CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
688 results Clear all
CVE-2017-16593 6.5 MEDIUM EPSS 0.03
NetGain Systems Enterprise Manager <7.2.730 build 1034 - RCE
This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.restore.del_005fdo_jsp servlet, which listens on TCP port 8081 by default. When parsing the filenames parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete any files accessible to the Administrator user. Was ZDI-CAN-5104.
CWE-22 Jan 23, 2018
CVE-2017-17087 5.5 MEDIUM 1 Writeup EPSS 0.00
Vim <8.0.1263 - Info Disclosure
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.
CWE-668 Dec 01, 2017
CVE-2017-12363 5.3 MEDIUM EPSS 0.01
Cisco WebEx Meeting Server - Info Disclosure
A vulnerability in Cisco WebEx Meeting Server could allow an unauthenticated, remote attacker to modify the welcome message of a meeting on an affected system. The vulnerability is due to insufficient security settings on meetings. An attacker could exploit this vulnerability by modifying the welcome message to a meeting. A successful exploit could allow the attacker to modify the welcome message of any known meeting. Cisco Bug IDs: CSCvf68695.
CWE-264 Nov 30, 2017
CVE-2017-12351 5.7 MEDIUM EPSS 0.00
Cisco NX-OS System Software - Privilege Escalation
A vulnerability in the guest shell feature of Cisco NX-OS System Software could allow an authenticated, local attacker to read and send packets outside the scope of the guest shell container. An attacker would need valid administrator credentials to perform this attack. The vulnerability is due to insufficient internal security measures in the guest shell feature. An attacker could exploit this vulnerability by sending or receiving packets on the device-internal network outside of the guest shell container, aka "Unauthorized Internal Interface Access." This vulnerability affects the following products running Cisco NX-OS System Software: Nexus 3000 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvf33038.
CWE-264 Nov 30, 2017
CVE-2017-12342 6.8 MEDIUM EPSS 0.00
Cisco Nexus Series Switches - Info Disclosure
A vulnerability in the Open Agent Container (OAC) feature of Cisco Nexus Series Switches could allow an unauthenticated, local attacker to read and send packets outside the scope of the OAC. The vulnerability is due to insufficient internal security measures in the OAC feature. An attacker could exploit this vulnerability by crafting specific packets for communication on the device-internal network. A successful exploit could allow the attacker to run code on the underlying host operating system. OAC is not enabled by default. For a device to be vulnerable, an administrator would need to install and activate this feature. This vulnerability affects the following Cisco Nexus Series Switches: Nexus 2000 Series Fabric Extenders, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches. Cisco Bug IDs: CSCve53542, CSCvf36621.
CWE-264 Nov 30, 2017
CVE-2017-8185 7.8 HIGH EPSS 0.00
Huawei Me906s-158 Firmware - Exposure to Wrong Actor
ME906s-158 earlier than ME906S_Installer_13.1805.10.3 versions has a privilege elevation vulnerability. An attacker could exploit this vulnerability to modify the configuration information containing malicious files and trick users into executing the files, resulting in the execution of arbitrary code.
CWE-668 Nov 22, 2017
CVE-2017-8171 4.6 MEDIUM EPSS 0.00
Huawei P10 Plus Firmware - Exposure to Wrong Actor
Huawei smart phones with software earlier than Vicky-AL00AC00B172D versions have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the Talkback mode and can perform some operations to bypass the Google account verification. As a result, the FRP function is bypassed.
CWE-668 Nov 22, 2017
CVE-2017-8161 4.6 MEDIUM EPSS 0.00
Huawei Eva-l09 - Exposure to Wrong Actor
EVA-L09 smartphones with software Earlier than EVA-L09C25B150CUSTC25D003 versions,Earlier than EVA-L09C440B140 versions,Earlier than EVA-L09C464B361 versions,Earlier than EVA-L09C675B320CUSTC675D004 versions have Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the Swype and can perform some operations to update the Google account. As a result, the FRP function is bypassed.
CWE-668 Nov 22, 2017
CVE-2017-16660 7.2 HIGH EPSS 0.01
Cacti 1.1.27 - Authenticated RCE
Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.
CWE-668 Nov 08, 2017
CVE-2017-15592 8.8 HIGH EPSS 0.00
Xen < 4.9.0 - Exposure to Wrong Actor
An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.
CWE-668 Oct 18, 2017
CVE-2017-12249 9.1 CRITICAL EPSS 0.01
Cisco Meeting Server - Privilege Escalation
A vulnerability in the Traversal Using Relay NAT (TURN) server included with Cisco Meeting Server (CMS) could allow an authenticated, remote attacker to gain unauthenticated or unauthorized access to components of or sensitive information in an affected system. The vulnerability is due to an incorrect default configuration of the TURN server, which could expose internal interfaces and ports on the external interface of an affected system. An attacker could exploit this vulnerability by using a TURN server to perform an unauthorized connection to a Call Bridge, a Web Bridge, or a database cluster in an affected system, depending on the deployment model and CMS services in use. A successful exploit could allow the attacker to gain unauthenticated access to a Call Bridge or database cluster in an affected system or gain unauthorized access to sensitive meeting information in an affected system. To exploit this vulnerability, the attacker must have valid credentials for the TURN server of the affected system. This vulnerability affects Cisco Meeting Server (CMS) deployments that are running a CMS Software release prior to Release 2.0.16, 2.1.11, or 2.2.6. Cisco Bug IDs: CSCvf51127.
CWE-16 Sep 13, 2017
CVE-2017-6872 6.5 MEDIUM EPSS 0.00
Siemens OZW672/OZW772 - Info Disclosure
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device.
CWE-306 Aug 08, 2017
CVE-2017-11382 7.5 HIGH EPSS 0.01
Trendmicro Deep Discovery Email Inspector - Exposure to Wrong Actor
Denial of Service vulnerability in Trend Micro Deep Discovery Email Inspector 2.5.1 allows remote attackers to delete arbitrary files on vulnerable installations, thus disabling the service. Formerly ZDI-CAN-4350.
CWE-668 Aug 03, 2017
CVE-2017-0215 5.3 MEDIUM EPSS 0.45
Microsoft Windows 10 - Exposure to Wrong Actor
Microsoft Windows 10 1607 and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0216, CVE-2017-0218, and CVE-2017-0219.
CWE-668 Jun 15, 2017
CVE-2017-7490 5.3 MEDIUM EPSS 0.00
Moodle <3.x - Info Disclosure
In Moodle 2.x and 3.x, searching of arbitrary blogs is possible because a capability check is missing.
CWE-668 May 15, 2017
CVE-2017-8418 3.3 LOW EPSS 0.00
Rubocop < 0.48.1 - Exposure to Wrong Actor
RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users.
CWE-668 May 02, 2017
CVE-2017-5648 9.1 CRITICAL EPSS 0.24
Apache Tomcat < 9.0.0.M18 - Exposure to Wrong Actor
While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
CWE-668 Apr 17, 2017
CVE-2017-6100 7.5 HIGH EPSS 0.00
Tcpdf < 6.1.1 - Exposure to Wrong Actor
tcpdf before 6.2.0 uploads files from the server generating PDF-files to an external FTP.
CWE-668 Feb 23, 2017
CVE-2017-5634 6.6 MEDIUM EPSS 0.00
Norwegian-air Norwegian Air Kiosk - Exposure to Wrong Actor
The Norwegian Air Shuttle (aka norwegian.com) airline kiosk allows physically proximate attackers to bypass the intended "Please select booking identification" UI step, and obtain administrative privileges and network access on the underlying Windows OS, by accessing a touch-screen print icon to manipulate the print dialog.
CWE-668 Feb 09, 2017
CVE-2016-5334 5.3 MEDIUM EPSS 0.00
Vmware Identity Manager < 2.7.1 - Exposure to Wrong Actor
VMware Identity Manager 2.x before 2.7.1 and vRealize Automation 7.x before 7.2.0 allow remote attackers to read /SAAS/WEB-INF and /SAAS/META-INF files via unspecified vectors.
CWE-668 Dec 29, 2016