CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
160 results Clear all
CVE-2024-27237 5.5 MEDIUM EPSS 0.00
Unknown - Info Disclosure
In wipe_ns_memory of nsmemwipe.c, there is a possible incorrect size calculation due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-131 Mar 11, 2024
CVE-2023-52558 7.5 HIGH 1 Writeup EPSS 0.00
OpenBSD <7.4-7.3 - Buffer Overflow
In OpenBSD 7.4 before errata 002 and OpenBSD 7.3 before errata 019, a network buffer that had to be split at certain length that could crash the kernel after receiving specially crafted escape sequences.
CWE-131 Mar 01, 2024
CVE-2023-52557 7.5 HIGH 1 Writeup EPSS 0.00
OpenBSD <7.3 - DoS
In OpenBSD 7.3 before errata 016, npppd(8) could crash by a l2tp message which has an AVP (Attribute-Value Pair) with wrong length.
CWE-131 Mar 01, 2024
CVE-2023-50736 9.0 CRITICAL EPSS 0.00
Lexmark - Memory Corruption
A memory corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
CWE-131 Feb 28, 2024
CVE-2021-46943 7.8 HIGH EPSS 0.00
Linux kernel - Info Disclosure
In the Linux kernel, the following vulnerability has been resolved: media: staging/intel-ipu3: Fix set_fmt error handling If there in an error during a set_fmt, do not overwrite the previous sizes with the invalid config. Without this patch, v4l2-compliance ends up allocating 4GiB of RAM and causing the following OOPs [ 38.662975] ipu3-imgu 0000:00:05.0: swiotlb buffer is full (sz: 4096 bytes) [ 38.662980] DMA: Out of SW-IOMMU space for 4096 bytes at device 0000:00:05.0 [ 38.663010] general protection fault: 0000 [#1] PREEMPT SMP
CWE-131 Feb 27, 2024
CVE-2024-23606 9.8 CRITICAL EPSS 0.00
Libbiosig - Out-of-Bounds Write
An out-of-bounds write vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
CWE-131 Feb 20, 2024
CVE-2024-23805 7.5 HIGH EPSS 0.00
F5 Big-ip Advanced Web Application Firewall - Denial of Service
Undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. For the Application Visibility and Reporting module, this may occur when the HTTP Analytics profile with URLs enabled under Collected Entities is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. For BIG-IP Advanced WAF and ASM, this may occur when either a DoS or Bot Defense profile is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. Note: The DB variables avr.IncludeServerInURI and avr.CollectOnlyHostnameFromURI are not enabled by default. For more information about the HTTP Analytics profile and the Collect URLs setting, refer to K30875743: Create a new Analytics profile and attach it to your virtual servers https://my.f5.com/manage/s/article/K30875743 . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CWE-131 Feb 14, 2024
CVE-2023-6387 7.5 HIGH 1 PoC Analysis EPSS 0.03
Gecko SDK - Buffer Overflow
A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution
CWE-125 Feb 02, 2024
CVE-2023-6780 5.3 MEDIUM EPSS 0.00
GNU Glibc < 2.39 - Integer Overflow
An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.
CWE-190 Jan 31, 2024
CVE-2024-23622 10.0 CRITICAL EPSS 0.01
IBM Merge Efilm Workstation < 4.2 - Out-of-Bounds Write
A stack-based buffer overflow exists in IBM Merge Healthcare eFilm Workstation license server. A remote, unauthenticated attacker can exploit this vulnerability to achieve remote code execution with SYSTEM privileges.
CWE-131 Jan 26, 2024
CVE-2024-23621 10.0 CRITICAL EPSS 0.01
IBM Merge Efilm Workstation < 4.2 - Remote Code Execution
A buffer overflow exists in IBM Merge Healthcare eFilm Workstation license server. A remote, unauthenticated attacker can exploit this vulnerability to achieve remote code execution.
CWE-131 Jan 26, 2024
CVE-2023-5941 9.8 CRITICAL EPSS 0.01
Freebsd < 12.4 - Out-of-Bounds Write
In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an error.  Depending on the nature of an application that calls libc's stdio functions and the presence of errors returned from the write(2) system call (or an overridden stdio write routine) a heap buffer overflow may occur. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.
CWE-131 Nov 08, 2023
CVE-2023-45871 7.5 HIGH EPSS 0.00
Linux kernel <6.5.3 - Buffer Overflow
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
CWE-131 Oct 15, 2023
CVE-2023-4257 7.6 HIGH EPSS 0.00
Product - Buffer Overflow
Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.
CWE-131 Oct 13, 2023
CVE-2023-20798 4.4 MEDIUM EPSS 0.00
Google Android - Information Disclosure
In pda, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07147572; Issue ID: ALPS07421076.
CWE-125 Aug 07, 2023
CVE-2023-36824 7.4 HIGH EPSS 0.91
Redis <7.0.12 - RCE
Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.
CWE-131 Jul 11, 2023
CVE-2023-30575 6.5 MEDIUM EPSS 0.00
Apache Guacamole <1.5.1 - Code Injection
Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.
CWE-131 Jun 07, 2023
CVE-2023-2687 2.9 LOW EPSS 0.00
Silicon Labs Gecko SDK <4.2.1 - Buffer Overflow
Buffer overflow in Platform CLI component in Silicon Labs Gecko SDK v4.2.1 and earlier allows user to overwrite limited structures on the heap.
CWE-131 Jun 02, 2023
CVE-2023-24819 9.8 CRITICAL EPSS 0.01
RIOT-OS <2022.10 - Memory Corruption
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.
CWE-131 Apr 24, 2023
CVE-2022-33211 9.8 CRITICAL EPSS 0.00
Modem <unknown> - Memory Corruption
memory corruption in modem due to improper check while calculating size of serialized CoAP message
CWE-131 Apr 13, 2023