CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
94 results Clear all
CVE-2023-27561 7.0 HIGH EPSS 0.00
runc <1.1.4 - Privilege Escalation
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
CWE-706 Mar 03, 2023
CVE-2021-37315 9.1 CRITICAL EPSS 0.01
ASUS RT-AC68U <3.0.0.4.386.41634 - Info Disclosure
Incorrect Access Control issue discoverd in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the source for COPY and MOVE operations.
CWE-706 Feb 03, 2023
CVE-2022-30258 9.8 CRITICAL 1 Writeup EPSS 0.00
Technitium DNS Server <8.0.2 - Info Disclosure
An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V2 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
CWE-706 Nov 21, 2022
CVE-2022-30257 9.8 CRITICAL 1 Writeup EPSS 0.00
Technitium DNS Server <8.0.2 - Info Disclosure
An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
CWE-706 Nov 21, 2022
CVE-2022-41874 2.6 LOW EPSS 0.00
Tauri <1.0.7-1.1.2 - Info Disclosure
Tauri is a framework for building binaries for all major desktop platforms. In versions prior to 1.0.7 and 1.1.2, Tauri is vulnerable to an Incorrectly-Resolved Name. Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it is possible to partially bypass the `fs` scope definition. It is not possible to traverse into arbitrary paths, as the issue is limited to neighboring files and sub folders of already allowed paths. The impact differs on Windows, MacOS and Linux due to different specifications of valid path characters. This bypass depends on the file picker dialog or dragged files, as user selected paths are automatically added to the allow list at runtime. A successful bypass requires the user to select a pre-existing malicious file or directory during the file picker dialog and an adversary controlled logic to access these files. The issue has been patched in versions 1.0.7, 1.1.2 and 1.2.0. As a workaround, disable the dialog and fileDropEnabled component inside the tauri.conf.json.
CWE-706 Nov 10, 2022
CVE-2022-30621 7.6 HIGH EPSS 0.00
Camera OS - Info Disclosure
Allows a remote user to read files on the camera's OS "GetFileContent.cgi". Reading arbitrary files on the camera's OS as root user.
CWE-706 Jul 18, 2022
CVE-2022-31089 7.5 HIGH 1 Writeup EPSS 0.00
Parse Server <4.10.12, <5.2.3 - DoS
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions certain types of invalid files requests are not handled properly and can crash the server. If you are running multiple Parse Server instances in a cluster, the availability impact may be low; if you are running Parse Server as single instance without redundancy, the availability impact may be high. This issue has been addressed in versions 4.10.12 and 5.2.3. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-252 Jun 27, 2022
CVE-2022-27778 8.1 HIGH EPSS 0.01
Unknown - Info Disclosure
A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.
CWE-706 Jun 02, 2022
CVE-2022-29448 6.8 MEDIUM EPSS 0.01
Herd Effects <5.2 - LFI
Authenticated (admin or higher user role) Local File Inclusion (LFI) vulnerability in Wow-Company's Herd Effects plugin <= 5.2 at WordPress.
CWE-706 May 20, 2022
CVE-2022-29445 6.8 MEDIUM EPSS 0.01
Wow-Company's Popup Box <2.1.2 - LFI
Authenticated (administrator or higher role) Local File Inclusion (LFI) vulnerability in Wow-Company's Popup Box plugin <= 2.1.2 at WordPress.
CWE-706 May 18, 2022
CVE-2022-28198 6.6 MEDIUM EPSS 0.00
NVIDIA Omniverse - RCE
NVIDIA Omniverse Nucleus and Cache contain a vulnerability in its configuration of OpenSSL, where an attacker with physical access to the system can cause arbitrary code execution which can impact confidentiality, integrity, and availability.
CWE-706 Apr 29, 2022
CVE-2022-0855 6.1 MEDIUM 1 Writeup EPSS 0.01
microweber-dev/whmcs_plugin <0.0.4 - Path Traversal
Improper Resolution of Path Equivalence in GitHub repository microweber-dev/whmcs_plugin prior to 0.0.4.
CWE-41 Mar 04, 2022
CVE-2021-40856 7.5 HIGH EXPLOITED NUCLEI EPSS 0.88
Auerswald COMfortel <2.8G - Auth Bypass
Auerswald COMfortel 1400 IP and 2600 IP before 2.8G devices allow Authentication Bypass via the /about/../ substring.
CWE-706 Dec 13, 2021
CVE-2021-40539 9.8 CRITICAL KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
ManageEngine ADSelfService Plus CVE-2021-40539
Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
CWE-706 Sep 07, 2021
CVE-2021-39156 8.1 HIGH EPSS 0.00
Istio < 1.9.8 - Incorrect Authorization
Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies. Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize the path.
CWE-706 Aug 24, 2021
CVE-2021-37215 4.3 MEDIUM EPSS 0.00
Flygo - Privilege Escalation
The employee management page of Flygo contains an Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attacker can manipulate the user data and then over-write another employee’s user data by specifying that employee’s ID in the API parameter.
CWE-639 Aug 09, 2021
CVE-2021-37214 8.8 HIGH EPSS 0.01
Flygo - Privilege Escalation
The employee management page of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the employee ID in specific parameters to arbitrary access employee's data, modify it, and then obtain administrator privilege and execute arbitrary command.
CWE-639 Aug 09, 2021
CVE-2021-37213 4.3 MEDIUM EPSS 0.00
Flygo - Info Disclosure
The check-in record page of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the employee ID and date in specific parameters to access particular employee’s check-in record.
CWE-639 Aug 09, 2021
CVE-2021-37212 5.4 MEDIUM EPSS 0.00
Flygo - Info Disclosure
The bulletin function of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the bulletin ID in specific Url parameters and access and modify bulletin particular content.
CWE-639 Aug 09, 2021
CVE-2021-22924 3.7 LOW 1 PoC Analysis EPSS 0.01
libcurl - Info Disclosure
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
CWE-20 Aug 05, 2021