CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
442 results Clear all
CVE-2024-36472 6.5 MEDIUM EPSS 0.00
GNOME Shell <45.7 - SSRF
In GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript code's behavior.
CWE-346 May 28, 2024
CVE-2024-28883 7.4 HIGH EPSS 0.00
F5 Big-ip Access Policy Manager < 15.1.10.3 - Origin Validation Error
An origin validation vulnerability exists in BIG-IP APM browser network access VPN client for Windows, macOS and Linux which may allow an attacker to bypass F5 endpoint inspection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-346 May 08, 2024
CVE-2023-27360 8.8 HIGH EPSS 0.01
Netgear Rax30 Firmware < 1.0.10.94 - Origin Validation Error
NETGEAR RAX30 lighttpd Misconfiguration Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the lighttpd HTTP server. The issue results from allowing execution of files from untrusted sources. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19398.
CWE-345 May 03, 2024
CVE-2024-2377 7.6 HIGH EPSS 0.00
SDM600 - Privilege Escalation
A vulnerability exists in the too permissive HTTP response header web server settings of the SDM600. An attacker can take advantage of this and possibly carry out privileged actions and access sensitive information.
CWE-346 Apr 30, 2024
CVE-2024-32764 9.9 CRITICAL EPSS 0.00
myQNAPcloud Link <2.4.51 - Privilege Escalation
A missing authentication for critical function vulnerability has been reported to affect myQNAPcloud Link. If exploited, the vulnerability could allow users with the privilege level of some functionality via a network. We have already fixed the vulnerability in the following version: myQNAPcloud Link 2.4.51 and later
CWE-749 Apr 26, 2024
CVE-2024-1249 7.4 HIGH EPSS 0.00
Org.keycloak Keycloak-services < 22.0.10 - Origin Validation Error
A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.
CWE-346 Apr 17, 2024
CVE-2024-28224 6.6 MEDIUM EPSS 0.00
Ollama < 0.1.29 - Origin Validation Error
Ollama before 0.1.29 has a DNS rebinding vulnerability that can inadvertently allow remote access to the full API, thereby letting an unauthorized user chat with a large language model, delete a model, or cause a denial of service (resource exhaustion).
CWE-346 Apr 08, 2024
CVE-2024-2447 6.5 MEDIUM EPSS 0.00
Mattermost <8.1.11-9.5.2 - Privilege Escalation
Mattermost versions 8.1.x before 8.1.11, 9.3.x before 9.3.3, 9.4.x before 9.4.4, and 9.5.x before 9.5.2 fail to authenticate the source of certain types of post actions, allowing an authenticated attacker to create posts as other users via a crafted post action.
CWE-284 Apr 05, 2024
CVE-2023-5973 4.3 MEDIUM EPSS 0.00
Broadcom Fabric Operating System < 9.2.0 - Origin Validation Error
Brocade Web Interface in Brocade Fabric OS v9.x and before v9.2.0 does not properly represent the portName to the user if the portName contains reserved characters. This could allow an authenticated user to alter the UI of the Brocade Switch and change ports display.
CWE-346 Apr 05, 2024
CVE-2021-47157 9.8 CRITICAL EPSS 0.00
Kossy <0.60 - XSS
The Kossy module before 0.60 for Perl allows JSON hijacking because of X-Requested-With mishandling.
CWE-346 Mar 18, 2024
CVE-2024-2182 6.5 MEDIUM EPSS 0.00
OVN - DoS
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
CWE-346 Mar 12, 2024
CVE-2024-25996 5.3 MEDIUM EPSS 0.01
Phoenixcontact Charx Sec-3000 Firmware - Origin Validation Error
An unauthenticated remote attacker can perform a remote code execution due to an origin validation error. The access is limited to the service user.
CWE-346 Mar 12, 2024
CVE-2023-30996 5.3 MEDIUM EPSS 0.00
IBM Cognos Analytics <12.0.0 - Info Disclosure
IBM Cognos Analytics 11.1.7, 11.2.4, and 12.0.0 could be vulnerable to information leakage due to unverified sources in messages sent between Windows objects of different origins. IBM X-Force ID: 254290.
CWE-346 Feb 26, 2024
CVE-2024-25124 9.4 CRITICAL 1 Writeup EPSS 0.00
Fiber <2.52.1 - CORS-related Vuln
Fiber is a web framework written in go. Prior to version 2.52.1, the CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header to a wildcard (`*`) while also having the Access-Control-Allow-Credentials set to true, which goes against recommended security best practices. The impact of this misconfiguration is high as it can lead to unauthorized access to sensitive user data and expose the system to various types of attacks listed in the PortSwigger article linked in the references. Version 2.52.1 contains a patch for this issue. As a workaround, users may manually validate the CORS configurations in their implementation to ensure that they do not allow a wildcard origin when credentials are enabled. The browser fetch api, as well as browsers and utilities that enforce CORS policies, are not affected by this.
CWE-942 Feb 21, 2024
CVE-2024-26135 8.3 HIGH 1 Writeup EPSS 0.01
Meshcentral < 1.1.21 - Origin Validation Error
MeshCentral is a full computer management web site. Versions prior to 1.1.21 a cross-site websocket hijacking (CSWSH) vulnerability within the control.ashx endpoint. This component is the primary mechanism used within MeshCentral to perform administrative actions on the server. The vulnerability is exploitable when an attacker is able to convince a victim end-user to click on a malicious link to a page hosting an attacker-controlled site. The attacker can then originate a cross-site websocket connection using client-side JavaScript code to connect to `control.ashx` as the victim user within MeshCentral. Version 1.1.21 contains a patch for this issue.
CWE-346 Feb 20, 2024
CVE-2024-0009 6.3 MEDIUM EPSS 0.00
Paloaltonetworks Pan-os < 10.2.4 - Origin Validation Error
An improper verification vulnerability in the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software enables a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address.
CWE-346 Feb 14, 2024
CVE-2024-24782 4.3 MEDIUM EPSS 0.00
Hima F30/F35/F60 Firmware - Origin Verification Bypass via Ping Request
An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN.
CWE-346 Feb 13, 2024
CVE-2024-24557 6.9 MEDIUM 1 Writeup EPSS 0.00
Moby - Cache Poisoning
Moby is an open-source project created by Docker to enable software containerization. The classic builder cache system is prone to cache poisoning if the image is built FROM scratch. Also, changes to some instructions (most important being HEALTHCHECK and ONBUILD) would not cause a cache miss. An attacker with the knowledge of the Dockerfile someone is using could poison their cache by making them pull a specially crafted image that would be considered as a valid cache candidate for some build steps. 23.0+ users are only affected if they explicitly opted out of Buildkit (DOCKER_BUILDKIT=0 environment variable) or are using the /build API endpoint. All users on versions older than 23.0 could be impacted. Image build API endpoint (/build) and ImageBuild function from github.com/docker/docker/client is also affected as it the uses classic builder by default. Patches are included in 24.0.9 and 25.0.2 releases.
CWE-345 Feb 01, 2024
CVE-2023-40547 8.3 HIGH EPSS 0.04
Shim - RCE
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
CWE-346 Jan 25, 2024
CVE-2024-23898 8.8 HIGH 1 PoC Analysis EPSS 0.37
Jenkins < 2.441 - Origin Validation Error
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
CWE-346 Jan 24, 2024