22640 7.5 HIGH EPSS 0.00
Ovarro TBox - Info Disclosure
An attacker can decrypt the Ovarro TBox login password by communication capture and brute force attacks.
CWE-522 Jul 28, 2022
CVE-2022-31158 7.5 HIGH EPSS 0.00
LTI 1.3 Tool Library <5.0 - Info Disclosure
LTI 1.3 Tool Library is a library used for building IMS-certified LTI 1.3 tool providers in PHP. Prior to version 5.0, the Nonce Claim Value was not being validated against the nonce value sent in the Authentication Request. Users should upgrade to version 5.0 to receive a patch. There are currently no known workarounds.
CWE-294 Jul 15, 2022
CVE-2022-29593 5.9 MEDIUM 2 PoCs Analysis EPSS 0.08
Dingtian DT-R002 - RCE
relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
CWE-294 Jul 14, 2022
CVE-2022-33971 7.5 HIGH EPSS 0.00
OMRON NX7/NX1/NJ - Auth Bypass
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, and Machine automation controller NJ series all models V 1.48 and earlier, which may allow an adjacent attacker who can analyze the communication between the controller and the specific software used by OMRON internally to cause a denial-of-service (DoS) condition or execute a malicious program.
CWE-294 Jul 04, 2022
CVE-2022-33208 8.1 HIGH EPSS 0.00
Machine automation controller - Auth Bypass
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software 'Sysmac Studio' and/or a Programmable Terminal (PT) to access the controller.
CWE-294 Jul 04, 2022
CVE-2022-30467 6.8 MEDIUM 1 Writeup EPSS 0.00
Joyebike Wolf 2022 Firmware - Denial of Service
Joy ebike Wolf Manufacturing year 2022 is vulnerable to Denial of service, which allows remote attackers to jam the key fob request via RF.
CWE-294 Jun 29, 2022