CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
442 results Clear all
CVE-2024-0814 6.5 MEDIUM EPSS 0.00
Google Chrome <121.0.6167.85 - XSS
Incorrect security UI in Payments in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
CWE-346 Jan 24, 2024
CVE-2023-47200 7.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.12737 - Origin Validation Error
A plug-in manager origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47201.
CWE-346 Jan 23, 2024
CVE-2023-47199 7.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.12737 - Origin Validation Error
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47193.
CWE-346 Jan 23, 2024
CVE-2023-47198 7.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.12737 - Origin Validation Error
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47199.
CWE-346 Jan 23, 2024
CVE-2023-47197 7.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.12737 - Origin Validation Error
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47198.
CWE-346 Jan 23, 2024
CVE-2023-47196 7.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.12737 - Origin Validation Error
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47197.
CWE-346 Jan 23, 2024
CVE-2023-47195 7.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.12737 - Origin Validation Error
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47196.
CWE-346 Jan 23, 2024
CVE-2023-47194 7.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.12737 - Origin Validation Error
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47195.
CWE-346 Jan 23, 2024
CVE-2023-47193 7.8 HIGH EPSS 0.00
Trendmicro Apex One < 14.0.12737 - Origin Validation Error
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47194.
CWE-346 Jan 23, 2024
CVE-2024-0749 4.3 MEDIUM EPSS 0.00
Firefox < 122 - Info Disclosure
A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7.
CWE-346 Jan 23, 2024
CVE-2023-20275 4.1 MEDIUM EPSS 0.00
Cisco ASA/FTD - Privilege Escalation
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. This vulnerability is due to improper validation of the packet's inner source IP address after decryption. An attacker could exploit this vulnerability by sending crafted packets through the tunnel. A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address. It is not possible for the attacker to receive return packets.
CWE-346 Dec 12, 2023
CVE-2023-49805 6.0 MEDIUM 1 Writeup EPSS 0.00
Dockge < 1.3.3 - Origin Validation Error
Uptime Kuma is an easy-to-use self-hosted monitoring tool. Prior to version 1.23.9, the application uses WebSocket (with Socket.io), but it does not verify that the source of communication is valid. This allows third-party website to access the application on behalf of their client. When connecting to the server using Socket.IO, the server does not validate the `Origin` header leading to other site being able to open connections to the server and communicate with it. Other websites still need to authenticate to access most features, however this can be used to circumvent firewall protections made in place by people deploying the application. Without origin validation, Javascript executed from another origin would be allowed to connect to the application without any user interaction. Without login credentials, such a connection is unable to access protected endpoints containing sensitive data of the application. However, such a connection may allow attacker to further exploit unseen vulnerabilities of the application. Users with "No-auth" mode configured who are relying on a reverse proxy or firewall to provide protection to the application would be especially vulnerable as it would grant the attacker full access to the application. In version 1.23.9, additional verification of the HTTP Origin header has been added to the socket.io connection handler. By default, if the `Origin` header is present, it would be checked against the Host header. Connection would be denied if the hostnames do not match, which would indicate that the request is cross-origin. Connection would be allowed if the `Origin` header is not present. Users can override this behavior by setting environment variable `UPTIME_KUMA_WS_ORIGIN_CHECK=bypass`.
CWE-346 Dec 11, 2023
CVE-2023-49803 8.6 HIGH 1 Writeup EPSS 0.00
Koajs Cross-origin Resource Sharing For Koa - Origin Validation Error
@koa/cors npm provides Cross-Origin Resource Sharing (CORS) for koa, a web framework for Node.js. Prior to version 5.0.0, the middleware operates in a way that if an allowed origin is not provided, it will return an `Access-Control-Allow-Origin` header with the value of the origin from the request. This behavior completely disables one of the most crucial elements of browsers - the Same Origin Policy (SOP), this could cause a very serious security threat to the users of this middleware. If such behavior is expected, for instance, when middleware is used exclusively for prototypes and not for production applications, it should be heavily emphasized in the documentation along with an indication of the risks associated with such behavior, as many users may not be aware of it. Version 5.0.0 fixes this vulnerability.
CWE-346 Dec 11, 2023
CVE-2023-28794 4.3 MEDIUM EPSS 0.00
Zscaler Client Connector <1.3.1.6 - Privilege Escalation
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
CWE-346 Nov 06, 2023
CVE-2023-5859 4.3 MEDIUM EPSS 0.01
Google Chrome < 119.0.6045.105 - Origin Validation Error
Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. (Chromium security severity: Low)
CWE-346 Nov 01, 2023
CVE-2023-5858 4.3 MEDIUM EPSS 0.01
Google Chrome < 119.0.6045.105 - Origin Validation Error
Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)
CWE-346 Nov 01, 2023
CVE-2023-5853 4.3 MEDIUM EPSS 0.01
Google Chrome < 119.0.6045.105 - Origin Validation Error
Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
CWE-346 Nov 01, 2023
CVE-2023-5851 4.3 MEDIUM EPSS 0.00
Google Chrome < 119.0.6045.105 - Origin Validation Error
Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
CWE-346 Nov 01, 2023
CVE-2023-5718 4.3 MEDIUM EPSS 0.00
Vuejs Devtools - Information Disclosure
The Vue.js Devtools extension was found to leak screenshot data back to a malicious web page via the standard `postMessage()` API. By creating a malicious web page with an iFrame targeting a sensitive resource (i.e. a locally accessible file or sensitive website), and registering a listener on the web page, the extension sent messages back to the listener, containing the base64 encoded screenshot data of the sensitive resource.
CWE-346 Oct 23, 2023
CVE-2023-28795 7.8 HIGH EPSS 0.00
Zscaler Client Connector <1.3.1.6 - Code Injection
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
CWE-346 Oct 23, 2023