CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
688 results Clear all
CVE-2021-22044 7.5 HIGH EPSS 0.00
Vmware Spring Cloud Openfeign < 2.2.9 - Information Disclosure
In Spring Cloud OpenFeign 3.0.0 to 3.0.4, 2.2.0.RELEASE to 2.2.9.RELEASE, and older unsupported versions, applications using type-level `@RequestMapping`annotations over Feign client interfaces, can be involuntarily exposing endpoints corresponding to `@RequestMapping`-annotated interface methods.
CWE-200 Oct 28, 2021
CVE-2021-22468 3.3 LOW EPSS 0.00
HarmonyOS - Info Disclosure
A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage.
CWE-668 Oct 28, 2021
CVE-2021-22454 5.5 MEDIUM EPSS 0.00
HarmonyOS - Memory Corruption
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump.
CWE-668 Oct 28, 2021
CVE-2021-34761 4.4 MEDIUM EPSS 0.00
Cisco Firepower Threat Defense - Privilege Escalation
A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.
CWE-668 Oct 27, 2021
CVE-2021-42536 8.0 HIGH EPSS 0.00
Emerson Wireless 1410 Gateway Firmware - Information Disclosure
The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables.
CWE-200 Oct 22, 2021
CVE-2020-11303 8.6 HIGH EPSS 0.00
Qualcomm Apq8009 Firmware - Exposure to Wrong Actor
Accepting AMSDU frames with mismatched destination and source address can lead to information disclosure in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE-668 Oct 20, 2021
CVE-2021-41140 5.3 MEDIUM 1 Writeup EPSS 0.00
Discourse-reactions <0.2 - Info Disclosure
Discourse-reactions is a plugin for the Discourse platform that allows user to add their reactions to the post. In affected versions reactions given by user to secure topics and private messages are visible. This issue is patched in version 0.2 of discourse-reaction. Users who are unable to update are advised to disable the Discourse-reactions plugin in admin panel.
CWE-200 Oct 19, 2021
CVE-2021-39184 6.8 MEDIUM EPSS 0.00
Electron < 11.5.0 - Missing Authorization
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.
CWE-862 Oct 12, 2021
CVE-2021-40497 5.3 MEDIUM EPSS 0.00
SAP BusinessObjects Analysis <430 - Info Disclosure
SAP BusinessObjects Analysis (edition for OLAP) - versions 420, 430, allows an attacker to exploit certain application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation could lead to exposure of some system specific data like its version.
CWE-668 Oct 12, 2021
CVE-2021-40496 4.3 MEDIUM EPSS 0.00
SAP ICM - Auth Bypass
SAP Internet Communication framework (ICM) - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785, allows an attacker with logon functionality, to exploit the authentication function by using POST and form field to repeat executions of the initial command by a GET request and exposing sensitive data. This vulnerability is normally exposed over the network and successful exploitation can lead to exposure of data like system details.
CWE-668 Oct 12, 2021
CVE-2020-28145 7.5 HIGH EPSS 0.00
Wuzhicms - Exposure to Wrong Actor
Arbitrary file deletion vulnerability was discovered in wuzhicms v 4.0.1 via coreframe\app\attachment\admin\index.php, which allows attackers to access sensitive information.
CWE-668 Oct 12, 2021
CVE-2020-21503 7.5 HIGH EPSS 0.00
Waimai Super Cms - Exposure to Wrong Actor
waimai Super Cms 20150505 has a logic flaw allowing attackers to modify a price, before form submission, by observing data in a packet capture. By setting the index.php?m=gift&a=addsave credit parameter to -1, the product is sold for free.
CWE-668 Oct 05, 2021
CVE-2021-41094 4.2 MEDIUM EPSS 0.00
Wire - Auth Bypass
Wire is an open source secure messenger. Users of Wire by Bund may bypass the mandatory encryption at rest feature by simply disabling their device passcode. Upon launching, the app will attempt to enable encryption at rest by generating encryption keys via the Secure Enclave, however it will fail silently if no device passcode is set. The user has no indication that encryption at rest is not active since the feature is hidden to them. This issue has been resolved in version 3.70
CWE-668 Oct 04, 2021
CVE-2021-22869 9.8 CRITICAL EPSS 0.00
GitHub Enterprise Server - Privilege Escalation
An improper access control vulnerability in GitHub Enterprise Server allowed a workflow job to execute in a self-hosted runner group it should not have had access to. This affects customers using self-hosted runner groups for access control. A repository with access to one enterprise runner group could access all of the enterprise runner groups within the organization because of improper authentication checks during the request. This could cause code to be run unintentionally by the incorrect runner group. This vulnerability affected GitHub Enterprise Server versions from 3.0.0 to 3.0.15 and 3.1.0 to 3.1.7 and was fixed in 3.0.16 and 3.1.8 releases.
CWE-287 Sep 24, 2021
CVE-2021-41088 8.0 HIGH EPSS 0.00
Elvish <0.14.0 - SSRF
Elvish is a programming language and interactive shell, combined into one package. In versions prior to 0.14.0 Elvish's web UI backend (started by `elvish -web`) hosts an endpoint that allows executing the code sent from the web UI. The backend does not check the origin of requests correctly. As a result, if the user has the web UI backend open and visits a compromised or malicious website, the website can send arbitrary code to the endpoint in localhost. All Elvish releases from 0.14.0 onward no longer include the the web UI, although it is still possible for the user to build a version from source that includes the web UI. The issue can be patched for previous versions by removing the web UI (found in web, pkg/web or pkg/prog/web, depending on the exact version).
CWE-346 Sep 23, 2021
CVE-2021-22009 7.5 HIGH EPSS 0.01
Vmware Cloud Foundation < 5.0 - Exposure to Wrong Actor
The vCenter Server contains multiple denial-of-service vulnerabilities in VAPI (vCenter API) service. A malicious actor with network access to port 443 on vCenter Server may exploit these issues to create a denial of service condition due to excessive memory consumption by VAPI service.
CWE-668 Sep 23, 2021
CVE-2021-34723 6.7 MEDIUM EPSS 0.00
Cisco Ios XE - Exposure to Wrong Actor
A vulnerability in a specific CLI command that is run on Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the configuration database of an affected device. This vulnerability is due to insufficient validation of specific CLI command parameters. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of the configuration database and gain root-level access to an affected device.
CWE-668 Sep 23, 2021
CVE-2020-14130 5.3 MEDIUM EPSS 0.00
Xiaomi < 3.0.210809 - Exposure to Wrong Actor
Some js interfaces in the Xiaomi community were exposed, causing sensitive functions to be maliciously called on Xiaomi community app Affected Version <3.0.210809
CWE-668 Sep 16, 2021
CVE-2021-40639 7.5 HIGH EPSS 0.00
Jfinal CMS 5.1.0 - Info Disclosure
Improper access control in Jfinal CMS 5.1.0 allows attackers to access sensitive information via /classes/conf/db.properties&config=filemanager.config.js.
CWE-863 Sep 15, 2021
CVE-2020-19155 8.8 HIGH EPSS 0.03
Jfinal CMS <4.7.1 - Info Disclosure & RCE
Improper Access Control in Jfinal CMS v4.7.1 and earlier allows remote attackers to obtain sensitive information and/or execute arbitrary code via the 'FileManager.rename()' function in the component 'modules/filemanager/FileManagerController.java'.
CWE-668 Sep 15, 2021