CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
688 results Clear all
CVE-2021-20461 6.5 MEDIUM EPSS 0.00
IBM Cognos Analytics <11.1 - Privilege Escalation
IBM Cognos Analytics 10.0 and 11.1 is susceptible to a weakness in the implementation of the System Appearance configuration setting. An attacker could potentially bypass business logic to modify the appearance and behavior of the application. IBM X-Force ID: 196770.
CWE-668 Jun 30, 2021
CVE-2021-28623 5.5 MEDIUM EPSS 0.00
Adobe Premiere Elements < 5.3 - Exposure to Wrong Actor
Adobe Premiere Elements version 5.2 (and earlier) is affected by an insecure temporary file creation vulnerability. An unauthenticated attacker could leverage this vulnerability to call functions against the installer to perform high privileged actions. Exploitation of this issue does not require user interaction.
CWE-379 Jun 28, 2021
CVE-2021-28597 5.5 MEDIUM EPSS 0.00
Adobe Photoshop Elements < 5.3 - Exposure to Wrong Actor
Adobe Photoshop Elements version 5.2 (and earlier) is affected by an insecure temporary file creation vulnerability. An unauthenticated attacker could leverage this vulnerability to call functions against the installer to perform high privileged actions. Exploitation of this issue does not require user interaction.
CWE-379 Jun 28, 2021
CVE-2021-24001 4.3 MEDIUM EPSS 0.00
Mozilla Firefox < 88.0 - Exposure to Wrong Actor
A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations. This vulnerability affects Firefox < 88.
CWE-668 Jun 24, 2021
CVE-2021-25652 4.9 MEDIUM EPSS 0.00
Avaya Aura Appliance Virtualization Platform - Information Disclosure
An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Appliance Virtualization Platform Utilities (AVPU). This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects versions 8.0.0.0 through 8.1.3.1 of AVPU.
CWE-200 Jun 24, 2021
CVE-2020-18647 7.5 HIGH EPSS 0.00
NoneCMS v1.3 - Info Disclosure
Information Disclosure in NoneCMS v1.3 allows remote attackers to obtain sensitive information via the component "/nonecms/vendor".
CWE-668 Jun 22, 2021
CVE-2020-18646 7.5 HIGH EPSS 0.00
NoneCMS v1.3 - Info Disclosure
Information Disclosure in NoneCMS v1.3 allows remote attackers to obtain sensitive information via the component "/public/index.php".
CWE-668 Jun 22, 2021
CVE-2021-0542 5.5 MEDIUM EPSS 0.00
Android - Info Disclosure
In updateNotification of BeamTransferManager.java, there is a missing permission check. This could lead to local information disclosure of paired Bluetooth addresses with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-168712890
CWE-668 Jun 22, 2021
CVE-2021-21382 8.6 HIGH 1 Writeup EPSS 0.00
Wire Restund < 0.4.15 - Missing Authorization
Restund is an open source NAT traversal server. The restund TURN server can be instructed to open a relay to the loopback address range. This allows you to reach any other service running on localhost which you might consider private. In the configuration that we ship (https://github.com/wireapp/ansible-restund/blob/master/templates/restund.conf.j2#L40-L43) the `status` interface of restund is enabled and is listening on `127.0.0.1`.The `status` interface allows users to issue administrative commands to `restund` like listing open relays or draining connections. It would be possible for an attacker to contact the status interface and issue administrative commands by setting `XOR-PEER-ADDRESS` to `127.0.0.1:{{restund_udp_status_port}}` when opening a TURN channel. We now explicitly disallow relaying to loopback addresses, 'any' addresses, link local addresses, and the broadcast address. As a workaround disable the `status` module in your restund configuration. However there might still be other services running on `127.0.0.0/8` that you do not want to have exposed. The `turn` module can be disabled. Restund will still perform STUN and this might already be enough for initiating calls in your environments. TURN is only used as a last resort when other NAT traversal options do not work. One should also make sure that the TURN server is set up with firewall rules so that it cannot relay to other addresses that you don't want the TURN server to relay to. For example other services in the same VPC where the TURN server is running. Ideally TURN servers should be deployed in an isolated fashion where they can only reach what they need to reach to perform their task of assisting NAT-traversal.
CWE-862 Jun 11, 2021
CVE-2019-9475 5.5 MEDIUM EPSS 0.00
Android - Info Disclosure
In /proc/net of the kernel filesystem, there is a possible information leak due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-9496886
CWE-668 Jun 11, 2021
CVE-2021-22897 5.3 MEDIUM 1 Writeup EPSS 0.01
curl <7.76.1 - Info Disclosure
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.
CWE-840 Jun 11, 2021
CVE-2021-34539 7.2 HIGH EPSS 0.01
Cubecoders Amp < 2.1.1.8 - Exposure to Wrong Actor
An issue was discovered in CubeCoders AMP before 2.1.1.8. A lack of validation of the Java Version setting means that an unintended executable path can be set. The result is that high-privileged users can trigger code execution.
CWE-668 Jun 10, 2021
CVE-2020-24511 6.5 MEDIUM EPSS 0.00
Intel(R) Processors - Info Disclosure
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CWE-668 Jun 09, 2021
CVE-2021-33669 7.8 HIGH EPSS 0.00
SAP Mobile SDK - Info Disclosure
Under certain conditions, SAP Mobile SDK Certificate Provider allows a local unprivileged attacker to exploit an insecure temporary file storage. For a successful exploitation user interaction from another user is required and could lead to complete impact of confidentiality integrity and availability.
CWE-668 Jun 09, 2021
CVE-2021-22550 6.5 MEDIUM 1 Writeup EPSS 0.00
Google Asylo <0.6.3 - Memory Corruption
An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c
CWE-823 Jun 08, 2021
CVE-2021-22549 6.5 MEDIUM 1 Writeup EPSS 0.00
Asylo <0.6.2 - Memory Corruption
An attacker can modify the address to point to trusted memory to overwrite arbitrary trusted memory. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
CWE-823 Jun 08, 2021
CVE-2021-22118 7.8 HIGH EPSS 0.00
Vmware Spring Framework < 5.2.15 - Exposure to Wrong Actor
In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.
CWE-269 May 27, 2021
CVE-2021-31154 7.8 HIGH 1 Writeup EPSS 0.00
pleaseedit <0.4 - Privilege Escalation
pleaseedit in please before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.
CWE-668 May 27, 2021
CVE-2008-2544 5.5 MEDIUM EPSS 0.00
Linux Kernel - Exposure to Wrong Actor
Mounting /proc filesystem via chroot command silently mounts it in read-write mode. The user could bypass the chroot environment and gain write access to files, he would never have otherwise.
CWE-668 May 27, 2021
CVE-2018-16494 8.8 HIGH EPSS 0.01
Versa-networks Versa Operating System - Exposure to Wrong Actor
In VOS and overly permissive "umask" may allow for authorized users of the server to gain unauthorized access through insecure file permissions that can result in an arbitrary read, write, or execution of newly created files and directories. Insecure umask setting was present throughout the Versa servers.
CWE-377 May 26, 2021