CVE & Exploit Intelligence Database

Updated 48m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,613 CVEs tracked 53,239 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,918 Nuclei templates 37,790 vendors 42,464 researchers
163 results Clear all
CVE-2017-1000381 7.5 HIGH EPSS 0.01
c-ares - Memory Corruption
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
CWE-200 Jul 07, 2017
CVE-2016-9843 9.8 CRITICAL 1 Writeup EPSS 0.08
zlib 1.2.8 - Info Disclosure
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
May 23, 2017
CVE-2016-9842 8.8 HIGH 1 Writeup EPSS 0.12
zlib 1.2.8 - Info Disclosure
The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
CWE-1335 May 23, 2017
CVE-2016-9841 9.8 CRITICAL 1 Writeup EPSS 0.20
zlib <1.2.8 - Info Disclosure
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
May 23, 2017
CVE-2016-9840 8.8 HIGH 1 Writeup EPSS 0.13
zlib <1.2.8 - Info Disclosure
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
May 23, 2017
CVE-2016-7055 5.9 MEDIUM EPSS 0.03
OpenSSL <1.1.0c - Info Disclosure
There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.
May 04, 2017
CVE-2017-3732 5.9 MEDIUM EPSS 0.08
OpenSSL <1.0.2k, 1.1.0<1.1.0d - Memory Corruption
There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.
CWE-200 May 04, 2017
CVE-2017-3731 7.5 HIGH EPSS 0.10
OpenSSL <1.1.0/1.0.2 - Use After Free
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
CWE-125 May 04, 2017
CVE-2015-8860 7.5 HIGH EPSS 0.00
Nodejs Node.js < 1.8.4 - Symlink Following
The tar package before 2.0.0 for Node.js allows remote attackers to write to arbitrary files via a symlink attack in an archive.
CWE-59 Jan 23, 2017
CVE-2015-8855 7.5 HIGH EPSS 0.01
Nodejs Node.js < 4.3.1 - Resource Management Error
The semver package before 4.3.2 for Node.js allows attackers to cause a denial of service (CPU consumption) via a long version string, aka a "regular expression denial of service (ReDoS)."
CWE-399 Jan 23, 2017
CVE-2014-9772 6.1 MEDIUM EPSS 0.00
Validator <2.0.0 - XSS
The validator package before 2.0.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via hex-encoded characters.
CWE-79 Jan 23, 2017
CVE-2013-7454 6.1 MEDIUM EPSS 0.00
Node.js <1.1.0 - XSS
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via nested forbidden strings.
CWE-79 Jan 23, 2017
CVE-2013-7453 6.1 MEDIUM EPSS 0.00
Validator <1.1.0 - XSS
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.
CWE-79 Jan 23, 2017
CVE-2013-7452 6.1 MEDIUM EPSS 0.01
Validator <1.1.0 - XSS
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.
CWE-79 Jan 23, 2017
CVE-2013-7451 6.1 MEDIUM EPSS 0.01
Validator <1.1.0 - XSS
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag.
CWE-79 Jan 23, 2017
CVE-2016-7099 5.9 MEDIUM EPSS 0.01
Node.js <4.6.0 - Man-in-the-Middle Attack
The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
CWE-19 Oct 10, 2016
CVE-2016-5325 6.1 MEDIUM EPSS 0.01
Node.js <6.7.0 - CRLF Injection
CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.
CWE-113 Oct 10, 2016
CVE-2016-5180 9.8 CRITICAL 3 PoCs Analysis EPSS 0.18
C-ares < 0.10.48 - Out-of-Bounds Write
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
CWE-787 Oct 03, 2016
CVE-2016-7052 7.5 HIGH EPSS 0.08
Novell Suse Linux Enterprise Module F... - NULL Pointer Dereference
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
CWE-476 Sep 26, 2016
CVE-2016-6306 5.9 MEDIUM EPSS 0.08
OpenSSL <1.0.1u, <1.0.2i - DoS
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
CWE-125 Sep 26, 2016