CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
688 results Clear all
CVE-2020-27872 8.8 HIGH EPSS 0.01
NETGEAR R7450 <1.2.0.62_1.0.1 - Auth Bypass
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from improper state tracking in the password recovery process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11365.
CWE-642 Feb 04, 2021
CVE-2020-26272 5.4 MEDIUM 1 Writeup EPSS 0.01
Electron <9.4.0, 10.2.0, 11.1.0, 12.0.0-beta.9 - Info Disclosure
The Electron framework lets users write cross-platform desktop applications using JavaScript, HTML and CSS. In versions of Electron IPC prior to 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9, messages sent from the main process to a subframe in the renderer process, through webContents.sendToFrame, event.reply or when using the remote module, can in some cases be delivered to the wrong frame. If your app uses remote, calls webContents.sendToFrame, or calls event.reply in an IPC message handler then it is impacted by this issue. This has been fixed in versions 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9. There are no known workarounds for this issue.
CWE-668 Jan 28, 2021
CVE-2020-26186 6.8 MEDIUM EPSS 0.00
Dell Inspiron 5675 <1.4.1 - Code Injection
Dell Inspiron 5675 BIOS versions prior to 1.4.1 contain a UEFI BIOS RuntimeServices overwrite vulnerability. A local attacker with access to system memory may exploit this vulnerability by overwriting the RuntimeServices structure to execute arbitrary code in System Management Mode (SMM).
CWE-642 Jan 08, 2021
CVE-2020-16268 8.8 HIGH EPSS 0.01
1E Client - Exposure to Wrong Actor
The MSI installer in 1E Client 4.1.0.267 and 5.0.0.745 allows remote authenticated users and local users to gain elevated privileges via the repair option. This applies to installations that have a TRANSFORM (MST) with the option to disable the installation of the Nomad module. An attacker may craft a .reg file in a specific location that will be able to write to any registry key as an elevated user.
CWE-74 Dec 29, 2020
CVE-2020-26261 7.9 HIGH 1 Writeup EPSS 0.00
JupyterHub - Info Disclosure
jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15
CWE-668 Dec 09, 2020
CVE-2015-9550 7.5 HIGH EPSS 0.00
Totolink A850r-v1 Firmware - Exposure to Wrong Actor
An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. By sending a specific hel,xasf packet to the WAN interface, it is possible to open the web management interface on the WAN interface.
CWE-668 Nov 24, 2020
CVE-2020-8698 5.5 MEDIUM EPSS 0.00
Intel(R) Processors - Info Disclosure
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CWE-668 Nov 12, 2020
CVE-2020-26086 4.3 MEDIUM EPSS 0.00
Cisco Telepresence Collaboration Endpoint - Exposure to Wrong Actor
A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper storage of sensitive information on an affected device. An attacker could exploit this vulnerability by accessing information that should not be accessible to users with low privileges. A successful exploit could allow the attacker to gain access to sensitive information.
CWE-668 Nov 06, 2020
CVE-2020-26084 6.5 MEDIUM EPSS 0.00
Cisco Edge Fog Fabric < 1.7.4 - Exposure to Wrong Actor
A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
CWE-668 Nov 06, 2020
CVE-2020-16263 9.1 CRITICAL EPSS 0.00
Winstonprivacy Winston Firmware - Exposure to Wrong Actor
Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.
CWE-668 Oct 28, 2020
CVE-2020-26650 5.3 MEDIUM EPSS 0.00
AtomXCMS 2.0 - Info Disclosure
AtomXCMS 2.0 is affected by Arbitrary File Read via admin/dump.php
CWE-22 Oct 22, 2020
CVE-2020-15264 8.0 HIGH 1 Writeup EPSS 0.00
Boxstarter <2.13.0 - Code Injection
The Boxstarter installer before version 2.13.0 configures C:\ProgramData\Boxstarter to be in the system-wide PATH environment variable. However, this directory is writable by normal, unprivileged users. To exploit the vulnerability, place a DLL in this directory that a privileged service is looking for. For example, WptsExtensions.dll When Windows starts, it'll execute the code in DllMain() with SYSTEM privileges. Any unprivileged user can execute code with SYSTEM privileges. The issue is fixed in version 3.13.0
CWE-668 Oct 20, 2020
CVE-2020-26868 7.5 HIGH EPSS 0.01
ARC Informatique PcVue <12.0.17 - DoS
ARC Informatique PcVue prior to version 12.0.17 is vulnerable to a denial-of-service attack due to the ability of an unauthorized user to modify information used to validate messages sent by legitimate web clients. This issue also affects third-party systems based on the Web Services Toolkit.
CWE-767 Oct 12, 2020
CVE-2020-26602 7.5 HIGH EPSS 0.00
Samsung EthernetNetwork <R - Privilege Escalation
An issue was discovered in EthernetNetwork on Samsung mobile devices with O(8.1), P(9.0), Q(10.0), and R(11.0) software. PendingIntent allows sdcard access by an unprivileged process. The Samsung ID is SVE-2020-18392 (October 2020).
CWE-668 Oct 06, 2020
CVE-2020-13343 7.5 HIGH 1 Writeup EPSS 0.00
GitLab <11.2 - Info Disclosure
An issue has been discovered in GitLab affecting all versions starting from 11.2. Unauthorized Users Can View Custom Project Template
CWE-668 Oct 06, 2020
CVE-2020-15215 5.6 MEDIUM EPSS 0.00
Electron <11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 - Privilege Escalation
Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
CWE-693 Oct 06, 2020
CVE-2020-5422 6.5 MEDIUM EPSS 0.00
BOSH System Metrics Server <0.1.0 - Info Disclosure
BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details).
CWE-214 Oct 02, 2020
CVE-2020-16247 6.8 MEDIUM EPSS 0.00
Philips Clinical Collaboration Platform - Exposure to Wrong Actor
Philips Clinical Collaboration Platform, Versions 12.2.1 and prior, exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
CWE-16 Sep 18, 2020
CVE-2020-25040 8.8 HIGH EPSS 0.01
Sylabs Singularity < 3.6.2 - Exposure to Wrong Actor
Sylabs Singularity through 3.6.2 has Insecure Permissions on temporary directories used in explicit and implicit container build operations, a different vulnerability than CVE-2020-25039.
CWE-668 Sep 16, 2020
CVE-2020-25039 8.1 HIGH EPSS 0.01
Sylabs Singularity < 3.6.2 - Exposure to Wrong Actor
Sylabs Singularity 3.2.0 through 3.6.2 has Insecure Permissions on temporary directories used in fakeroot or user namespace container execution.
CWE-668 Sep 16, 2020