CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
2,947 results Clear all
CVE-2005-1141 9.8 CRITICAL EPSS 0.14
GOCR 0.40 - RCE
Integer overflow in the readpgm function in pnm.c for GOCR 0.40, when using the netpbm library, allows remote attackers to execute arbitrary code via a PNM file with large width and height values, which leads to a heap-based buffer overflow.
CWE-190 Apr 15, 2005
CVE-2005-0102 9.8 CRITICAL EPSS 0.01
Gnome Evolution < 2.0.2 - Integer Overflow
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
CWE-190 Jan 24, 2005
CVE-2004-2013 7.8 HIGH EPSS 0.00
Linux Kernel < 2.4.25 - Integer Overflow
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
CWE-190 Dec 31, 2004
CVE-2004-0788 EPSS 0.13
gdk-pixbuf <0.22 - DoS
Integer overflow in the ICO image decoder for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted ICO file.
CWE-190 Oct 20, 2004
CVE-2004-0657 EPSS 0.05
NTPd <4.0 - Buffer Overflow
Integer overflow in the NTP daemon (NTPd) before 4.0 causes the NTP server to return the wrong date/time offset when a client requests a date/time that is more than 34 years away from the server's time.
CWE-190 Aug 06, 2004
CVE-2002-0391 9.8 CRITICAL EPSS 0.08
Freebsd < 4.6.1 - Integer Overflow
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.
CWE-190 Aug 12, 2002
CVE-2002-0639 9.8 CRITICAL EPSS 0.34
Openbsd Openssh < 3.3 - Integer Overflow
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
CWE-190 Jul 03, 2002