CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
688 results Clear all
CVE-2019-9186 9.8 CRITICAL EPSS 0.00
Jetbrains Intellij Idea < 2018.1.8 - Exposure to Wrong Actor
In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server listens on all interfaces (instead of listening on only the localhost interface). This issue has been fixed in the following versions: 2019.1, 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7.
CWE-668 Jul 03, 2019
CVE-2019-3569 7.5 HIGH 1 Writeup EPSS 0.00
Facebook Hhvm < 3.30.5 - Information Disclosure
HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series.
CWE-552 Jun 26, 2019
CVE-2019-12929 9.8 CRITICAL EPSS 0.03
Qemu < 4.0.0 - Exposure to Wrong Actor
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
CWE-78 Jun 24, 2019
CVE-2019-12928 9.8 CRITICAL 1 PoC Analysis EPSS 0.54
Qemu < 4.0.0 - Exposure to Wrong Actor
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
CWE-78 Jun 24, 2019
CVE-2019-1848 9.3 CRITICAL EPSS 0.00
Cisco DNA Center - Auth Bypass
A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, adjacent attacker to bypass authentication and access critical internal services. The vulnerability is due to insufficient access restriction to ports necessary for system operation. An attacker could exploit this vulnerability by connecting an unauthorized network device to the subnet designated for cluster services. A successful exploit could allow an attacker to reach internal services that are not hardened for external access.
CWE-668 Jun 20, 2019
CVE-2019-12904 5.9 MEDIUM 1 Writeup EPSS 0.00
Gnupg Libgcrypt - Exposure to Wrong Actor
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
CWE-668 Jun 20, 2019
CVE-2019-12875 6.5 MEDIUM EPSS 0.00
Alpinelinux Abuild < 3.4.0 - Missing Authorization
Alpine Linux abuild through 3.4.0 allows an unprivileged member of the abuild group to add an untrusted package via a --keys-dir option that causes acceptance of an untrusted signing key.
CWE-862 Jun 18, 2019
CVE-2019-12274 8.8 HIGH EPSS 0.00
Rancher 1-2.2.3 - Privilege Escalation
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
CWE-862 Jun 06, 2019
CVE-2018-4048 7.8 HIGH EPSS 0.00
GOG Galaxy - Exposure to Wrong Actor
An exploitable local privilege elevation vulnerability exists in the file system permissions of the `Temp` directory in GOG Galaxy 1.2.48.36 (Windows 64-bit Installer). An attacker can overwrite executables of the Desktop Galaxy Updater to exploit this vulnerability and execute arbitrary code with SYSTEM privileges.
CWE-668 May 30, 2019
CVE-2018-7846 9.8 CRITICAL 1 PoC Analysis EPSS 0.43
Modicon - Trust Boundary Violation
A CWE-501: Trust Boundary Violation vulnerability on connection to the Controller exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum and Modicon Premium which could cause unauthorized access by conducting a brute force attack on Modbus protocol to the controller.
CWE-668 May 22, 2019
CVE-2018-20321 8.8 HIGH EPSS 0.00
Rancher <2.1.5 - Privilege Escalation
An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a separate project, where only cluster admins can be given permissions to access. As of 2018-12-20, this bug affected ALL clusters created or imported by Rancher.
CWE-668 Apr 10, 2019
CVE-2018-18068 9.8 CRITICAL EPSS 0.02
Raspberrypi Raspberry PI 3 Model B+ Firmware - Exposure to Wrong Actor
The ARM-based hardware debugging feature on Raspberry Pi 3 module B+ and possibly other devices allows non-secure EL1 code to read/write any EL3 (the highest privilege level in ARMv8) memory/register via inter-processor debugging. With a debug host processor A running in non-secure EL1 and a debug target processor B running in any privilege level, the debugging feature allows A to halt B and promote B to any privilege level. As a debug host, A has full control of B even if B owns a higher privilege level than A. Accordingly, A can read/write any EL3 memory/register via B. Also, with this memory access, A can execute arbitrary code in EL3.
CWE-668 Apr 04, 2019
CVE-2019-8934 3.3 LOW EPSS 0.00
Qemu < 3.1.0 - Exposure to Wrong Actor
hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
CWE-668 Mar 21, 2019
CVE-2018-20237 6.5 MEDIUM EPSS 0.00
Atlassian Confluence <6.13.1 - Info Disclosure
Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.
CWE-668 Feb 13, 2019
CVE-2019-8308 8.2 HIGH EPSS 0.00
Flatpak < 1.0.7 - Exposure to Wrong Actor
Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
CWE-668 Feb 12, 2019
CVE-2018-1840 6.0 MEDIUM EPSS 0.01
IBM Websphere Application Server < 8.5.5.14 - Exposure to Wrong Actor
IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to gain elevated privileges on the system, caused when a security domain is configured to use a federated repository other than global federated repository and then migrated to a newer release of WebSphere Application Server. IBM X-Force ID: 150813.
CWE-668 Dec 03, 2018
CVE-2018-15591 7.8 HIGH EPSS 0.00
Ivanti Workspace Control < 10.3.10.0 - Exposure to Wrong Actor
An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can bypass Application Whitelisting restrictions to execute arbitrary code by leveraging multiple unspecified attack vectors.
CWE-668 Oct 15, 2018
CVE-2018-8040 5.3 MEDIUM EPSS 0.08
Apache Traffic Server <6.2.2, <7.1.3 - Info Disclosure
Pages that are rendered using the ESI plugin can have access to the cookie header when the plugin is configured not to allow access. This affects Apache Traffic Server (ATS) versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
CWE-668 Aug 29, 2018
CVE-2017-12576 7.2 HIGH EPSS 0.01
Planex Cs-qr20 Firmware - Exposure to Wrong Actor
An issue was discovered on the PLANEX CS-QR20 1.30. A hidden and undocumented management page allows an attacker to execute arbitrary code on the device when the user is authenticated. The management page was used for debugging purposes, once you login and access the page directly (/admin/system_command.asp), you can execute any command.
CWE-668 Aug 24, 2018
CVE-2018-7073 5.5 MEDIUM EPSS 0.01
HP Moonshot Provisioning Manager < 1.24 - Exposure to Wrong Actor
A local arbitrary file modification vulnerability was identified in HPE Moonshot Provisioning Manager prior to v1.24.
CWE-668 Aug 06, 2018