CVE & Exploit Intelligence Database
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
709 results
Clear all
CVE-2009-1529
8.1
HIGH
EPSS 0.60
Microsoft Internet Explorer - Use of Uninitialized Resource
CWE-399
Jun 10, 2009
CVE-2009-0949
7.5
HIGH
1 PoC
Analysis
EPSS 0.21
Apple Cups < 1.3.10 - Use of Uninitialized Resource
CWE-908
Jun 09, 2009
CVE-2008-3475
8.8
HIGH
EPSS 0.59
Microsoft Internet Explorer 6 - Uninitialized Memory Corruption
CWE-908
Oct 15, 2008
CVE-2008-4197
8.8
HIGH
EPSS 0.05
Opera Browser < 9.52 - Use of Uninitialized Resource
CWE-908
Sep 27, 2008
CVE-2008-3688
7.5
HIGH
EPSS 0.02
HTTP Antivirus Proxy 0.88 - DoS
CWE-908
Aug 14, 2008
CVE-2008-2934
8.8
HIGH
EPSS 0.06
Apple Mac OS X - Use of Uninitialized Resource
CWE-908
Jul 18, 2008
CVE-2008-0063
7.5
HIGH
EPSS 0.05
MIT Kerberos 5 < 1.6.3 - Use of Uninitialized Resource
CWE-908
Mar 19, 2008
CVE-2008-0081
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.82
Microsoft Excel - Use of Uninitialized Resource
CWE-908
Jan 16, 2008
CVE-2007-1751
EPSS 0.61
Microsoft Internet Explorer - Use of Uninitialized Resource
CWE-908
Jun 12, 2007