CVE & Exploit Intelligence Database

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
403 results Clear all
CVE-2023-4466 2.7 LOW 1 Writeup EPSS 0.00
Poly CCX 400, CCX 600, Trio 8800, Trio C60 - Protection Mechanism F...
A vulnerability has been found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation leads to protection mechanism failure. The attack can be launched remotely. The vendor explains that they do not regard this as a vulnerability as this is a feature that they offer to their customers who have a variety of environmental needs that are met through different firmware builds. To avoid potential roll-back attacks, they remove vulnerable builds from the public servers as a remediation effort. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249259.
CWE-693 Dec 29, 2023
CVE-2014-125107 4.3 MEDIUM EPSS 0.00
Corveda PHPSandbox <1.3.5 - Protection Mechanism Failure
A vulnerability was found in Corveda PHPSandbox 1.3.4 and classified as critical. Affected by this issue is some unknown functionality of the component String Handler. The manipulation leads to protection mechanism failure. The attack may be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The patch is identified as 48fde5ffa4d76014bad260a3cbab7ada3744a4cc. It is recommended to upgrade the affected component. VDB-248270 is the identifier assigned to this vulnerability.
CWE-693 Dec 19, 2023
CVE-2023-31273 10.0 CRITICAL EPSS 0.00
Intel DCM <5.2 - Privilege Escalation
Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CWE-269 Nov 14, 2023
CVE-2023-27383 6.8 MEDIUM EPSS 0.00
Intel(R) oneAPI HPC Toolkit <2021.9 - Privilege Escalation
Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.
CWE-693 Nov 14, 2023
CVE-2023-25080 5.3 MEDIUM EPSS 0.00
Intel Openvino < 2023.0.0 - Information Disclosure
Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access.
CWE-693 Nov 14, 2023
CVE-2023-5875 3.7 LOW EPSS 0.00
Mattermost Desktop - Info Disclosure
Mattermost Desktop fails to correctly handle permissions or prompt the user for consent on certain sensitive ones allowing media exploitation from a malicious mattermost server
CWE-693 Nov 02, 2023
CVE-2023-5557 7.5 HIGH EPSS 0.00
tracker-miners - Code Injection
A flaw was found in the tracker-miners package. A weakness in the sandbox allows a maliciously-crafted file to execute code outside the sandbox if the tracker-extract process has first been compromised by a separate vulnerability.
CWE-693 Oct 13, 2023
CVE-2023-45132 9.1 CRITICAL 1 Writeup EPSS 0.00
NAXSI <1.6 - Auth Bypass
NAXSI is an open-source maintenance web application firewall (WAF) for NGINX. An issue present starting in version 1.3 and prior to version 1.6 allows someone to bypass the WAF when a malicious `X-Forwarded-For` IP matches `IgnoreIP` `IgnoreCIDR` rules. This old code was arranged to allow older NGINX versions to also support `IgnoreIP` `IgnoreCIDR` when multiple reverse proxies were present. The issue is patched in version 1.6. As a workaround, do not set any `IgnoreIP` `IgnoreCIDR` for older versions.
CWE-693 Oct 11, 2023
CVE-2023-45372 5.3 MEDIUM EPSS 0.00
Wikibase extension <1.35.12, 1.36-1.39.5, 1.40-1.40.1 - Info Disclo...
An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. During item merging, ItemMergeInteractor does not have an edit filter running (e.g., AbuseFilter).
CWE-693 Oct 09, 2023
CVE-2023-34984 7.5 HIGH EPSS 0.00
Fortinet FortiWeb <7.2.1 - RCE
A protection mechanism failure in Fortinet FortiWeb 7.2.0 through 7.2.1, 7.0.0 through 7.0.6, 6.4.0 through 6.4.3, 6.3.6 through 6.3.23 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
CWE-693 Sep 13, 2023
CVE-2023-4039 4.8 MEDIUM EPSS 0.00
GCC-based toolchains - Buffer Overflow
**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.
CWE-693 Sep 13, 2023
CVE-2023-41319 8.8 HIGH 1 Writeup EPSS 0.00
Fides - Code Injection
Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. The Fides webserver API allows custom integrations to be uploaded as a ZIP file. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code. The vulnerability allows the execution of arbitrary code on the target system within the context of the webserver python process owner on the webserver container, which by default is `root`, and leverage that access to attack underlying infrastructure and integrated systems. This vulnerability affects Fides versions `2.11.0` through `2.19.0`. Exploitation is limited to API clients with the `CONNECTOR_TEMPLATE_REGISTER` authorization scope. In the Fides Admin UI this scope is restricted to highly privileged users, specifically root users and users with the owner role. Exploitation is only possible if the security configuration parameter `allow_custom_connector_functions` is enabled by the user deploying the Fides webserver container, either in `fides.toml` or by setting the env var `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS=True`. By default this configuration parameter is disabled. The vulnerability has been patched in Fides version `2.19.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. Users unable to upgrade should ensure that `allow_custom_connector_functions` in `fides.toml` and the `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS` are both either unset or explicit set to `False`.
CWE-94 Sep 06, 2023
CVE-2023-32493 7.3 HIGH EPSS 0.00
Dell Powerscale Onefs < 9.5.0.3 - Denial of Service
Dell PowerScale OneFS, 9.5.0.x, contains a protection mechanism bypass vulnerability. An unprivileged, remote attacker could potentially exploit this vulnerability, leading to denial of service, information disclosure and remote execution.
CWE-693 Aug 16, 2023
CVE-2023-32006 8.8 HIGH EPSS 0.00
Node.js - Code Injection
The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.
CWE-693 Aug 15, 2023
CVE-2023-34427 5.3 MEDIUM EPSS 0.00
Intel RealSense <0.25.0 - Privilege Escalation
Protection mechanism failure in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-693 Aug 11, 2023
CVE-2022-46329 8.2 HIGH EPSS 0.00
Intel(R) PROSet/Wireless < - Privilege Escalation
Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
CWE-693 Aug 11, 2023
CVE-2022-41984 4.4 MEDIUM EPSS 0.00
Intel Arc A750 Firmware - Denial of Service
Protection mechanism failure for some Intel(R) Arc(TM) graphics cards A770 and A750 Limited Edition sold between October of 2022 and December of 2022 may allow a privileged user to potentially enable denial of service via local access.
CWE-693 Aug 11, 2023
CVE-2023-38157 6.5 MEDIUM EPSS 0.01
Microsoft Edge - Privilege Escalation
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CWE-693 Aug 07, 2023
CVE-2023-35352 7.5 HIGH EPSS 0.03
Microsoft Windows Remote Desktop - Security Feature Bypass
Windows Remote Desktop Security Feature Bypass Vulnerability
CWE-693 Jul 11, 2023
CVE-2023-33150 9.6 CRITICAL EPSS 0.00
Microsoft Office - Privilege Escalation
Microsoft Office Security Feature Bypass Vulnerability
CWE-693 Jul 11, 2023