CVE & Exploit Intelligence Database

Updated 51m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
447 results Clear all
CVE-2024-4577 9.8 CRITICAL KEV RANSOMWARE 86 PoCs Analysis NUCLEI EPSS 0.94
PHP CGI Argument Injection Remote Code Execution
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
CWE-78 Jun 09, 2024
CVE-2024-5274 9.6 CRITICAL KEV 2 PoCs Analysis EPSS 0.04
Google Chrome < 125.0.6422.112 - Type Confusion
Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE-843 May 28, 2024
CVE-2024-36048 9.8 CRITICAL EPSS 0.00
Qt <5.15.17, <6.2.13, <6.3-6.5.<6.5.6, <6.6-6.7.<6.7.1 - Info Discl...
QAbstractOAuth in Qt Network Authorization in Qt before 5.15.17, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.6, and 6.6.x through 6.7.x before 6.7.1 uses only the time to seed the PRNG, which may result in guessable values.
CWE-335 May 18, 2024
CVE-2024-4947 9.6 CRITICAL KEV 2 PoCs Analysis EPSS 0.00
Google Chrome <125.0.6422.60 - RCE
Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE-843 May 15, 2024
CVE-2024-4671 9.6 CRITICAL KEV EPSS 0.00
Google Chrome < 124.0.6367.201 - Use After Free
Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-416 May 14, 2024
CVE-2024-34340 9.1 CRITICAL EPSS 0.01
Cacti <1.2.27 - Info Disclosure
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls `compat_password_hash` when users set their password. `compat_password_hash` use `password_hash` if there is it, else use `md5`. When verifying password, it calls `compat_password_verify`. In `compat_password_verify`, `password_verify` is called if there is it, else use `md5`. `password_verify` and `password_hash` are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in `compat_password_verify`. Md5-hashed user input is compared with correct password in database by `$md5 == $hash`. It is a loose comparison, not `===`. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue.
CWE-697 May 14, 2024
CVE-2024-25641 9.1 CRITICAL 9 PoCs Analysis EPSS 0.88
Cacti Import Packages RCE
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.
CWE-20 May 14, 2024
CVE-2024-4558 9.6 CRITICAL EPSS 0.03
Google Chrome < 124.0.6367.155 - Use After Free
Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 May 07, 2024
CVE-2024-34502 9.8 CRITICAL EPSS 0.00
MediaWiki <1.39.6-1.41.1 - Info Disclosure
An issue was discovered in WikibaseLexeme in MediaWiki before 1.39.6, 1.40.x before 1.40.2, and 1.41.x before 1.41.1. Loading Special:MergeLexemes will (attempt to) make an edit that merges the from-id to the to-id, even if the request was not a POST request, and even if it does not contain an edit token.
CWE-352 May 05, 2024
CVE-2023-47212 9.8 CRITICAL EPSS 0.00
Nothings Stb Vorbis.c - Integer Overflow
A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.
CWE-190 May 01, 2024
CVE-2024-1874 9.4 CRITICAL 2 PoCs Analysis EPSS 0.63
PHP <8.1.28, 8.2.*<8.2.18, 8.3.*<8.3.5 - Command Injection
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
CWE-116 Apr 29, 2024
CVE-2024-32659 9.8 CRITICAL 1 Writeup EPSS 0.00
Freerdp < 2.11.7 - Out-of-Bounds Read
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CWE-125 Apr 23, 2024
CVE-2024-32658 9.8 CRITICAL 1 Writeup EPSS 0.02
Freerdp < 2.11.7 - Out-of-Bounds Read
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CWE-125 Apr 23, 2024
CVE-2024-32459 9.8 CRITICAL 1 PoC Analysis EPSS 0.11
FreeRDP <3.5.0, <2.11.6 - Memory Corruption
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.
CWE-125 Apr 22, 2024
CVE-2024-32458 9.8 CRITICAL EPSS 0.01
FreeRDP <3.5.0-2.11.6 - Info Disclosure
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).
CWE-125 Apr 22, 2024
CVE-2024-32041 9.8 CRITICAL EPSS 0.00
FreeRDP <3.5.0-2.11.6 - Memory Corruption
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.
CWE-125 Apr 22, 2024
CVE-2024-32039 9.8 CRITICAL EPSS 0.01
FreeRDP <3.5.0-2.11.6 - Buffer Overflow
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default).
CWE-190 Apr 22, 2024
CVE-2024-31581 9.8 CRITICAL 2 Writeups EPSS 0.00
Ffmpeg - Improper Array Index Validation
FFmpeg version n6.1 was discovered to contain an improper validation of array index vulnerability in libavcodec/cbs_h266_syntax_template.c. This vulnerability allows attackers to cause undefined behavior within the application.
CWE-129 Apr 17, 2024
CVE-2024-3157 9.6 CRITICAL EPSS 0.01
Google Chrome <123.0.6312.122 - Memory Corruption
Out of bounds memory access in Compositing in Google Chrome prior to 123.0.6312.122 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: High)
CWE-787 Apr 10, 2024
CVE-2024-24576 10.0 CRITICAL 8 PoCs Analysis EPSS 0.79
Rust <1.77.2 - Command Injection
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted. One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution. Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process. The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.
CWE-78 Apr 09, 2024