CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
1,560 results Clear all
CVE-2023-39978 3.3 LOW 1 Writeup EPSS 0.00
Imagemagick < 6.9.12-91 - Memory Leak
ImageMagick before 6.9.12-91 allows attackers to cause a denial of service (memory consumption) in Magick::Draw.
CWE-401 Aug 08, 2023
CVE-2023-32247 7.5 HIGH EPSS 0.00
Linux Kernel < 5.15.145 - Memory Leak
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
CWE-401 Jul 24, 2023
CVE-2023-25399 5.5 MEDIUM EPSS 0.00
Scipy < 1.10.0 - Memory Leak
A refcounting issue which leads to potential memory leak was discovered in scipy commit 8627df31ab in Py_FindObjects() function. Note: This is disputed as a bug and not a vulnerability. SciPy is not designed to be exposed to untrusted users or data directly.
CWE-401 Jul 05, 2023
CVE-2023-34451 8.2 HIGH EPSS 0.00
Cometbft < 0.34.29 - Memory Leak
CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine and replicates it on many machines. The mempool maintains two data structures to keep track of outstanding transactions: a list and a map. These two data structures are supposed to be in sync all the time in the sense that the map tracks the index (if any) of the transaction in the list. In `v0.37.0`, and `v0.37.1`, as well as in `v0.34.28`, and all previous releases of the CometBFT repo2, it is possible to have them out of sync. When this happens, the list may contain several copies of the same transaction. Because the map tracks a single index, it is then no longer possible to remove all the copies of the transaction from the list. This happens even if the duplicated transaction is later committed in a block. The only way to remove the transaction is by restarting the node. The above problem can be repeated on and on until a sizable number of transactions are stuck in the mempool, in order to try to bring down the target node. The problem is fixed in releases `v0.34.29` and `v0.37.2`. Some workarounds are available. Increasing the value of `cache_size` in `config.toml` makes it very difficult to effectively attack a full node. Not exposing the transaction submission RPC's would mitigate the probability of a successful attack, as the attacker would then have to create a modified (byzantine) full node to be able to perform the attack via p2p.
CWE-401 Jul 03, 2023
CVE-2023-34450 3.7 LOW EPSS 0.00
Cometbft < 0.34.29 - Memory Leak
CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine and replicates it on many machines. An internal modification made in versions 0.34.28 and 0.37.1 to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places. The first is via logs, setting the `consensus` logging module to "debug" level (should not happen in production), and setting the log output format to JSON. The second is via RPC `dump_consensus_state`. Case 1, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node. In case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded. The theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated. As the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with two nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that "for" loop to never be reached). This regression was fixed in versions 0.34.29 and 0.37.2. Some workarounds are available. For case 1 (hitting the deadlock via logs), either don't set the log output to "json", leave at "plain", or don't set the consensus logging module to "debug", leave it at "info" or higher. For case 2 (hitting the deadlock via RPC `dump_consensus_state`), do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in one's nginx setup).
CWE-770 Jul 03, 2023
CVE-2023-2683 5.3 MEDIUM EPSS 0.00
EFR32 Bluetooth LE <5.1.1 - Memory Corruption
A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error.
CWE-401 Jun 15, 2023
CVE-2023-2602 3.3 LOW EPSS 0.00
libcap - Memory Corruption
A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
CWE-401 Jun 06, 2023
CVE-2023-33460 6.5 MEDIUM EPSS 0.00
yajl 2.1.0 - Memory Corruption
There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash.
CWE-401 Jun 06, 2023
CVE-2023-33717 5.5 MEDIUM 1 Writeup EPSS 0.00
mp4v2 <2.1.3 - Memory Corruption
mp4v2 v2.1.3 was discovered to contain a memory leak when a method calling MP4File::ReadBytes() had allocated memory but did not catch exceptions thrown by ReadBytes()
CWE-401 Jun 02, 2023
CVE-2023-33719 5.5 MEDIUM 1 Writeup EPSS 0.00
mp4v2 <2.1.3 - Memory Corruption
mp4v2 v2.1.3 was discovered to contain a memory leak via MP4SdpAtom::Read() at atom_sdp.cpp
CWE-401 Jun 01, 2023
CVE-2023-33716 5.5 MEDIUM EPSS 0.00
mp4v2 <2.1.3 - Memory Corruption
mp4v2 v2.1.3 was discovered to contain a memory leak via the class MP4StringProperty at mp4property.cpp.
CWE-401 Jun 01, 2023
CVE-2023-33718 8.8 HIGH EPSS 0.00
mp4v2 <2.1.3 - Memory Corruption
mp4v2 v2.1.3 was discovered to contain a memory leak via MP4File::ReadString() at mp4file_io.cpp
CWE-401 May 31, 2023
CVE-2023-31517 7.5 HIGH EPSS 0.00
Teeworlds <0.7.5 - DoS
A memory leak in the component CConsole::Chain of Teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via opening a crafted file.
CWE-401 May 23, 2023
CVE-2023-2700 5.5 MEDIUM 1 Writeup EPSS 0.00
Redhat Libvirt - Memory Leak
A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.
CWE-401 May 15, 2023
CVE-2023-2618 5.3 MEDIUM EPSS 0.00
OpenCV wechat_qrcode <4.7.0 - Memory Leak
A vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548.
CWE-401 May 10, 2023
CVE-2021-31240 7.8 HIGH EPSS 0.00
Libming - Memory Leak
An issue found in libming v.0.4.8 allows a local attacker to execute arbitrary code via the parseSWF_IMPORTASSETS function in the parser.c file.
CWE-401 May 09, 2023
CVE-2023-31973 5.5 MEDIUM EPSS 0.00
yasm <1.3.0 - Use After Free
yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
CWE-401 May 09, 2023
CVE-2023-31975 3.3 LOW EPSS 0.00
yasm <1.3.0 - Memory Corruption
yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
CWE-401 May 09, 2023
CVE-2023-29163 7.5 HIGH EPSS 0.00
TMM - DoS
When UDP profile with idle timeout set to immediate or the value 0 is configured on a virtual server, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-401 May 03, 2023
CVE-2023-21666 8.4 HIGH EPSS 0.00
Graphics - Buffer Overflow
Memory Corruption in Graphics while accessing a buffer allocated through the graphics pool.
CWE-401 May 02, 2023