CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
121 results Clear all
CVE-2022-23028 5.3 MEDIUM EPSS 0.01
F5 Big-ip Advanced Firewall Manager < 13.1.4 - Denial of Service
On BIG-IP AFM version 16.x before 16.1.0, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when global AFM SYN cookie protection (TCP Half Open flood vector) is activated in the AFM Device Dos or DOS profile, certain types of TCP connections will fail. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-682 Jan 25, 2022
CVE-2022-23011 7.5 HIGH EPSS 0.01
BIG-IP <15.1.4, 14.1.3 - DoS
On certain hardware BIG-IP platforms, in version 15.1.x before 15.1.4 and 14.1.x before 14.1.3, virtual servers may stop responding while processing TCP traffic due to an issue in the SYN Cookie Protection feature. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-682 Jan 25, 2022
CVE-2021-45960 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Expat <2.4.3 - Memory Corruption
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
CWE-682 Jan 01, 2022
CVE-2021-44847 9.8 CRITICAL EPSS 0.04
Toktok Toxcore < 0.1.11 - Buffer Overflow
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
CWE-682 Dec 13, 2021
CVE-2021-41222 5.5 MEDIUM 1 Writeup EPSS 0.00
TensorFlow - Memory Corruption
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SplitV` can trigger a segfault is an attacker supplies negative arguments. This occurs whenever `size_splits` contains more than one value and at least one value is negative. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
CWE-682 Nov 05, 2021
CVE-2021-41122 4.3 MEDIUM EPSS 0.00
Vyper <0.3.0 - Info Disclosure
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0.
CWE-682 Oct 05, 2021
CVE-2021-41329 6.5 MEDIUM EPSS 0.00
Datalust Seq <2021.2.6259 - Info Disclosure
Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view filter includes an array or IN clause, and when another user has recently executed an identical query differing only by the array elements.
CWE-682 Sep 27, 2021
CVE-2021-34573 6.2 MEDIUM EPSS 0.00
Enbra EWM <1.7.29 - Info Disclosure
In Enbra EWM in Version 1.7.29 together with several tested wireless M-Bus Sensors the events backflow and "no flow" are not reconized or misinterpreted. This may lead to wrong values and missing events.
CWE-682 Sep 16, 2021
CVE-2021-29945 6.5 MEDIUM EPSS 0.00
Firefox ESR <78.10 & Firefox <88 - Memory Corruption
The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
CWE-682 Jun 24, 2021
CVE-2021-31440 7.0 HIGH EPSS 0.01
Linux Kernel 5.11.15 - Privilege Escalation
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-13661.
CWE-682 May 21, 2021
CVE-2020-28393 7.5 HIGH EPSS 0.01
SCALANCE XM-400/XR-500 <6.4 - DoS
An unauthenticated remote attacker could create a permanent denial-of-service condition by sending specially crafted OSPF packets. Successful exploitation requires OSPF to be enabled on an affected device on the SCALANCE XM-400, XR-500 (All versions prior to v6.4).
CWE-682 May 12, 2021
CVE-2021-3114 6.5 MEDIUM 1 Writeup EPSS 0.00
Go <1.14.14, <1.15.7 - Info Disclosure
In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.
CWE-682 Jan 26, 2021
CVE-2020-26262 7.2 HIGH 1 Writeup EPSS 0.00
Coturn <4.5.2 - Info Disclosure
Coturn is free open source implementation of TURN and STUN Server. Coturn before version 4.5.2 by default does not allow peers to connect and relay packets to loopback addresses in the range of `127.x.x.x`. However, it was observed that when sending a `CONNECT` request with the `XOR-PEER-ADDRESS` value of `0.0.0.0`, a successful response was received and subsequently, `CONNECTIONBIND` also received a successful response. Coturn then is able to relay packets to the loopback interface. Additionally, when coturn is listening on IPv6, which is default, the loopback interface can also be reached by making use of either `[::1]` or `[::]` as the peer address. By using the address `0.0.0.0` as the peer address, a malicious user will be able to relay packets to the loopback interface, unless `--denied-peer-ip=0.0.0.0` (or similar) has been specified. Since the default configuration implies that loopback peers are not allowed, coturn administrators may choose to not set the `denied-peer-ip` setting. The issue patched in version 4.5.2. As a workaround the addresses in the address block `0.0.0.0/8`, `[::1]` and `[::]` should be denied by default unless `--allow-loopback-peers` has been specified.
CWE-441 Jan 13, 2021
CVE-2021-3004 7.5 HIGH EPSS 0.00
Stable Yield Credit - Info Disclosure
The _deposit function in the smart contract implementation for Stable Yield Credit (yCREDIT), an Ethereum token, has certain incorrect calculations. An attacker can obtain more yCREDIT tokens than they should.
CWE-682 Jan 03, 2021
CVE-2020-26265 5.3 MEDIUM EPSS 0.00
Geth <1.9.20 - Consensus Vulnerability
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.
CWE-682 Dec 11, 2020
CVE-2020-26241 6.5 MEDIUM EPSS 0.00
Geth <1.9.17 - Privilege Escalation
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. This is a Consensus vulnerability in Geth before version 1.9.17 which can be used to cause a chain-split where vulnerable nodes reject the canonical chain. Geth's pre-compiled dataCopy (at 0x00...04) contract did a shallow copy on invocation. An attacker could deploy a contract that writes X to an EVM memory region R, then calls 0x00..04 with R as an argument, then overwrites R to Y, and finally invokes the RETURNDATACOPY opcode. When this contract is invoked, a consensus-compliant node would push X on the EVM stack, whereas Geth would push Y. This is fixed in version 1.9.17.
CWE-682 Nov 25, 2020
CVE-2020-26240 5.3 MEDIUM 1 Writeup EPSS 0.00
Geth <1.9.24 - Info Disclosure
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. An ethash mining DAG generation flaw in Geth before version 1.9.24 could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. This issue is fixed as of 1.9.24
CWE-682 Nov 25, 2020
CVE-2020-27616 6.5 MEDIUM EPSS 0.00
QEMU 4.2.1 - Memory Corruption
ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process.
CWE-682 Nov 06, 2020
CVE-2020-28030 7.5 HIGH 1 Writeup EPSS 0.01
Wireshark <3.2.8 - DoS
In Wireshark 3.2.0 to 3.2.7, the GQUIC dissector could crash. This was addressed in epan/dissectors/packet-gquic.c by correcting the implementation of offset advancement.
CWE-682 Nov 02, 2020
CVE-2020-14422 5.9 MEDIUM EPSS 0.01
Python < 3.5.10 - Denial of Service
Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
CWE-682 Jun 18, 2020