CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
309 results Clear all
CVE-2024-39712 9.1 CRITICAL EPSS 0.09
Ivanti Connect Secure < 22.7 - Remote Code Execution
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
CWE-88 Nov 13, 2024
CVE-2024-39711 9.1 CRITICAL EPSS 0.16
Ivanti Connect Secure < 22.7 - Remote Code Execution
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
CWE-88 Nov 13, 2024
CVE-2024-39710 9.1 CRITICAL EPSS 0.16
Ivanti Connect Secure < 22.7 - Remote Code Execution
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
CWE-88 Nov 13, 2024
CVE-2024-38656 9.1 CRITICAL EPSS 0.11
Ivanti Connect Secure <22.7R2.2,9.1R18.9 - Command Injection
Argument injection in Ivanti Connect Secure before version 22.7R2.2 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
CWE-88 Nov 13, 2024
CVE-2024-38655 7.2 HIGH EPSS 0.14
Ivanti Connect/Ivanti Policy <22.7R2.1-9.1R18.9 - Command Injection
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.1 and 9.1R18.9 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
CWE-88 Nov 13, 2024
CVE-2024-52301 7.5 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.66
Laravel - Info Disclosure
Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs.
CWE-88 Nov 12, 2024
CVE-2024-47553 9.9 CRITICAL EPSS 0.03
Siemens SINEC Security Monitor < V4.9.0 - Code Injection
A vulnerability has been identified in SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate user input to the ```ssmctl-client``` command. This could allow an authenticated, lowly privileged remote attacker to execute arbitrary code with root privileges on the underlying OS.
CWE-88 Oct 08, 2024
CVE-2024-21533 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
ggit - Command Injection
All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL scheme, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options.
CWE-88 Oct 08, 2024
CVE-2024-20444 5.5 MEDIUM EPSS 0.00
Cisco Nexus Dashboard Fabric Controller - Command Injection
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device. &nbsp; This vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition.
CWE-88 Oct 02, 2024
CVE-2024-47611 1 Writeup EPSS 0.00
XZ Utils <5.6.2 - Command Injection
XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, the characters are converted to similar-looking characters with best-fit mapping. Some best-fit mappings result in ASCII characters that change the meaning of the command line, which can be exploited with malicious filenames to do argument injection or directory traversal attacks. This vulnerability is fixed in 5.6.3. Command line tools built for Cygwin or MSYS2 are unaffected. liblzma is unaffected.
CWE-88 Oct 02, 2024
CVE-2024-43402 8.1 HIGH EPSS 0.01
Rust <1.81.0 - Command Injection
Rust is a programming language. The fix for CVE-2024-24576, where `std::process::Command` incorrectly escaped arguments when invoking batch files on Windows, was incomplete. Prior to Rust version 1.81.0, it was possible to bypass the fix when the batch file name had trailing whitespace or periods (which are ignored and stripped by Windows). To determine whether to apply the `cmd.exe` escaping rules, the original fix for the vulnerability checked whether the command name ended with `.bat` or `.cmd`. At the time that seemed enough, as we refuse to invoke batch scripts with no file extension. Windows removes trailing whitespace and periods when parsing file paths. For example, `.bat. .` is interpreted by Windows as `.bat`, but the original fix didn't check for that. Affected users who are using Rust 1.77.2 or greater can remove the trailing whitespace (ASCII 0x20) and trailing periods (ASCII 0x2E) from the batch file name to bypass the incomplete fix and enable the mitigations. Users are affected if their code or one of their dependencies invoke a batch script on Windows with trailing whitespace or trailing periods in the name, and pass untrusted arguments to it. Rust 1.81.0 will update the standard library to apply the CVE-2024-24576 mitigations to all batch files invocations, regardless of the trailing chars in the file name.
CWE-78 Sep 04, 2024
CVE-2024-7573 5.3 MEDIUM EPSS 0.00
Relevanssi Live Ajax Search <2.4 - Command Injection
The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST data in the 'search' function. This makes it possible for unauthenticated attackers to inject arbitrary arguments into a WP_Query query and potentially expose sensitive information such as attachments or private posts.
CWE-88 Aug 28, 2024
CVE-2024-41711 6.8 MEDIUM EPSS 0.00
Mitel 6800-6900w Series - Command Injection
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an unauthenticated attacker with physical access to the phone to conduct an argument injection attack, due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
CWE-88 Aug 13, 2024
CVE-2024-41710 7.2 HIGH KEV 1 Writeup EPSS 0.20
Mitel 6800-6900w Series - Command Injection
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
CWE-88 Aug 12, 2024
CVE-2024-39933 7.7 HIGH EPSS 0.00
Gogs <0.13.0 - Command Injection
Gogs through 0.13.0 allows argument injection during the tagging of a new release.
CWE-88 Jul 04, 2024
CVE-2024-39930 9.9 CRITICAL 5 PoCs Analysis EPSS 0.12
Gogs < 0.13.0 - Remote Code Execution
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
CWE-88 Jul 04, 2024
CVE-2024-35307 9.8 CRITICAL EPSS 0.15
Artica Pandora Fms < 777 - Remote Code Execution
Argument Injection Leading to Remote Code Execution in Realtime Graph Extension, allowing unauthenticated attackers to execute arbitrary code on the server. This issue affects Pandora FMS: from 700 through <777.
CWE-88 Jun 10, 2024
CVE-2024-2422 8.8 HIGH EPSS 0.01
LenelS2 NetBox <5.6.1 - Authenticated RCE
LenelS2 NetBox access control and event monitoring system was discovered to contain an authenticated RCE in versions prior to and including 5.6.1, which allows an attacker to execute malicious commands.
CWE-88 May 30, 2024
CVE-2023-50232 8.8 HIGH EPSS 0.02
Inductiveautomation Ignition < 8.1.33 - Remote Code Execution
Inductive Automation Ignition getParams Argument Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must connect to a malicious server. The specific flaw exists within the getParams method. The issue results from the lack of proper validation of a user-supplied string before using it to prepare an argument for a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22028.
CWE-88 May 03, 2024
CVE-2023-44452 7.8 HIGH 1 PoC Analysis EPSS 0.21
Linuxmint Xreader - Remote Code Execution
Linux Mint Xreader CBT File Parsing Argument Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CBT files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22132.
CWE-88 May 03, 2024