CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
309 results Clear all
CVE-2022-3140 6.3 MEDIUM EPSS 0.01
LibreOffice - RCE
LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice links using that scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.1; 7.3 versions prior to 7.3.6.
CWE-88 Oct 11, 2022
CVE-2022-20930 6.7 MEDIUM EPSS 0.00
Cisco Catalyst Sd-wan Manager < 20.6.2 - Denial of Service
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful exploit could allow the attacker to overwrite arbitrary system files, which could result in a denial of service (DoS) condition.
CWE-78 Sep 30, 2022
CVE-2022-37027 7.2 HIGH EPSS 0.06
Ahsay Cloud Backup Suite - Remote Code Execution
Ahsay AhsayCBS 9.1.4.0 allows an authenticated system user to inject arbitrary Java JVM options. Administrators that can modify the Runtime Options in the web interface can inject Java Runtime Options. These take effect after a restart. For example, an attacker can enable JMX services and consequently achieve remote code execution as the system user.
CWE-88 Sep 21, 2022
CVE-2022-36069 7.3 HIGH EPSS 0.01
Poetry - Info Disclosure
Poetry is a dependency manager for Python. When handling dependencies that come from a Git repository instead of a registry, Poetry uses various commands, such as `git clone`. These commands are constructed using user input (e.g. the repository URL). When building the commands, Poetry correctly avoids Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. If a developer is exploited, the attacker could steal credentials or persist their access. If the exploit happens on a server, the attackers could use their access to attack other internal systems. Since this vulnerability requires a fair amount of user interaction, it is not as dangerous as a remotely exploitable one. However, it still puts developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by vetting any Git or Poetry config files that might be present in the directory. Versions 1.1.9 and 1.2.0b1 contain patches for this issue.
CWE-88 Sep 07, 2022
CVE-2022-36804 8.8 HIGH KEV 19 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Bitbucket Server/Data Center <7.6.17/<7.17.10/<7.21.4/<8....
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.
CWE-78 Aug 25, 2022
CVE-2022-1399 9.1 CRITICAL EPSS 0.01
Device42 CMDB <18.01.00 - Command Injection
An Argument Injection or Modification vulnerability in the "Change Secret" username field as used in the Discovery component of Device42 CMDB allows a local attacker to run arbitrary code on the appliance with root privileges. This issue affects: Device42 CMDB version 18.01.00 and prior versions.
CWE-88 Aug 17, 2022
CVE-2022-37005 7.5 HIGH EPSS 0.00
Settings - Command Injection
The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
CWE-88 Aug 10, 2022
CVE-2022-25973 7.8 HIGH EPSS 0.00
mc-kill-port - Code Injection
All versions of package mc-kill-port are vulnerable to Arbitrary Command Execution via the kill function, due to missing sanitization of the port argument.
CWE-88 Aug 10, 2022
CVE-2022-36322 5.4 MEDIUM EPSS 0.00
JetBrains TeamCity <2022.04.2 - Code Injection
In JetBrains TeamCity before 2022.04.2 build parameter injection was possible
CWE-88 Jul 20, 2022
CVE-2019-10800 6.5 MEDIUM 1 Writeup EPSS 0.00
codecov <2.0.16 - Code Injection
This affects the package codecov before 2.0.16. The vulnerability occurs due to not sanitizing gcov arguments before being being provided to the popen method.
CWE-88 Jul 13, 2022
CVE-2022-25900 8.1 HIGH EPSS 0.05
Git-clone - Command Injection
All versions of package git-clone are vulnerable to Command Injection due to insecure usage of the --upload-pack feature of git.
CWE-88 Jul 01, 2022
CVE-2022-31084 8.1 HIGH 1 Writeup EPSS 0.02
LDAP Account Manager <8.0 - Code Injection
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 There are cases where LAM instantiates objects from arbitrary classes. An attacker can inject the first constructor argument. This can lead to code execution if non-LAM classes are instantiated that execute code during object creation. This issue has been fixed in version 8.0.
CWE-88 Jun 27, 2022
CVE-2022-31246 5.5 MEDIUM EPSS 0.00
Electrum <4.2.2 - DoS
paymentrequest.py in Electrum before 4.2.2 allows a file:// URL in the r parameter of a payment request (e.g., within QR code data). On Windows, this can lead to capture of credentials over SMB. On Linux and UNIX, it can lead to a denial of service by specifying the /dev/zero filename.
CWE-88 Jun 17, 2022
CVE-2022-24376 7.2 HIGH EPSS 0.03
git-promise - Command Injection
All versions of package git-promise are vulnerable to Command Injection due to an inappropriate fix of a prior [vulnerability](https://security.snyk.io/vuln/SNYK-JS-GITPROMISE-567476) in this package. **Note:** Please note that the vulnerability will not be fixed. The README file was updated with a warning regarding this issue.
CWE-88 Jun 10, 2022
CVE-2021-33473 9.1 CRITICAL 1 Writeup EPSS 0.00
Dragonfly Ruby Gem <1.3.0 - Command Injection
An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL.
CWE-88 Jun 02, 2022
CVE-2022-26532 7.8 HIGH EPSS 0.02
Zyxel USG/ZyWALL series <4.71 - Command Injection
A argument injection vulnerability in the 'packet-trace' CLI command of Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, VPN series firmware versions 4.30 through 5.21, NSG series firmware versions 1.00 through 1.33 Patch 4, NXC2500 firmware version 6.10(AAIG.3) and earlier versions, NAP203 firmware version 6.25(ABFA.7) and earlier versions, NWA50AX firmware version 6.25(ABYW.5) and earlier versions, WAC500 firmware version 6.30(ABVS.2) and earlier versions, and WAX510D firmware version 6.30(ABTF.2) and earlier versions, that could allow a local authenticated attacker to execute arbitrary OS commands by including crafted arguments to the CLI command.
CWE-78 May 24, 2022
CVE-2022-29215 7.5 HIGH 1 Writeup EPSS 0.00
RegionProtect <1.1.0 - Code Injection
RegionProtect is a plugin that allows users to manage certain events in certain regions of the world. Versions prior to 1.1.0 contain a YAML injection vulnerability that can cause an instant server crash if the passed arguments are not matched. Version 1.1.0 contains a patch for this issue. As a workaround, restrict operator permissions to untrusted people and avoid entering arguments likely to cause a crash.
CWE-88 May 21, 2022
CVE-2022-29184 8.8 HIGH 1 Writeup EPSS 0.05
GoCD <22.1.0 - Authenticated RCE
GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capability on the GoCD server via configuring a malicious branch name which abuses Mercurial hooks/aliases to exploit a command injection weakness. An attacker would require access to an account with existing GoCD administration permissions to either create/edit (`hg`-based) configuration repositories; create/edit pipelines and their (`hg`-based) materials; or, where "pipelines-as-code" configuration repositories are used, to commit malicious configuration to such an external repository which will be automatically parsed into a pipeline configuration and (`hg`) material definition by the GoCD server. This issue is fixed in GoCD 22.1.0. As a workaround, users who do not use/rely upon Mercurial materials can uninstall/remove the `hg`/Mercurial binary from the underlying GoCD Server operating system or Docker image.
CWE-88 May 20, 2022
CVE-2022-25865 8.1 HIGH 1 Writeup EPSS 0.01
Microsoft Workspace-tools < 0.18.4 - Command Injection
The package workspace-tools before 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CWE-88 May 13, 2022
CVE-2022-30240 7.8 HIGH EPSS 0.00
Magnitude Simba Amazon Redshift JDBC Driver <1.2.55 - Command Injec...
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Redshift JDBC Driver 1.2.40 through 1.2.55 may allow a local user to execute code. NOTE: this is different from CVE-2022-29972.
CWE-88 May 09, 2022