CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
309 results Clear all
CVE-2020-13699 8.8 HIGH 2 PoCs Analysis EPSS 0.73
TeamViewer Unquoted URI Handler SMB Redirect
TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: --play URL. An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking. This affects teamviewer10, teamviewer8, teamviewerapi, tvchat1, tvcontrol1, tvfiletransfer1, tvjoinv8, tvpresent1, tvsendfile1, tvsqcustomer1, tvsqsupport1, tvvideocall1, and tvvpn1. The issue is fixed in 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3.
CWE-88 Jul 29, 2020
CVE-2020-3380 7.8 HIGH EPSS 0.00
Cisco DCNM - Privilege Escalation
A vulnerability in the CLI of Cisco Data Center Network Manager (DCNM) could allow an authenticated, local attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by authenticating as the fmserver user and submitting malicious input to a specific command. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system.
CWE-88 Jul 16, 2020
CVE-2020-5599 9.8 CRITICAL EPSS 0.01
Mitsubishi Electric GOT2000 - Argument Injection
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
CWE-88 Jul 07, 2020
CVE-2020-14049 7.5 HIGH EPSS 0.01
Viber for Windows <13.2.0.39 - Code Injection
Viber for Windows up to 13.2.0.39 does not properly quote its custom URI handler. A malicious website could launch Viber with arbitrary parameters, forcing a victim to send an NTLM authentication request, and either relay the request or capture the hash for offline password cracking. NOTE: this issue exists because of an incomplete fix for CVE-2019-12569.
CWE-88 Jun 22, 2020
CVE-2020-14421 7.2 HIGH 1 Writeup EPSS 0.09
aaPanel <6.6.6 - Command Injection
aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary commands via the Script Content box on the Add Cron Job screen.
CWE-88 Jun 18, 2020
CVE-2020-7496 7.8 HIGH EPSS 0.00
EcoStruxure Operator Terminal Expert <3.1 SP1 - Code Injection
A CWE-88: Argument Injection or Modification vulnerability exists in EcoStruxure Operator Terminal Expert 3.1 Service Pack 1 and prior (formerly known as Vijeo XD)which could cause unauthorized write access when opening the project file.
CWE-88 Jun 16, 2020
CVE-2020-7808 8.7 HIGH EPSS 0.00
RAONWIZ K Upload <v2018.0.2.51 - Code Injection
In RAONWIZ K Upload v2018.0.2.51 and prior, automatic update processing without integrity check on update module(web.js) allows an attacker to modify arguments which causes downloading a random DLL and injection on it.
CWE-353 May 21, 2020
CVE-2020-1738 3.9 LOW EPSS 0.00
Ansible Engine - Code Injection
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
CWE-88 Mar 16, 2020
CVE-2020-5546 8.8 HIGH EPSS 0.00
Mitsubishi Electric MELQIC IU1 <1.0.7 - Command Injection
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet.
CWE-88 Mar 16, 2020
CVE-2020-6799 8.8 HIGH EPSS 0.00
Firefox - Command Injection
Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected. This vulnerability affects Firefox < 73 and Firefox < ESR68.5.
CWE-88 Mar 02, 2020
CVE-2019-18888 7.5 HIGH EPSS 0.03
Symfony <4.3.8 - Command Injection
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x).
CWE-88 Nov 21, 2019
CVE-2019-5013 7.8 HIGH EPSS 0.00
Wacom 6.3.32-3 - Privilege Escalation
An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the start/stopLaunchDProcess command. The command takes a user-supplied string argument and executes launchctl under root context. A user with local access can use this vulnerability to raise load arbitrary launchD agents. An attacker would need local access to the machine for a successful exploit.
CWE-88 Oct 24, 2019
CVE-2019-5012 7.8 HIGH EPSS 0.00
Wacom 6.3.32-3 - Privilege Escalation
An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the startProcess command. The command takes a user-supplied script argument and executes it under root context. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine for a successful exploit.
CWE-88 Oct 24, 2019
CVE-2019-12148 9.8 CRITICAL EPSS 0.01
Sangoma Session Border Controller 2.3.23-119 GA - Auth Bypass
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to an authentication bypass via an argument injection vulnerability involving special characters in the username field. Upon successful exploitation, a remote unauthenticated user can login into the device's admin web portal without providing any credentials. This affects /var/webconfig/gui/Webconfig.inc.php.
CWE-88 Oct 22, 2019
CVE-2019-12147 9.8 CRITICAL EPSS 0.03
Sangoma SBC 2.3.23-119 GA - Command Injection
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the system (either via the web interface or via SSH) to achieve complete compromise of the device. This affects /var/webconfig/gui/Webconfig.inc.php and /usr/local/sng/bin/sng-user-mgmt.
CWE-88 Oct 22, 2019
CVE-2019-11751 8.8 HIGH EPSS 0.01
Firefox < 69 - Path Traversal
Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. <br>*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
CWE-88 Sep 27, 2019
CVE-2019-15541 7.5 HIGH 1 Writeup EPSS 0.00
Rustls < 0.16.0 - Denial of Service
rustls-mio/examples/tlsserver.rs in the rustls crate before 0.16.0 for Rust allows attackers to cause a denial of service (loop of conn_event and ready) by arranging for a client to never be writable.
CWE-88 Aug 26, 2019
CVE-2019-10746 9.8 CRITICAL EPSS 0.01
Mixin-deep < 1.3.2 - Prototype Pollution
mixin-deep is vulnerable to Prototype Pollution in versions before 1.3.2 and version 2.0.0. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
CWE-88 Aug 23, 2019
CVE-2019-15498 8.8 HIGH EPSS 0.01
Vera Edge Home Controller <1.7.4452 - Command Injection
cgi-bin/cmh/webcam.sh in Vera Edge Home Controller 1.7.4452 allows remote unauthenticated users to execute arbitrary OS commands via --output argument injection in the username parameter to /cgi-bin/cmh/webcam.sh.
CWE-88 Aug 23, 2019
CVE-2019-12264 7.1 HIGH EPSS 0.00
Wind River VxWorks <6.9.5 - Privilege Escalation
Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the ipdhcpc DHCP client component.
CWE-88 Aug 05, 2019