CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,098 CVEs tracked 53,218 with exploits 4,684 exploited in wild 1,536 CISA KEV 3,912 Nuclei templates 37,750 vendors 42,417 researchers
308 results Clear all
CVE-2025-58098 8.3 HIGH 1 PoC Analysis EPSS 0.00
Apache HTTP Server <2.4.66 - Command Injection
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
CWE-201 Dec 05, 2025
CVE-2025-66200 5.4 MEDIUM EPSS 0.00
Apache HTTP Server <2.4.66 - Auth Bypass
mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
CWE-288 Dec 05, 2025
CVE-2025-65082 6.5 MEDIUM EPSS 0.00
Apache HTTP Server <2.4.66 - XSS
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs. This issue affects Apache HTTP Server from 2.4.0 through 2.4.65. Users are recommended to upgrade to version 2.4.66 which fixes the issue.
CWE-150 Dec 05, 2025
CVE-2025-59775 7.5 HIGH EPSS 0.00
Apache HTTP Server < 2.4.66 - SSRF
Server-Side Request Forgery (SSRF) vulnerability  in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off  allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.66, which fixes the issue.
CWE-918 Dec 05, 2025
CVE-2025-55753 7.5 HIGH EPSS 0.00
Apache HTTP Server <2.4.66 - DoS
An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
CWE-190 Dec 05, 2025
CVE-2025-54090 6.3 MEDIUM EPSS 0.00
Apache HTTP Server <2.4.64 - Info Disclosure
A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests evaluating as "true". Users are recommended to upgrade to version 2.4.65, which fixes the issue.
CWE-253 Jul 23, 2025
CVE-2025-53020 7.5 HIGH 1 PoC Analysis EPSS 0.01
Apache HTTP Server < 2.4.64 - Memory Leak
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue.
CWE-401 Jul 10, 2025
CVE-2025-49812 7.4 HIGH EPSS 0.00
Apache HTTP Server < 2.4.64 - Authentication Bypass
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
CWE-287 Jul 10, 2025
CVE-2025-49630 7.5 HIGH EPSS 0.01
Apache HTTP Server < 2.4.64 - Reachable Assertion
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".
CWE-617 Jul 10, 2025
CVE-2025-23048 9.1 CRITICAL 2 PoCs Analysis EPSS 0.00
Apache HTTP Server < 2.4.64 - Improper Access Control
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
CWE-284 Jul 10, 2025
CVE-2024-47252 7.5 HIGH EPSS 0.00
Apache HTTP Server <2.4.63 - Info Disclosure
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
CWE-150 Jul 10, 2025
CVE-2024-43394 7.5 HIGH EPSS 0.00
Apache HTTP Server < 2.4.64 - SSRF
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
CWE-918 Jul 10, 2025
CVE-2024-43204 7.5 HIGH EPSS 0.00
Apache HTTP Server - SSRF
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
CWE-918 Jul 10, 2025
CVE-2024-42516 7.5 HIGH EPSS 0.00
Apache HTTP Server <2.4.64 - Info Disclosure
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue.
CWE-20 Jul 10, 2025
CVE-2025-3891 7.5 HIGH 1 Writeup EPSS 0.01
Apache HTTP Server - Denial of Service
A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
CWE-248 Apr 29, 2025
CVE-2024-40898 7.5 HIGH 3 PoCs Analysis EPSS 0.00
Apache HTTP Server <2.4.62 - SSRF
SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. 
CWE-918 Jul 18, 2024
CVE-2024-40725 5.3 MEDIUM 2 PoCs Analysis EPSS 0.27
Apache HTTP Server <2.4.61 - Info Disclosure
A partial fix for  CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.62, which fixes this issue.
CWE-668 Jul 18, 2024
CVE-2024-39884 6.2 MEDIUM EPSS 0.00
Apache HTTP Server <2.4.60 - Info Disclosure
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.61, which fixes this issue.
Jul 04, 2024
CVE-2024-39573 7.5 HIGH 1 PoC Analysis EPSS 0.03
Apache HTTP Server < 2.4.60 - Improper Input Validation
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CWE-20 Jul 01, 2024
CVE-2024-38477 7.5 HIGH 1 PoC Analysis EPSS 0.01
Apache HTTP Server <2.4.60 - Null Pointer Dereference
null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CWE-476 Jul 01, 2024