CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
403 results Clear all
CVE-2024-23284 6.5 MEDIUM EPSS 0.01
Apple Safari < 17.4 - Denial of Service
A logic issue was addressed with improved state management. This issue is fixed in tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, Safari 17.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
CWE-693 Mar 08, 2024
CVE-2024-25091 9.1 CRITICAL EPSS 0.00
RevoWorks SCVX <scvimage4.10.21_1013 - Code Injection
Protection mechanism failure issue exists in RevoWorks SCVX prior to scvimage4.10.21_1013 (when using 'VirusChecker' or 'ThreatChecker' feature) and RevoWorks Browser prior to 2.2.95 (when using 'VirusChecker' or 'ThreatChecker' feature). If data containing malware is saved in a specific file format (eml, dmg, vhd, iso, msi), malware may be taken outside the sandboxed environment.
CWE-693 Mar 01, 2024
CVE-2024-21423 4.8 MEDIUM EPSS 0.01
Microsoft Edge Chromium < 122.0.2365.52 - Information Disclosure
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CWE-693 Feb 23, 2024
CVE-2024-1671 6.5 MEDIUM EPSS 0.00
Google Chrome <122.0.6261.57 - CSRF
Inappropriate implementation in Site Isolation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)
CWE-693 Feb 21, 2024
CVE-2023-52378 9.8 CRITICAL EPSS 0.00
Huawei EMUI and HarmonyOS - Incorrect Service Logic in WindowManagerServices
Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally.
CWE-693 Feb 18, 2024
CVE-2024-20923 3.1 LOW EPSS 0.00
Oracle Java SE <8u391, Oracle GraalVM EE <21.3.8 - Info Disclosure
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and 21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
CWE-693 Feb 17, 2024
CVE-2024-0029 7.8 HIGH EPSS 0.00
Google Android - Local Privilege Escalation via Screen Capture
In multiple files, there is a possible way to capture the device screen when disallowed by device policy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Feb 16, 2024
CVE-2024-0014 7.8 HIGH EPSS 0.00
Java - Privilege Escalation
In startInstall of UpdateFetcher.java, there is a possible way to trigger a malicious config update due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Feb 16, 2024
CVE-2022-48219 6.4 MEDIUM EPSS 0.00
HP Desktop PC - Privilege Escalation
Potential vulnerabilities have been identified in certain HP Desktop PC products using the HP TamperLock feature, which might allow intrusion detection bypass via a physical attack. HP is releasing firmware and guidance to mitigate these potential vulnerabilities.
CWE-693 Feb 14, 2024
CVE-2023-32644 4.3 MEDIUM EPSS 0.00
Intel Killer < 3.1423.712 - Denial of Service
Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CWE-693 Feb 14, 2024
CVE-2023-25945 6.7 MEDIUM EPSS 0.00
Intel(R) OFU <14.1.31 - Privilege Escalation
Protection mechanism failure in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE-693 Feb 14, 2024
CVE-2024-21412 8.1 HIGH KEV RANSOMWARE 2 PoCs Analysis EPSS 0.94
Internet Shortcut Files - Privilege Escalation
Internet Shortcut Files Security Feature Bypass Vulnerability
CWE-693 Feb 13, 2024
CVE-2024-20673 7.8 HIGH EPSS 0.00
Microsoft Office - RCE
Microsoft Office Remote Code Execution Vulnerability
CWE-693 Feb 13, 2024
CVE-2024-25744 8.8 HIGH EPSS 0.00
Linux kernel <6.6.7 - Use After Free
In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.
CWE-693 Feb 12, 2024
CVE-2024-0809 4.3 MEDIUM EPSS 0.00
Google Chrome <121.0.6167.85 - CSRF
Inappropriate implementation in Autofill in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
CWE-693 Jan 24, 2024
CVE-2024-0804 7.5 HIGH EPSS 0.00
Google Chrome <121.0.6167.85 - Info Disclosure
Insufficient policy enforcement in iOS Security UI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
CWE-693 Jan 24, 2024
CVE-2024-0747 6.5 MEDIUM EPSS 0.00
Firefox < 122 - Firefox ESR < 115.7 - Thunderbird < 115.7 - Info Di...
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
CWE-693 Jan 23, 2024
CVE-2024-20926 5.9 MEDIUM EPSS 0.00
Oracle Graalvm - Improper Access Control
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Scripting). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21; Oracle GraalVM for JDK: 17.0.9; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CWE-284 Jan 16, 2024
CVE-2023-51748 8.8 HIGH EPSS 0.00
ScaleFusion 10.5.2 - Privilege Escalation
ScaleFusion 10.5.2 does not properly limit users to the Edge application because Ctrl-O and Ctrl-S can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.
CWE-693 Jan 11, 2024
CVE-2023-20573 3.2 LOW 1 PoC Analysis EPSS 0.00
SEV-SNP - Privilege Escalation
A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information.
CWE-693 Jan 11, 2024