CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
173 results Clear all
CVE-2025-44019 7.1 HIGH EPSS 0.00
AVEVA PI Data Archive - DoS
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service. Depending on the timing of the crash, data present in snapshots/write cache may be lost.
CWE-248 Jun 12, 2025
CVE-2025-36539 6.5 MEDIUM EPSS 0.00
AVEVA PI Data Archive - DoS
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service.
CWE-248 Jun 12, 2025
CVE-2025-48907 6.2 MEDIUM EPSS 0.00
IPC Module - Use After Free
Deserialization vulnerability in the IPC module Impact: Successful exploitation of this vulnerability may affect availability.
CWE-248 Jun 06, 2025
CVE-2025-48997 1 Writeup EPSS 0.00
Multer <2.0.1 - DoS
Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to `2.0.1` to receive a patch. No known workarounds are available.
CWE-248 Jun 03, 2025
CVE-2025-29785 7.5 HIGH 1 Writeup EPSS 0.00
quic-go <0.50.0 - Use After Free
quic-go is an implementation of the QUIC protocol in Go. The loss recovery logic for path probe packets that was added in the v0.50.0 release can be used to trigger a nil-pointer dereference by a malicious QUIC client. In order to do so, the attacker first sends valid QUIC packets from different remote addresses (thereby triggering the newly added path validation logic: the server sends path probe packets), and then sending ACKs for packets received from the server specifically crafted to trigger the nil-pointer dereference. v0.50.1 contains a patch that fixes the vulnerability. This release contains a test that generates random sequences of sent packets (both regular and path probe packets), that was used to verify that the patch actually covers all corner cases. No known workarounds are available.
CWE-248 Jun 02, 2025
CVE-2025-48943 6.5 MEDIUM 1 Writeup EPSS 0.00
vLLM <0.9.0 - DoS
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 up to but excluding 0.9.0 have a Denial of Service (ReDoS) that causes the vLLM server to crash if an invalid regex was provided while using structured output. This vulnerability is similar to GHSA-6qc9-v4r8-22xg/CVE-2025-48942, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue.
CWE-248 May 30, 2025
CVE-2025-48942 6.5 MEDIUM 1 Writeup EPSS 0.00
vLLM <0.9.0 - DoS
vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8.0 up to but excluding 0.9.0, hitting the /v1/completions API with a invalid json_schema as a Guided Param kills the vllm server. This vulnerability is similar GHSA-9hcf-v7m4-6m2j/CVE-2025-48943, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue.
CWE-248 May 30, 2025
CVE-2025-47944 7.5 HIGH 1 Writeup EPSS 0.00
NPM Multer < 2.0.0 - Denial of Service
Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.0 allows an attacker to trigger a Denial of Service (DoS) by sending a malformed multi-part upload request. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to version 2.0.0 to receive a patch. No known workarounds are available.
CWE-248 May 19, 2025
CVE-2025-23166 7.5 HIGH EPSS 0.00
Node.js - Use After Free
The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.
CWE-248 May 19, 2025
CVE-2025-20054 6.5 MEDIUM EPSS 0.00
Intel(R) Processors - DoS
Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
CWE-248 May 13, 2025
CVE-2024-52903 5.3 MEDIUM EPSS 0.00
IBM Db2 < 12.1.1 - Denial of Service
IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.
CWE-248 May 01, 2025
CVE-2025-3891 7.5 HIGH 1 Writeup EPSS 0.01
Apache HTTP Server - Denial of Service
A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
CWE-248 Apr 29, 2025
CVE-2025-43855 1 Writeup EPSS 0.00
tRPC <11.1.1 - DoS
tRPC allows users to build & consume fully typesafe APIs without schemas or code generation. In versions starting from 11.0.0 to before 11.1.1, an unhandled error is thrown when validating invalid connectionParams which crashes a tRPC WebSocket server. This allows any unauthenticated user to crash a tRPC 11 WebSocket server. Any tRPC 11 server with WebSocket enabled with a createContext method set is vulnerable. This issue has been patched in version 11.1.1.
CWE-248 Apr 24, 2025
CVE-2025-32944 6.5 MEDIUM EPSS 0.00
PeerTube - DoS
The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner.  If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup.
CWE-248 Apr 15, 2025
CVE-2024-49705 6.5 MEDIUM EPSS 0.00
SoftCOM iKSORIS - DoS
Internet Starter, one of SoftCOM iKSORIS system modules, is vulnerable to client-side Denial of Servise (DoS) attacks. An attacker might trick a user into using an URL with a d parameter set to an unhandled value. All the subsequent requests will not be accepted as the server returns an error message. Since this parameter is sent as part of a session cookie, the issue persists until the session expires or the user deletes cookies manually.  Similar effect might be achieved when a user tries to change platform language to an unimplemented one. This vulnerability has been patched in version 79.0
CWE-248 Apr 14, 2025
CVE-2025-20664 7.5 HIGH EPSS 0.00
Mediatek Software Development Kit < 7.4.0.1 - Information Disclosure
In wlan AP driver, there is a possible information disclosure due to an uncaught exception. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00406217; Issue ID: MSV-2773.
CWE-248 Apr 07, 2025
CVE-2025-20663 7.5 HIGH EPSS 0.00
Mediatek Software Development Kit < 7.4.0.1 - Information Disclosure
In wlan AP driver, there is a possible information disclosure due to an uncaught exception. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00408868; Issue ID: MSV-3031.
CWE-248 Apr 07, 2025
CVE-2024-58112 7.5 HIGH EPSS 0.00
ArkUI - Info Disclosure
Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework Impact: Successful exploitation of this vulnerability may affect availability.
CWE-248 Apr 07, 2025
CVE-2024-58111 7.5 HIGH EPSS 0.00
ArkUI - Info Disclosure
Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework Impact: Successful exploitation of this vulnerability may affect availability.
CWE-248 Apr 07, 2025
CVE-2025-3083 7.5 HIGH EPSS 0.00
MongoDB <5.0.31, <6.0.20, <7.0.16 - DoS
Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31,  MongoDB v6.0 versions prior to 6.0.20 and MongoDB v7.0 versions prior to 7.0.16
CWE-248 Apr 01, 2025