CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
688 results Clear all
CVE-2021-41989 7.8 HIGH 1 Writeup EPSS 0.00
Qlikview < 12.60.20100.0 - Exposure to Wrong Actor
Qlik QlikView through 12.60.20100.0 creates a Temporary File in a Directory with Insecure Permissions.
CWE-668 Jan 26, 2023
CVE-2021-41988 7.8 HIGH 1 Writeup EPSS 0.00
Qlik Nprinting Designer < 21.14.3.0 - Exposure to Wrong Actor
Qlik NPrinting Designer through 21.14.3.0 creates a Temporary File in a Directory with Insecure Permissions.
CWE-668 Jan 26, 2023
CVE-2023-21611 7.8 HIGH EPSS 0.00
Adobe Acrobat Reader <22.003.20282 - Privilege Escalation
Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Creation of Temporary File in Directory with Incorrect Permissions vulnerability that could result in privilege escalation in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-379 Jan 18, 2023
CVE-2022-45438 5.3 MEDIUM EPSS 0.03
Apache Superset < 1.5.2 - Exposure to Wrong Actor
When explicitly enabling the feature flag DASHBOARD_CACHE (disabled by default), the system allowed for an unauthenticated user to access dashboard configuration metadata using a REST API Get endpoint. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.
CWE-668 Jan 16, 2023
CVE-2023-22497 6.5 MEDIUM EPSS 0.00
Netdata < 1.37.0 - Exposure to Wrong Actor
Netdata is an open source option for real-time infrastructure monitoring and troubleshooting. Each Netdata Agent has an automatically generated MACHINE GUID. It is generated when the agent first starts and it is saved to disk, so that it will persist across restarts and reboots. Anyone who has access to a Netdata Agent has access to its MACHINE_GUID. Streaming is a feature that allows a Netdata Agent to act as parent for other Netdata Agents (children), offloading children from various functions (increased data retention, ML, health monitoring, etc) that can now be handled by the parent Agent. Configuration is done via `stream.conf`. On the parent side, users configure in `stream.conf` an API key (any random UUID can do) to provide common configuration for all children using this API key and per MACHINE GUID configuration to customize the configuration for each child. The way this was implemented, allowed an attacker to use a valid MACHINE_GUID as an API key. This affects all users who expose their Netdata Agents (children) to non-trusted users and they also expose to the same users Netdata Agent parents that aggregate data from all these children. The problem has been fixed in: Netdata agent v1.37 (stable) and Netdata agent v1.36.0-409 (nightly). As a workaround, do not enable streaming by default. If you have previously enabled this, it can be disabled. Limiting access to the port on the recipient Agent to trusted child connections may mitigate the impact of this vulnerability.
CWE-287 Jan 14, 2023
CVE-2022-24913 5.5 MEDIUM 1 Writeup EPSS 0.00
Java-merge-sort < 1.1.0 - Exposure to Wrong Actor
Versions of the package com.fasterxml.util:java-merge-sort before 1.1.0 are vulnerable to Insecure Temporary File in the StdTempFileProvider() function in StdTempFileProvider.java, which uses the permissive File.createTempFile() function, exposing temporary file contents.
CWE-377 Jan 12, 2023
CVE-2021-26343 5.5 MEDIUM EPSS 0.00
AMD Epyc 7003 Firmware < milanpi_1.0.0.3 - Exposure to Wrong Actor
Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.
CWE-668 Jan 11, 2023
CVE-2023-21536 4.7 MEDIUM EPSS 0.01
Event Tracing for Windows - Info Disclosure
Event Tracing for Windows Information Disclosure Vulnerability
CWE-125 Jan 10, 2023
CVE-2018-25068 6.3 MEDIUM 1 Writeup EPSS 0.01
devent globalpom-utils <4.5.0 - Insecure Temp File
A vulnerability has been found in devent globalpom-utils up to 4.5.0 and classified as critical. This vulnerability affects the function createTmpDir of the file globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java. The manipulation leads to insecure temporary file. The attack can be initiated remotely. Upgrading to version 4.5.1 is able to address this issue. The patch is identified as 77a820bac2f68e662ce261ecb050c643bd7ee560. It is recommended to upgrade the affected component. VDB-217570 is the identifier assigned to this vulnerability.
CWE-377 Jan 06, 2023
CVE-2022-45935 5.5 MEDIUM EPSS 0.00
Apache James < 3.7.2 - Exposure to Wrong Actor
Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit. Vulnerable components includes the SMTP stack and IMAP APPEND command. This issue affects Apache James server version 3.7.2 and prior versions.
CWE-668 Jan 06, 2023
CVE-2022-0337 6.5 MEDIUM 3 PoCs Analysis EPSS 0.12
Google Chrome <97.0.4692.71 - Info Disclosure
Inappropriate implementation in File System API in Google Chrome on Windows prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. (Chrome security severity: High)
CWE-668 Jan 02, 2023
CVE-2022-48198 9.8 CRITICAL EPSS 0.00
Ntpd Driver < 1.3.0 - Exposure to Wrong Actor
The ntpd_driver component before 1.3.0 and 2.x before 2.2.0 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled time_ref_topic parameter.
CWE-668 Jan 01, 2023
CVE-2022-4817 3.1 LOW 1 Writeup EPSS 0.00
centic9 jgit-cookbook - Insecure Temp File
A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988.
CWE-377 Dec 28, 2022
CVE-2015-10004 7.5 HIGH EPSS 0.00
Token Validation - Timing Side-Channel
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.
CWE-668 Dec 27, 2022
CVE-2019-9011 5.3 MEDIUM EPSS 0.00
Pilz Pmc < 3.5.17 - Exposure to Wrong Actor
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), an attacker can identify valid usernames.
CWE-668 Dec 26, 2022
CVE-2022-45895 6.5 MEDIUM EPSS 0.00
Planetestream Planet Estream < 6.72.10.07 - Exposure to Wrong Actor
Planet eStream before 6.72.10.07 discloses sensitive information, related to the ON cookie (findable in HTML source code for Default.aspx in some situations) and the WhoAmI endpoint (e.g., path disclosure).
CWE-668 Dec 25, 2022
CVE-2022-38474 4.3 MEDIUM EPSS 0.00
Firefox <104 - Info Disclosure
A website that had permission to access the microphone could record audio without the audio notification being shown. This bug does not allow the attacker to bypass the permission prompt - it only affects the notification shown once permission has been granted.<br />*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 104.
CWE-668 Dec 22, 2022
CVE-2022-31596 6.0 MEDIUM EPSS 0.00
SAP BusinessObjects <430 - Info Disclosure
Under certain conditions, an attacker authenticated as a CMS administrator and with high privileges access to the Network in SAP BusinessObjects Business Intelligence Platform (Monitoring DB) - version 430, can access BOE Monitoring database to retrieve and modify (non-personal) system data which would otherwise be restricted. Also, a potential attack could be used to leave the CMS's scope and impact the database. A successful attack could have a low impact on confidentiality, a high impact on integrity, and a low impact on availability.
CWE-668 Dec 12, 2022
CVE-2022-38599 6.5 MEDIUM EPSS 0.00
Teleport <3.6.3 - Info Disclosure
Teleport v3.2.2, Teleport v3.5.6-rc6, and Teleport v3.6.3-b2 was discovered to contain an information leak via the /user/get-role-list web interface.
CWE-668 Dec 08, 2022
CVE-2022-32221 9.8 CRITICAL EPSS 0.02
Haxx Curl < 7.86.0 - Information Disclosure
When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
CWE-200 Dec 05, 2022