CVE & Exploit Intelligence Database

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
309 results Clear all
CVE-2022-30239 7.8 HIGH EPSS 0.00
Magnitude Simba Amazon Athena JDBC Driver <2.0.29 - Command Injection
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Athena JDBC Driver 2.0.25 through 2.0.28 may allow a local user to execute code. NOTE: this is different from CVE-2022-29971.
CWE-88 May 09, 2022
CVE-2022-29972 7.8 HIGH EPSS 0.01
Magnitude Simba Amazon Redshift ODBC Driver <1.4.52 - Command Injec...
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Redshift ODBC Driver (1.4.14 through 1.4.21.1001 and 1.4.22 through 1.4.x before 1.4.52) may allow a local user to execute arbitrary code.
CWE-88 May 09, 2022
CVE-2022-29971 7.8 HIGH EPSS 0.00
Magnitude Simba Amazon Athena ODBC Driver <1.1.17 - Command Injection
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Athena ODBC Driver 1.1.1 through 1.1.x before 1.1.17 may allow a local user to execute arbitrary code.
CWE-88 May 09, 2022
CVE-2022-30284 9.0 CRITICAL EPSS 0.15
python-libnmap <0.7.2 - RCE
In the python-libnmap package through 0.7.2 for Python, remote command execution can occur (if used in a client application that does not validate arguments). NOTE: the vendor believes it would be unrealistic for an application to call NmapProcess with arguments taken from input data that arrived over an untrusted network, and thus the CVSS score corresponds to an unrealistic use case. None of the NmapProcess documentation implies that this is an expected use case
CWE-88 May 04, 2022
CVE-2022-24437 9.8 CRITICAL 1 Writeup EPSS 0.10
git-pull-or-clone <2.0.2 - Command Injection
The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection.
CWE-88 May 01, 2022
CVE-2022-25866 8.1 HIGH 1 Writeup EPSS 0.02
Git-php < 4.0.3 - Command Injection
The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CWE-88 Apr 25, 2022
CVE-2022-25648 8.1 HIGH EPSS 0.04
Git < 1.11.0 - Command Injection
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CWE-88 Apr 19, 2022
CVE-2022-24828 8.3 HIGH 1 Writeup EPSS 0.00
Composer - Code Injection
Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report.
CWE-88 Apr 13, 2022
CVE-2022-28391 8.8 HIGH EPSS 0.03
BusyBox <1.35.0 - RCE
BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.
CWE-88 Apr 03, 2022
CVE-2022-24066 8.1 HIGH 1 Writeup EPSS 0.03
simple-git <3.5.0 - Command Injection
The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover.
CWE-88 Apr 01, 2022
CVE-2022-24440 8.1 HIGH EPSS 0.01
cocoapods-downloader <1.6.0, 1.6.2-1.6.3 - Command Injection
The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CWE-88 Apr 01, 2022
CVE-2022-21223 8.1 HIGH EPSS 0.01
Cocoapods-downloader < 1.6.2 - Command Injection
The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CWE-88 Apr 01, 2022
CVE-2022-21235 8.1 HIGH EPSS 0.00
Vcs < 1.1.13 - Command Injection
The package github.com/masterminds/vcs before 1.13.3 are vulnerable to Command Injection via argument injection. When hg is executed, argument strings are passed to hg in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CWE-88 Apr 01, 2022
CVE-2021-43736 9.8 CRITICAL EPSS 0.03
CmsWing CMS <1.3.7 - RCE
CmsWing CMS 1.3.7 is affected by a Remote Code Execution (RCE) vulnerability via parameter: log rule
CWE-88 Mar 23, 2022
CVE-2022-25766 8.8 HIGH EPSS 0.04
Ungit < 1.5.20 - Remote Code Execution
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
CWE-88 Mar 21, 2022
CVE-2022-21187 8.1 HIGH EPSS 0.01
Libvcs < 0.11.1 - Command Injection
The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
CWE-88 Mar 14, 2022
CVE-2022-24433 8.1 HIGH EPSS 0.01
simple-git <3.3.0 - Command Injection
The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.
CWE-88 Mar 11, 2022
CVE-2022-23915 7.2 HIGH EPSS 0.02
weblate <4.11.1 - RCE
The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.
CWE-88 Mar 04, 2022
CVE-2022-24953 5.3 MEDIUM 1 Writeup EPSS 0.00
Crypt_GPG <1.6.7 - Info Disclosure
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
CWE-88 Feb 17, 2022
CVE-2022-23221 9.8 CRITICAL EPSS 0.27
H2 Console <2.1.210 - RCE
H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392.
CWE-88 Jan 19, 2022