CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
173 results Clear all
CVE-2024-8249 7.5 HIGH 1 Writeup EPSS 0.00
mintplex-labs/anything-llm <6dc3642 - DoS
mintplex-labs/anything-llm version git 6dc3642 contains an unauthenticated Denial of Service (DoS) vulnerability in the API for the embeddable chat functionality. An attacker can exploit this vulnerability by sending a malformed JSON payload to the API endpoint, causing a server crash due to an uncaught exception. This issue is fixed in version 1.2.2.
CWE-248 Mar 20, 2025
CVE-2024-8020 7.5 HIGH EPSS 0.00
lightning-ai/pytorch-lightning <2.3.2 - DoS
A vulnerability in lightning-ai/pytorch-lightning version 2.3.2 allows an attacker to cause a denial of service by sending an unexpected POST request to the `/api/v1/state` endpoint of `LightningApp`. This issue occurs due to improper handling of unexpected state values, which results in the server shutting down.
CWE-248 Mar 20, 2025
CVE-2024-11173 6.5 MEDIUM 1 Writeup EPSS 0.00
Librechat < 0.7.6 - Denial of Service
An unhandled exception in the danny-avila/librechat repository, version git 600d217, can cause the server to crash, leading to a full denial of service. This issue occurs when certain API endpoints receive malformed input, resulting in an uncaught exception. Although a valid JWT is required to exploit this vulnerability, LibreChat allows open registration, enabling unauthenticated attackers to create an account and perform the attack. The issue is fixed in version 0.7.6.
CWE-248 Mar 20, 2025
CVE-2024-11172 7.5 HIGH 1 Writeup EPSS 0.00
Librechat < 0.7.6 - Denial of Service
A vulnerability in danny-avila/librechat version git a1647d7 allows an unauthenticated attacker to cause a denial of service by sending a crafted payload to the server. The middleware `checkBan` is not surrounded by a try-catch block, and an unhandled exception will cause the server to crash. This issue is fixed in version 0.7.6.
CWE-248 Mar 20, 2025
CVE-2025-24836 7.1 HIGH EPSS 0.00
Python Script - DoS
With a specially crafted Python script, an attacker could send continuous startMeasurement commands over an unencrypted Bluetooth connection to the affected device. This would prevent the device from connecting to a clinician's app to take patient readings and ostensibly flood it with requests, resulting in a denial-of-service condition.
CWE-248 Feb 13, 2025
CVE-2025-20097 4.3 MEDIUM EPSS 0.00
Intel Server <R01.02.0002 - DoS
Uncaught exception in OpenBMC Firmware for the Intel(R) Server M50FCP Family and Intel(R) Server D50DNP Family before version R01.02.0002 may allow an authenticated user to potentially enable denial of service via network access.
CWE-248 Feb 12, 2025
CVE-2025-0158 5.5 MEDIUM EPSS 0.00
IBM EntireX 11.1 - DoS
IBM EntireX 11.1 could allow a local user to cause a denial of service due to an unhandled error and fault isolation.
CWE-248 Feb 06, 2025
CVE-2024-13417 4.6 MEDIUM EPSS 0.00
2N RFID Reader - DoS
Specifically crafted payloads sent to the RFID reader could cause DoS of RFID reader. After the device is restarted, it gets back to fully working state. 2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS.
CWE-248 Feb 06, 2025
CVE-2025-20176 7.7 HIGH EPSS 0.00
Cisco IOS - DoS
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.&nbsp; This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
CWE-248 Feb 05, 2025
CVE-2025-20173 7.7 HIGH EPSS 0.00
Cisco IOS Software - Cisco IOS XE Software - DoS
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.&nbsp; This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
CWE-248 Feb 05, 2025
CVE-2025-20172 7.7 HIGH EPSS 0.00
Cisco - DoS
A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload.&nbsp; This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
CWE-248 Feb 05, 2025
CVE-2025-20171 7.7 HIGH EPSS 0.00
Cisco IOS Software - Cisco IOS XE Software - DoS
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.&nbsp; This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
CWE-248 Feb 05, 2025
CVE-2024-56946 5.3 MEDIUM 1 Writeup EPSS 0.00
Technitium DNS Server <= v13.2.2 - DoS
Denial of service in DNS-over-QUIC in Technitium DNS Server <= v13.2.2 allows remote attackers to permanently stop the server from accepting new DNS-over-QUIC connections by triggering unhandled exceptions in listener threads.
CWE-248 Feb 03, 2025
CVE-2025-20637 7.5 HIGH EPSS 0.00
Mediatek Software Development Kit < 7.6.7.0 - Improper Condition Check
In network HW, there is a possible system hang due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00399035; Issue ID: MSV-2380.
CWE-754 Feb 03, 2025
CVE-2025-24883 1 Writeup EPSS 0.00
go-ethereum <1.14.13 - DoS
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.14.13.
CWE-248 Jan 30, 2025
CVE-2025-0648 4.9 MEDIUM EPSS 0.00
M-Files Server <25.1.14445.5, <24.8 LTS SR3 - DoS
Unexpected server crash in database driver in M-Files Server before 25.1.14445.5 and before 24.8 LTS SR3 allows a highly privileged attacker to cause denial of service via configuration change.
CWE-248 Jan 23, 2025
CVE-2024-54106 7.1 HIGH EPSS 0.00
Null pointer dereference - DoS
Null pointer dereference vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.
CWE-248 Dec 12, 2024
CVE-2024-11738 5.3 MEDIUM EPSS 0.00
Rustls <0.23.13 - DoS
A flaw was found in Rustls 0.23.13 and related APIs. This vulnerability allows denial of service (panic) via a fragmented TLS ClientHello message.
CWE-248 Dec 06, 2024
CVE-2024-20137 7.5 HIGH 1 PoC Analysis EPSS 0.10
Wlan Driver - DoS
In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727.
CWE-248 Dec 02, 2024
CVE-2024-29076 5.5 MEDIUM EPSS 0.00
Intel(R) CST <8.7.10803 - DoS
Uncaught exception for some Intel(R) CST software before version 8.7.10803 may allow an authenticated user to potentially enable denial of service via local access.
CWE-248 Nov 13, 2024