CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
373 results Clear all
CVE-2026-0400 4.9 MEDIUM EPSS 0.00
SonicOS - Format String DoS
A post-authentication Format String vulnerability in SonicOS allows a remote attacker to crash a firewall.
CWE-134 Feb 24, 2026
CVE-2025-30269 8.1 HIGH EPSS 0.00
Qsync Central <5.0.0.4 - Memory Corruption
A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later
CWE-134 Feb 11, 2026
CVE-2025-64157 6.7 MEDIUM EPSS 0.00
Fortinet Fortios < 7.4.10 - Format String Vulnerability
A use of externally-controlled format string vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0 all versions allows an authenticated admin to execute unauthorized code or commands via specifically crafted configuration.
CWE-134 Feb 10, 2026
CVE-2026-21640 2.7 LOW EPSS 0.00
Aquaplatform Revive Adserver < 6.0.4 - Format String Vulnerability
HackerOne community member Faraz Ahmed (PakCyberbot) has reported a format string injection in the Revive Adserver settings. When specific character combinations are used in a setting, the admin user console could be disabled due to a fatal PHP error.
CWE-134 Jan 20, 2026
CVE-2025-68949 5.3 MEDIUM 1 Writeup EPSS 0.00
n8n <2.2.0 - Info Disclosure
n8n is an open source workflow automation platform. From 1.36.0 to before 2.2.0, the Webhook node’s IP whitelist validation performed partial string matching instead of exact IP comparison. As a result, an incoming request could be accepted if the source IP address merely contained the configured whitelist entry as a substring. This issue affected instances where workflow editors relied on IP-based access controls to restrict webhook access. Both IPv4 and IPv6 addresses were impacted. An attacker with a non-whitelisted IP could bypass restrictions if their IP shared a partial prefix with a trusted address, undermining the intended security boundary. This vulnerability is fixed in 2.2.0.
CWE-284 Jan 13, 2026
CVE-2026-22190 7.5 HIGH EPSS 0.00
CMU Panda3d < 1.10.16 - Format String Vulnerability
Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.
CWE-134 Jan 07, 2026
CVE-2025-53591 6.5 MEDIUM EPSS 0.00
QNAP OS - Info Disclosure
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3256 build 20250913 and later QuTS hero h5.2.7.3256 build 20250913 and later QuTS hero h5.3.1.3250 build 20250912 and later
CWE-134 Jan 02, 2026
CVE-2023-53966 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
SOUND4 LinkAndShare Transmitter 1.1.2 - Memory Corruption
SOUND4 LinkAndShare Transmitter 1.1.2 contains a format string vulnerability that allows attackers to trigger memory stack overflows through maliciously crafted environment variables. Attackers can manipulate the username environment variable with format string payloads to potentially execute arbitrary code and crash the application.
CWE-134 Dec 22, 2025
CVE-2025-52666 2.7 LOW EPSS 0.00
Revive-adserver Revive Adserver < 5.5.2 - Format String Vulnerability
Improper neutralisation of format characters in the settings of Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes an administrator user to disable the admin user console due to a fatal PHP error.
CWE-134 Nov 20, 2025
CVE-2025-48826 8.8 HIGH EPSS 0.00
Planet WGR-500 <1.3411b190912 - Memory Corruption
A format string vulnerability exists in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to memory corruption. An attacker can send a series of HTTP requests to trigger this vulnerability.
CWE-134 Oct 07, 2025
CVE-2025-53407 6.5 MEDIUM EPSS 0.00
QNAP OS - Info Disclosure
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
CWE-134 Oct 03, 2025
CVE-2025-53406 6.5 MEDIUM EPSS 0.00
QNAP OS - Info Disclosure
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
CWE-134 Oct 03, 2025
CVE-2025-52429 6.5 MEDIUM EPSS 0.00
Qnap Qts - Format String Vulnerability
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
CWE-134 Oct 03, 2025
CVE-2025-48730 6.5 MEDIUM EPSS 0.00
QNAP OS - Info Disclosure
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later
CWE-134 Oct 03, 2025
CVE-2025-36202 7.5 HIGH EPSS 0.00
IBM Webmethods Integration - Format String Vulnerability
IBM webMethods Integration 10.15 and 11.1 could allow an authenticated user with required execute Services to execute commands on the system due to the improper validation of format string strings passed as an argument from an external source.
CWE-134 Sep 22, 2025
CVE-2010-10017 3 PoCs Analysis EPSS 0.08
WM Downloader 3.1.2.2 - Buffer Overflow
WM Downloader version 3.1.2.2 is vulnerable to a buffer overflow when processing a specially crafted .m3u playlist file. The application fails to properly validate input length, allowing an attacker to overwrite structured exception handler (SEH) records and execute arbitrary code. Exploitation occurs locally when a user opens the malicious file, and the payload executes with the privileges of the current user.
CWE-134 Aug 30, 2025
CVE-2025-55298 7.5 HIGH 1 Writeup EPSS 0.00
ImageMagick <6.9.13-28 & <7.1.2 - RCE
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to ImageMagick versions 6.9.13-28 and 7.1.2-2, a format string bug vulnerability exists in InterpretImageFilename function where user input is directly passed to FormatLocaleString without proper sanitization. An attacker can overwrite arbitrary memory regions, enabling a wide range of attacks from heap overflow to remote code execution. This issue has been patched in versions 6.9.13-28 and 7.1.2-2.
CWE-134 Aug 26, 2025
CVE-2011-10029 2 PoCs Analysis EPSS 0.49
Solar FTP Server - DoS
Solar FTP Server fails to properly handle format strings passed to the USER command. When a specially crafted string containing format specifiers is sent, the server crashes due to a read access violation in the __output_1() function of sfsservice.exe. This results in a denial of service (DoS) condition.
CWE-134 Aug 20, 2025
CVE-2012-10055 3 PoCs Analysis EPSS 0.59
ComSndFTP FTP Server <1.3.7 Beta - Code Injection
ComSndFTP FTP Server version 1.3.7 Beta contains a format string vulnerability in its handling of the USER command. By sending a specially crafted username containing format specifiers, a remote attacker can overwrite a hardcoded function pointer in memory (specifically WSACleanup from Ws2_32.dll). This allows the attacker to redirect execution flow and bypass DEP protections using a ROP chain, ultimately leading to arbitrary code execution. The vulnerability is exploitable without authentication and affects default configurations.
CWE-134 Aug 13, 2025
CVE-2025-40600 9.8 CRITICAL EPSS 0.00
Sonicwall Sonicos < 7.3.0-7012 - Format String Vulnerability
Use of Externally-Controlled Format String vulnerability in the SonicOS SSL VPN interface allows a remote unauthenticated attacker to cause service disruption.
CWE-134 Jul 29, 2025