CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
173 results Clear all
CVE-2024-51750 5.0 MEDIUM 1 Writeup EPSS 0.00
Element <1.11.85 - Info Disclosure
Element is a Matrix web client built using the Matrix React SDK. A malicious homeserver can send invalid messages over federation which can prevent Element Web and Desktop from rendering single messages or the entire room containing them. This was patched in Element Web and Desktop 1.11.85.
CWE-248 Nov 12, 2024
CVE-2024-51518 5.3 MEDIUM EPSS 0.00
Unknown - Info Disclosure
Vulnerability of message types not being verified in the advanced messaging modul Impact: Successful exploitation of this vulnerability may affect availability.
CWE-248 Nov 05, 2024
CVE-2024-33848 6.5 MEDIUM EPSS 0.00
Intel Raid Web Console - Denial of Service
Uncaught exception in Intel(R) RAID Web Console software all versions may allow an authenticated user to potentially enable denial of service via local access.
CWE-248 Sep 16, 2024
CVE-2024-43367 7.5 HIGH 1 Writeup EPSS 0.00
Crates.io Boa Engine < 0.19.0 - Denial of Service
Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript's `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa's implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise's `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don't impact the availability of the main application.
CWE-248 Aug 15, 2024
CVE-2024-43357 8.6 HIGH 1 Writeup EPSS 0.01
ECMAScript - Type Confusion
ECMA-262 is the language specification for the scripting language ECMAScript. A problem in the ECMAScript (JavaScript) specification of async generators, introduced by a May 2021 spec refactor, may lead to mis-implementation in a way that could present as a security vulnerability, such as type confusion and pointer dereference. The internal async generator machinery calls regular promise resolver functions on IteratorResult (`{ done, value }`) objects that it creates, assuming that the IteratorResult objects will not be then-ables. Unfortunately, these IteratorResult objects inherit from `Object.prototype`, so these IteratorResult objects can be made then-able, triggering arbitrary behaviour, including re-entering the async generator machinery in a way that violates some internal invariants. The ECMAScript specification is a living standard and the issue has been addressed at the time of this advisory's public disclosure. JavaScript engine implementors should refer to the latest specification and update their implementations to comply with the `AsyncGenerator` section. ## References - https://github.com/tc39/ecma262/commit/1e24a286d0a327d08e1154926b3ee79820232727 - https://bugzilla.mozilla.org/show_bug.cgi?id=1901411 - https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq - https://bugs.webkit.org/show_bug.cgi?id=275407 - https://issues.chromium.org/issues/346692561 - https://www.cve.org/CVERecord?id=CVE-2024-7652
CWE-843 Aug 15, 2024
CVE-2024-42037 9.3 CRITICAL EPSS 0.00
Graphics Module - Info Disclosure
Vulnerability of uncaught exceptions in the Graphics module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CWE-248 Aug 08, 2024
CVE-2024-38525 7.5 HIGH EPSS 0.00
dd-trace-cpp <0.2.2 - Memory Corruption
dd-trace-cpp is the Datadog distributed tracing for C++. When the library fails to extract trace context due to malformed unicode, it logs the list of audited headers and their values using the `nlohmann` JSON library. However, due to the way the JSON library is invoked, it throws an uncaught exception, which results in a crash. This vulnerability has been patched in version 0.2.2.
CWE-248 Jun 28, 2024
CVE-2023-5038 7.5 HIGH EPSS 0.00
Hanwhavision Ano-l6012r Firmware < 1.41.16 - Denial of Service
badmonkey, a Security Researcher has found a flaw that allows for a unauthenticated DoS attack on the camera. An attacker runs a crafted URL, nobody can access the web management page of the camera. and must manually restart the device or re-power it. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
CWE-248 Jun 25, 2024
CVE-2024-31217 5.3 MEDIUM 1 Writeup EPSS 0.02
Strapi <4.22.0 - DoS
Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.
CWE-248 Jun 12, 2024
CVE-2024-34363 7.5 HIGH EPSS 0.00
Envoy - Info Disclosure
Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash.
CWE-248 Jun 04, 2024
CVE-2024-31904 6.5 MEDIUM EPSS 0.00
IBM App Connect Enterprise - DoS
IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 through 12.0.12.0 integration nodes could allow an authenticated user to cause a denial of service due to an uncaught exception. IBM X-Force ID: 289647.
CWE-248 May 22, 2024
CVE-2024-32995 6.2 MEDIUM EPSS 0.00
Huawei Emui - Denial of Service
Denial of service (DoS) vulnerability in the AMS module Impact: Successful exploitation of this vulnerability will affect availability.
CWE-248 May 14, 2024
CVE-2024-3052 7.5 HIGH EPSS 0.00
S2 Nonce Get - DoS
Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway.
CWE-248 Apr 26, 2024
CVE-2024-3051 7.5 HIGH EPSS 0.00
Malformed Device Reset Locally - DoS
Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.
CWE-248 Apr 26, 2024
CVE-2023-52342 7.5 HIGH EPSS 0.00
Google Android - Information Disclosure
In modem-ps-nas-ngmm, there is a possible undefined behavior due to incorrect error handling. This could lead to remote information disclosure no additional execution privileges needed
CWE-248 Apr 08, 2024
CVE-2024-20049 4.4 MEDIUM EPSS 0.00
flashc - Info Disclosure
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541765; Issue ID: ALPS08541765.
CWE-248 Apr 01, 2024
CVE-2024-20048 6.2 MEDIUM EPSS 0.00
flashc - Info Disclosure
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541769; Issue ID: ALPS08541769.
CWE-248 Apr 01, 2024
CVE-2024-23449 4.3 MEDIUM EPSS 0.00
Elasticsearch >= 8.4.0 < 8.11.1 - Info Disclosure
An uncaught exception in Elasticsearch >= 8.4.0 and < 8.11.1 occurs when an encrypted PDF is passed to an attachment processor through the REST API. The Elasticsearch ingest node that attempts to parse the PDF file will crash. This does not happen with password-protected PDF files or with unencrypted PDF files.
CWE-248 Mar 29, 2024
CVE-2024-20276 7.4 HIGH EPSS 0.00
Cisco IOS - DoS
A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly. This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
CWE-248 Mar 27, 2024
CVE-2024-28835 5.0 MEDIUM EPSS 0.00
GnuTLS - Memory Corruption
A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
CWE-248 Mar 21, 2024