CVE & Exploit Intelligence Database

Updated 28m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
34 results Clear all
CVE-2026-27965 9.9 CRITICAL 1 Writeup EPSS 0.00
Vitess <23.0.3/22.0.4 - Code Injection
Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. Some workarounds are available. Those who intended to use an external decompressor then can always specify that decompressor command in the `--external-decompressor` flag value for `vttablet` and `vtbackup`. That then overrides any value specified in the manifest file. Those who did not intend to use an external decompressor, nor an internal one, can specify a value such as `cat` or `tee` in the `--external-decompressor` flag value for `vttablet` and `vtbackup` to ensure that a harmless command is always used.
CWE-78 Feb 26, 2026
CVE-2026-25996 9.8 CRITICAL 1 Writeup EPSS 0.00
Inspektor Gadget - Info Disclosure
Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. String fields from eBPF events in columns output mode are rendered to the terminal without any sanitization of control characters or ANSI escape sequences. Therefore, a maliciously forged – partially or completely – event payload, coming from an observed container, might inject the escape sequences into the terminal of ig operators, with various effects. The columns output mode is the default when running ig run interactively.
CWE-150 Feb 12, 2026
CVE-2026-25804 9.1 CRITICAL 1 Writeup EPSS 0.00
Antrea < 2.3.2 - Authentication Bypass
Antrea is a Kubernetes networking solution intended to be Kubernetes native. Prior to versions 2.3.2 and 2.4.3, Antrea's network policy priority assignment system has a uint16 arithmetic overflow bug that causes incorrect OpenFlow priority calculations when handling a large numbers of policies with various priority values. This results in potentially incorrect traffic enforcement. This issue has been patched in versions 2.4.3.
CWE-770 Feb 06, 2026
CVE-2026-24124 9.8 CRITICAL 1 Writeup EPSS 0.00
Dragonfly <2.4.1-rc.0 - Info Disclosure
Dragonfly is an open source P2P-based file distribution and image acceleration system. In versions 2.4.1-rc.0 and below, the Job API endpoints (/api/v1/jobs) lack JWT authentication middleware and RBAC authorization checks in the routing configuration. This allows any unauthenticated user with access to the Manager API to view, update and delete jobs. The issue is fixed in version 2.4.1-rc.1.
CWE-306 Jan 22, 2026
CVE-2025-59352 9.8 CRITICAL EPSS 0.01
Linuxfoundation Dragonfly < 2.1.0 - Path Traversal
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the gRPC API and HTTP APIs allow peers to send requests that force the recipient peer to create files in arbitrary file system locations, and to read arbitrary files. This allows peers to steal other peers’ secret data and to gain remote code execution (RCE) capabilities on the peer’s machine.This vulnerability is fixed in 2.1.0.
CWE-22 Sep 17, 2025
CVE-2025-59345 9.1 CRITICAL EPSS 0.00
Linuxfoundation Dragonfly < 2.1.10 - Missing Authentication
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The /api/v1/jobs and /preheats endpoints in Manager web UI are accessible without authentication. Any user with network access to the Manager can create, delete, and modify jobs, and create preheat jobs. An unauthenticated adversary with network access to a Manager web UI uses /api/v1/jobs endpoint to create hundreds of useless jobs. The Manager is in a denial-of-service state, and stops accepting requests from valid administrators. This vulnerability is fixed in 2.1.0.
CWE-306 Sep 17, 2025
CVE-2025-32434 9.8 CRITICAL 4 PoCs Analysis EPSS 0.01
Linuxfoundation Pytorch < 2.6.0 - Insecure Deserialization
PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0.
CWE-502 Apr 18, 2025
CVE-2024-53351 9.8 CRITICAL EPSS 0.00
Linuxfoundation Pipecd < 0.49.3 - Incorrect Default Permissions
Insecure permissions in pipecd v0.49 allow attackers to gain access to the service account's token, leading to escalation of privileges.
CWE-276 Mar 21, 2025
CVE-2024-24421 9.8 CRITICAL EPSS 0.00
Linuxfoundation Magma < 1.8.0 - Code Injection
A type confusion in the nas_message_decode function of Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted NAS packet.
CWE-94 Jan 21, 2025
CVE-2024-20148 9.8 CRITICAL EPSS 0.00
Wlan STA FW - RCE
In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796.
CWE-787 Jan 06, 2025
CVE-2024-48063 9.8 CRITICAL EPSS 0.18
Linuxfoundation Pytorch < 2.4.1 - Insecure Deserialization
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.
CWE-502 Oct 29, 2024
CVE-2024-9798 9.0 CRITICAL EPSS 0.00
Linuxfoundation Zowe API Mediation Layer < 1.28.8 - Cleartext Storage
The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers.
CWE-312 Oct 10, 2024
CVE-2023-27584 9.8 CRITICAL NUCLEI EPSS 0.66
Linuxfoundation Dragonfly < 2.0.9 - Authentication Bypass
Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, "Secret Key", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-321 Sep 19, 2024
CVE-2024-20080 9.8 CRITICAL EPSS 0.02
Gnss Service - Privilege Escalation
In gnss service, there is a possible escalation of privilege due to improper certificate validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08720039; Issue ID: MSV-1424.
CWE-295 Jul 01, 2024
CVE-2023-43632 9.0 CRITICAL EPSS 0.00
VTPM - Info Disclosure
As noted in the “VTPM.md” file in the eve documentation, “VTPM is a server listening on port 8877 in EVE, exposing limited functionality of the TPM to the clients. VTPM allows clients to execute tpm2-tools binaries from a list of hardcoded options” The communication with this server is done using protobuf, and the data is comprised of 2 parts: 1. Header 2. Data When a connection is made, the server is waiting for 4 bytes of data, which will be the header, and these 4 bytes would be parsed as uint32 size of the actual data to come. Then, in the function “handleRequest” this size is then used in order to allocate a payload on the stack for the incoming data. As this payload is allocated on the stack, this will allow overflowing the stack size allocated for the relevant process with freely controlled data. * An attacker can crash the system. * An attacker can gain control over the system, specifically on the “vtpm_server” process which has very high privileges.
CWE-770 Sep 21, 2023
CVE-2022-28357 9.8 CRITICAL EPSS 0.00
NATS nats-server <2.7.4 - Path Traversal
NATS nats-server 2.2.0 through 2.7.4 allows directory traversal because of an unintended path to a management action from a management account.
CWE-22 Sep 19, 2023
CVE-2021-32163 9.8 CRITICAL EPSS 0.00
Linuxfoundation Modular Open Smart Network - Incorrect Authorization
Authentication vulnerability in MOSN v.0.23.0 allows attacker to escalate privileges via case-sensitive JWT authorization.
CWE-863 Feb 17, 2023
CVE-2022-45907 9.8 CRITICAL 1 Writeup EPSS 0.00
Linuxfoundation Pytorch < 1.13.1 - Code Injection
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.
CWE-94 Nov 26, 2022
CVE-2022-39222 9.3 CRITICAL 1 Writeup EPSS 0.01
Linuxfoundation Dex < 2.35.0 - Information Disclosure
Dex is an identity service that uses OpenID Connect to drive authentication for other apps. Dex instances with public clients (and by extension, clients accepting tokens issued by those Dex instances) are affected by this vulnerability if they are running a version prior to 2.35.0. An attacker can exploit this vulnerability by making a victim navigate to a malicious website and guiding them through the OIDC flow, stealing the OAuth authorization code in the process. The authorization code then can be exchanged by the attacker for a token, gaining access to applications accepting that token. Version 2.35.0 has introduced a fix for this issue. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-862 Oct 06, 2022
CVE-2022-36025 9.1 CRITICAL EPSS 0.01
Besu <22.7.1 - Incorrect Conversion
Besu is a Java-based Ethereum client. In versions newer than 22.1.3 and prior to 22.7.1, Besu is subject to an Incorrect Conversion between Numeric Types. An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or failure, or if the gas is a negative 64 bit value, the execution will result in a different state root than expected, resulting in a consensus failure in networks with multiple EVM implementations. In networks with a single EVM implementation this can be used to execute with significantly more gas than then transaction requested, possibly exceeding gas limitations. This issue is patched in version 22.7.1. As a workaround, reverting to version 22.1.3 or earlier will prevent incorrect execution.
CWE-196 Sep 24, 2022