CVE & Exploit Intelligence Database

Updated 48m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,613 CVEs tracked 53,239 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,918 Nuclei templates 37,790 vendors 42,464 researchers
163 results Clear all
CVE-2016-6304 7.5 HIGH EPSS 0.28
OpenSSL <1.0.1u, <1.0.2i, <1.1.0a - DoS
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
CWE-401 Sep 26, 2016
CVE-2016-5172 6.5 MEDIUM EPSS 0.01
Google Chrome < 53.0.2785.101 - Information Disclosure
The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.
CWE-200 Sep 25, 2016
CVE-2016-6303 9.8 CRITICAL EPSS 0.29
OpenSSL <1.1.0 - DoS
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
CWE-787 Sep 16, 2016
CVE-2016-2183 7.5 HIGH 2 PoCs Analysis EPSS 0.40
Redhat Jboss Enterprise Application Platform - Information Disclosure
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
CWE-200 Sep 01, 2016
CVE-2016-3956 7.5 HIGH EPSS 0.03
npm <2.15.1,3.x <3.8.3 - Info Disclosure
The CLI in npm before 2.15.1 and 3.x before 3.8.3, as used in Node.js 0.10 before 0.10.44, 0.12 before 0.12.13, 4 before 4.4.2, and 5 before 5.10.0, includes bearer tokens with arbitrary requests, which allows remote HTTP servers to obtain sensitive information by reading Authorization headers.
CWE-200 Jul 02, 2016
CVE-2016-2178 5.5 MEDIUM EPSS 0.00
Openssl < 0.10.47 - Information Disclosure
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
CWE-203 Jun 20, 2016
CVE-2016-1669 8.8 HIGH 1 PoC Analysis EPSS 0.02
Google V8 <5.0.71.47 - Buffer Overflow
The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
CWE-119 May 14, 2016
CVE-2016-2107 5.9 MEDIUM 3 PoCs Analysis EPSS 0.83
Redhat Enterprise Linux Desktop < 1.0.1s - Information Disclosure
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
CWE-310 May 05, 2016
CVE-2016-2105 7.5 HIGH EPSS 0.45
Redhat Enterprise Linux Desktop < 5.6.30 - Integer Overflow
Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
CWE-190 May 05, 2016
CVE-2016-2216 7.5 HIGH EPSS 0.02
Nodejs Node.js - Improper Input Validation
The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.
CWE-20 Apr 07, 2016
CVE-2016-2086 7.5 HIGH EPSS 0.00
Nodejs Node.js - Improper Input Validation
Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
CWE-20 Apr 07, 2016
CVE-2016-0797 7.5 HIGH EPSS 0.36
OpenSSL <1.0.1s-1.0.2g - DoS
Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
Mar 03, 2016
CVE-2016-0702 5.1 MEDIUM 1 PoC Analysis EPSS 0.00
OpenSSL <1.0.1s-1.0.2g - Info Disclosure
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
CWE-200 Mar 03, 2016
CVE-2015-8027 7.5 HIGH EPSS 0.01
Node.js <0.12.9, <4.2.3, <5.1.1 - DoS
Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request.
CWE-17 Jan 02, 2016
CVE-2015-3194 7.5 HIGH 1 PoC Analysis EPSS 0.58
OpenSSL <1.0.1q, <1.0.2e - DoS
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
CWE-476 Dec 06, 2015
CVE-2015-3193 7.5 HIGH EPSS 0.26
OpenSSL 1.0.2 - Info Disclosure
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.
CWE-200 Dec 06, 2015
CVE-2015-6764 9.8 CRITICAL EPSS 0.14
Google Chrome < 46.0.2490.86 - Memory Corruption
The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.
CWE-119 Dec 06, 2015
CVE-2015-5380 EPSS 0.01
Google V8 <0.12.6, io.js <1.8.3, 2.x <2.3.3 - Memory Corruption
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
CWE-119 Jul 09, 2015
CVE-2015-0278 EPSS 0.02
libuv <0.10.34 - Privilege Escalation
libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attackers to gain privileges via unspecified vectors.
CWE-273 May 18, 2015
CVE-2014-7191 EPSS 0.01
Node.js <1.0.0 - DoS
The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.
CWE-399 Oct 19, 2014