CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
10 results Clear all
CVE-2024-0684 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
GNU Coreutils - Buffer Overflow
A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.
CWE-122 Feb 06, 2024
CVE-2015-4042 9.8 CRITICAL EPSS 0.00
GNU Coreutils < 8.23 - Integer Overflow
Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.
CWE-190 Jan 24, 2020
CVE-2015-4041 7.8 HIGH EPSS 0.00
GNU Coreutils < 8.23 - Out-of-Bounds Write
The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.
CWE-787 Jan 24, 2020
CVE-2017-18018 7.1 HIGH EPSS 0.00
GNU Coreutils < 8.29 - Race Condition
In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.
CWE-362 Jan 04, 2018
CVE-2015-1865 5.1 MEDIUM EPSS 0.00
GNU Coreutils - Race Condition
fts.c in coreutils 8.4 allows local users to delete arbitrary files.
CWE-367 Sep 20, 2017
CVE-2016-2781 4.6 MEDIUM EPSS 0.00
GNU Coreutils - Improper Input Validation
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
CWE-20 Feb 07, 2017
CVE-2014-9471 EPSS 0.08
GNU Coreutils - DoS/Code Injection
The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
Jan 16, 2015
CVE-2009-4135 EPSS 0.00
GNU coreutils <8.1 - Privilege Escalation
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
CWE-59 Dec 11, 2009
CVE-2008-1946 EPSS 0.00
GNU coreutils 5.2.1 - Privilege Escalation
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
CWE-264 Jul 28, 2008
CVE-2005-1039 EPSS 0.00
Core Utilities <5.2.1 - Privilege Escalation
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.
May 02, 2005