CVE & Exploit Intelligence Database

Updated 48m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,613 CVEs tracked 53,239 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,918 Nuclei templates 37,790 vendors 42,464 researchers
163 results Clear all
CVE-2021-3449 5.9 MEDIUM 2 PoCs Analysis EPSS 0.08
Openssl < 1.1.1k - NULL Pointer Dereference
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
CWE-476 Mar 25, 2021
CVE-2021-22884 7.5 HIGH EPSS 0.01
Node.js <10.24.0, 12.21.0, 14.16.0, 15.10.0 - Info Disclosure
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
CWE-350 Mar 03, 2021
CVE-2021-22883 7.5 HIGH EPSS 0.91
Node.js <10.24.0,12.21.0,14.16.0,15.10.0 - DoS
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
CWE-772 Mar 03, 2021
CVE-2021-23840 7.5 HIGH 1 PoC Analysis EPSS 0.00
Openssl < 1.0.2y - Integer Overflow
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CWE-190 Feb 16, 2021
CVE-2020-8287 6.5 MEDIUM 1 PoC Analysis EPSS 0.11
Node.js <10.23.1, 12.20.1, 14.15.4, 15.5.1 - SSRF
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
CWE-444 Jan 06, 2021
CVE-2020-8265 8.1 HIGH EPSS 0.01
Node.js <10.23.1, 12.20.1, 14.15.4, 15.5.1 - Use After Free
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
CWE-416 Jan 06, 2021
CVE-2020-1971 5.9 MEDIUM 2 PoCs Analysis EPSS 0.00
Openssl < 1.0.2x - NULL Pointer Dereference
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
CWE-476 Dec 08, 2020
CVE-2018-21270 6.5 MEDIUM EPSS 0.01
Nodejs Node.js < 0.0.6 - Out-of-Bounds Read
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
CWE-125 Dec 03, 2020
CVE-2020-8277 7.5 HIGH 2 PoCs Analysis EPSS 0.59
Node.js <15.2.1, <14.15.1, <12.19.1 - DoS
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
CWE-400 Nov 19, 2020
CVE-2020-8252 7.8 HIGH EPSS 0.00
libuv <10.22.1-14.9.0 - Buffer Overflow
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
CWE-120 Sep 18, 2020
CVE-2020-8251 7.5 HIGH EPSS 0.05
Node.js < 14.11.0 - DoS
Node.js < 14.11.0 is vulnerable to HTTP denial of service (DoS) attacks based on delayed requests submission which can make the server unable to accept new connections.
CWE-400 Sep 18, 2020
CVE-2020-8201 7.4 HIGH EPSS 0.01
Node.js < 12.18.4-14.11 - Open Redirect
Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.
CWE-444 Sep 18, 2020
CVE-2020-8174 8.1 HIGH EPSS 0.02
node <10.21.0, 12.18.0, 14.4.0 - Memory Corruption
napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0.
CWE-119 Jul 24, 2020
CVE-2020-8172 7.4 HIGH EPSS 0.01
Node <12.18.0-14.4.0 - SSL/TLS Verification Bypass
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
CWE-295 Jun 08, 2020
CVE-2020-11080 3.7 LOW 1 Writeup EPSS 0.01
nghttp2 <1.41.0 - DoS
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
CWE-400 Jun 03, 2020
CVE-2020-10531 8.8 HIGH 1 Writeup EPSS 0.01
ICU <66.1 - Buffer Overflow
An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
CWE-190 Mar 12, 2020
CVE-2014-9748 8.1 HIGH EPSS 0.00
libuv <1.7.4 - DoS
The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition.
CWE-362 Feb 11, 2020
CVE-2019-15606 9.8 CRITICAL EPSS 0.01
Nodejs Node.js < 10.19.0 - Improper Input Validation
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
CWE-20 Feb 07, 2020
CVE-2019-15605 9.8 CRITICAL 1 PoC Analysis EPSS 0.32
Nodejs Node.js < 10.19.0 - HTTP Request Smuggling
HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
CWE-444 Feb 07, 2020
CVE-2019-15604 7.5 HIGH EPSS 0.04
Nodejs Node.js < 10.19.0 - Improper Certificate Validation
Improper Certificate Validation in Node.js 10, 12, and 13 causes the process to abort when sending a crafted X.509 certificate
CWE-295 Feb 07, 2020