CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,579 CVEs tracked 53,237 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,914 Nuclei templates 37,790 vendors 42,457 researchers
13 results Clear all
CVE-2021-45261 5.5 MEDIUM EPSS 0.00
GNU Patch - Denial of Service
An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.
CWE-763 Dec 22, 2021
CVE-2019-20633 5.5 MEDIUM EPSS 0.00
GNU Patch < 2.7.6 - Double Free
GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.
CWE-415 Mar 25, 2020
CVE-2015-1396 7.5 HIGH EPSS 0.04
GNU patch <2.7.4 - Path Traversal
A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.
CWE-22 Nov 25, 2019
CVE-2018-20969 7.8 HIGH 1 Writeup EPSS 0.00
GNU Patch < 2.7.6 - OS Command Injection
do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
CWE-78 Aug 16, 2019
CVE-2019-13638 7.8 HIGH 1 Writeup EPSS 0.02
GNU patch <2.7.6 - Command Injection
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
CWE-78 Jul 26, 2019
CVE-2019-13636 5.9 MEDIUM 1 Writeup EPSS 0.04
GNU patch <2.7.6 - Info Disclosure
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
CWE-59 Jul 17, 2019
CVE-2018-1000156 7.8 HIGH EPSS 0.37
GNU Patch 2.7.6 - Code Injection
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
CWE-20 Apr 06, 2018
CVE-2018-6952 7.5 HIGH EPSS 0.12
GNU Patch < 2.7.6 - Double Free
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
CWE-415 Feb 13, 2018
CVE-2018-6951 7.5 HIGH EPSS 0.15
GNU Patch < 2.7.6 - NULL Pointer Dereference
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
CWE-476 Feb 13, 2018
CVE-2016-10713 5.5 MEDIUM EPSS 0.00
GNU Patch < 2.7.6 - Memory Corruption
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
CWE-119 Feb 13, 2018
CVE-2015-1395 7.5 HIGH EPSS 0.01
GNU patch <2.7.3 - Path Traversal
Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.
CWE-22 Aug 25, 2017
CVE-2014-9637 5.5 MEDIUM EPSS 0.00
GNU patch <2.7.2 - DoS
GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.
CWE-399 Aug 25, 2017
CVE-2015-1196 EPSS 0.01
GNU patch <2.7.1 - RCE
GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.
CWE-59 Jan 21, 2015