CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
160 results Clear all
CVE-2022-25731 7.5 HIGH EPSS 0.00
Qualcomm Mdm9205 Firmware - Information Disclosure
Information disclosure in modem due to buffer over-read while processing packets from DNS server
CWE-125 Apr 13, 2023
CVE-2023-20627 6.7 MEDIUM EPSS 0.00
Google Android - Out-of-Bounds Access
In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629585; Issue ID: ALPS07629585.
CWE-131 Mar 07, 2023
CVE-2023-1175 6.6 MEDIUM 1 Writeup EPSS 0.00
vim <9.0.1378 - Buffer Overflow
Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
CWE-131 Mar 04, 2023
CVE-2023-0568 7.5 HIGH EPSS 0.00
PHP 8.0.X-8.2.X - Memory Corruption
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
CWE-131 Feb 16, 2023
CVE-2022-4378 7.8 HIGH EPSS 0.00
Linux Kernel - Memory Corruption
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CWE-131 Jan 05, 2023
CVE-2022-32651 6.7 MEDIUM EPSS 0.00
Google Android - Use After Free
In mtk-aie, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07225857; Issue ID: ALPS07225857.
CWE-131 Jan 03, 2023
CVE-2022-32650 6.7 MEDIUM EPSS 0.00
Google Android - Use After Free
In mtk-isp, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07225853; Issue ID: ALPS07225853.
CWE-131 Jan 03, 2023
CVE-2022-32649 6.7 MEDIUM EPSS 0.00
Google Android - Use After Free
In jpeg, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07225840; Issue ID: ALPS07225840.
CWE-131 Jan 03, 2023
CVE-2022-32630 6.7 MEDIUM EPSS 0.00
Google Android - Out-of-Bounds Access
In throttling, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405966; Issue ID: ALPS07405966.
CWE-131 Dec 05, 2022
CVE-2022-32624 6.7 MEDIUM EPSS 0.00
Google Android - Out-of-Bounds Access
In throttling, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405923; Issue ID: ALPS07405923.
CWE-131 Dec 05, 2022
CVE-2022-41907 4.8 MEDIUM 1 Writeup EPSS 0.00
TensorFlow - Buffer Overflow
TensorFlow is an open source platform for machine learning. When `tf.raw_ops.ResizeNearestNeighborGrad` is given a large `size` input, it overflows. We have patched the issue in GitHub commit 00c821af032ba9e5f5fa3fe14690c8d28a657624. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
CWE-131 Nov 18, 2022
CVE-2022-41887 4.8 MEDIUM 1 Writeup EPSS 0.00
TensorFlow - Info Disclosure
TensorFlow is an open source platform for machine learning. `tf.keras.losses.poisson` receives a `y_pred` and `y_true` that are passed through `functor::mul` in `BinaryOp`. If the resulting dimensions overflow an `int32`, TensorFlow will crash due to a size mismatch during broadcast assignment. We have patched the issue in GitHub commit c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1 and 2.9.3, as these are also affected and still in supported range. However, we will not cherrypick this commit into TensorFlow 2.8.x, as it depends on Eigen behavior that changed between 2.8 and 2.9.
CWE-131 Nov 18, 2022
CVE-2022-41886 4.8 MEDIUM 1 Writeup EPSS 0.00
TensorFlow - Buffer Overflow
TensorFlow is an open source platform for machine learning. When `tf.raw_ops.ImageProjectiveTransformV2` is given a large output shape, it overflows. We have patched the issue in GitHub commit 8faa6ea692985dbe6ce10e1a3168e0bd60a723ba. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
CWE-131 Nov 18, 2022
CVE-2022-41885 4.8 MEDIUM 1 Writeup EPSS 0.00
TensorFlow - Memory Corruption
TensorFlow is an open source platform for machine learning. When `tf.raw_ops.FusedResizeAndPadConv2D` is given a large tensor shape, it overflows. We have patched the issue in GitHub commit d66e1d568275e6a2947de97dca7a102a211e01ce. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
CWE-131 Nov 18, 2022
CVE-2022-31630 6.5 MEDIUM EPSS 0.00
PHP <7.4.33, 8.0.25, 8.1.12 - Memory Corruption
In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information. 
CWE-190 Nov 14, 2022
CVE-2022-32618 6.8 MEDIUM EPSS 0.00
Google Android - Out-of-Bounds Access
In typec, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262454; Issue ID: ALPS07262454.
CWE-131 Nov 08, 2022
CVE-2022-32617 6.8 MEDIUM EPSS 0.00
Google Android - Out-of-Bounds Access
In typec, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262364; Issue ID: ALPS07262364.
CWE-131 Nov 08, 2022
CVE-2022-39377 7.0 HIGH EPSS 0.01
Sysstat < 12.6.1 - Remote Code Execution
sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, allocate_structures contains a size_t overflow in sa_common.c. The allocate_structures function insufficiently checks bounds before arithmetic multiplication, allowing for an overflow in the size allocated for the buffer representing system activities. This issue may lead to Remote Code Execution (RCE). This issue has been patched in version 12.7.1.
CWE-131 Nov 08, 2022
CVE-2022-43945 7.5 HIGH EPSS 0.00
Linux kernel <5.19.17,6.0.2 - Buffer Overflow
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-131 Nov 04, 2022
CVE-2022-26474 6.7 MEDIUM EPSS 0.00
Sensorhub - Local Privilege Escalation
In sensorhub, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07129717; Issue ID: ALPS07129717.
CWE-131 Oct 07, 2022