CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
210 results Clear all
CVE-2020-10753 5.4 MEDIUM EPSS 0.00
Red Hat Ceph Storage RadosGW - HTTP Header Injection
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.
CWE-113 Jun 26, 2020
CVE-2020-10711 5.9 MEDIUM EPSS 0.05
Linux kernel <5.7 - NULL Pointer Dereference
A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
CWE-476 May 22, 2020
CVE-2020-1758 5.3 MEDIUM EPSS 0.00
Keycloak <10.0.0 - Info Disclosure
A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack.
CWE-295 May 15, 2020
CVE-2020-10685 5.0 MEDIUM EPSS 0.00
Ansible Engine <2.7.17-2.8.11-2.9.7 - Info Disclosure
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.
CWE-459 May 11, 2020
CVE-2020-1759 6.4 MEDIUM EPSS 0.00
Red Hat Ceph Storage 4-Red Hat Openshift Container Storage 4.2 - Co...
A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.
CWE-330 Apr 13, 2020
CVE-2019-14905 5.6 MEDIUM EPSS 0.00
Redhat Ansible Engine < 2.7.16 - Command Injection
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
CWE-668 Mar 31, 2020
CVE-2020-10684 7.9 HIGH EXPLOITED EPSS 0.00
Ansible Engine <2.7.17, 2.8.9, 2.9.6 - Privilege Escalation/Code In...
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.
CWE-862 Mar 24, 2020
CVE-2020-1740 3.9 LOW EPSS 0.00
Ansible Engine - Info Disclosure
A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
CWE-377 Mar 16, 2020
CVE-2020-1738 3.9 LOW EPSS 0.00
Ansible Engine - Code Injection
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
CWE-88 Mar 16, 2020
CVE-2020-1736 2.2 LOW EPSS 0.00
Ansible Engine - Info Disclosure
A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
CWE-732 Mar 16, 2020
CVE-2020-1735 4.2 MEDIUM EPSS 0.00
Ansible Engine - Path Traversal
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
CWE-22 Mar 16, 2020
CVE-2020-1739 3.9 LOW EPSS 0.00
Ansible <2.7.16, <2.8.8, <2.9.5 - Info Disclosure
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
CWE-200 Mar 12, 2020
CVE-2020-1733 5.0 MEDIUM EPSS 0.00
Ansible Engine <2.7.17, <2.8.9, <2.9.6 - Privilege Escalation
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
CWE-362 Mar 11, 2020
CVE-2012-6685 7.5 HIGH EPSS 0.00
Nokogiri < 1.5.4 - XML Entity Expansion
Nokogiri before 1.5.4 is vulnerable to XXE attacks
CWE-776 Feb 19, 2020
CVE-2020-1711 7.7 HIGH EPSS 0.01
QEMU <4.2.1 - Memory Corruption
An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
CWE-122 Feb 11, 2020
CVE-2015-5741 9.8 CRITICAL 1 Writeup EPSS 0.02
Go <1.4.3 - SSRF
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
CWE-444 Feb 08, 2020
CVE-2015-6815 3.5 LOW EPSS 0.02
Qemu < 2.4.0.1 - Infinite Loop
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
CWE-835 Jan 31, 2020
CVE-2019-14859 9.1 CRITICAL EPSS 0.00
Python-ecdsa < 0.13.3 - Signature Verification Bypass
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
CWE-347 Jan 02, 2020
CVE-2012-5474 5.5 MEDIUM EPSS 0.00
Red Hat OpenStack Platform <2.0 - Info Disclosure
The file /etc/openstack-dashboard/local_settings within Red Hat OpenStack Platform 2.0 and RHOS Essex Release (python-django-horizon package before 2012.1.1) is world readable and exposes the secret key value.
CWE-311 Dec 30, 2019
CVE-2019-16789 7.1 HIGH 1 Writeup EPSS 0.01
Waitress <1.4.0 - HTTP Request Smuggling
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.
CWE-444 Dec 26, 2019