CVE & Exploit Intelligence Database

Updated 23m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
11,836 results Clear all
CVE-2026-3288 8.8 HIGH
ingress-nginx - Code Injection
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20 Mar 09, 2026
CVE-2025-14558 7.2 HIGH 4 PoCs Analysis EPSS 0.14
FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
The rtsol(8) and rtsold(8) programs do not validate the domain search list options provided in router advertisement messages; the option body is passed to resolvconf(8) unmodified. resolvconf(8) is a shell script which does not validate its input. A lack of quoting meant that shell commands pass as input to resolvconf(8) may be executed.
CWE-20 Mar 09, 2026
CVE-2026-24713 EPSS 0.00
Apache IoTDB 1.0.0-1.3.6/2.0.0-2.0.6 - Input Validation
Improper Input Validation vulnerability in Apache IoTDB. This issue affects Apache IoTDB: from 1.0.0 before 1.3.7, from 2.0.0 before 2.0.7. Users are recommended to upgrade to version 1.3.7 or 2.0.7, which fixes the issue.
CWE-20 Mar 09, 2026
CVE-2025-69279 7.5 HIGH EPSS 0.00
nr modem - DoS
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
CWE-20 Mar 09, 2026
CVE-2025-69278 7.5 HIGH EPSS 0.00
nr modem - DoS
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
CWE-20 Mar 09, 2026
CVE-2025-61616 7.5 HIGH EPSS 0.00
nr modem - DoS
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
CWE-20 Mar 09, 2026
CVE-2025-61615 7.5 HIGH EPSS 0.00
nr modem - DoS
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
CWE-20 Mar 09, 2026
CVE-2025-61614 7.5 HIGH EPSS 0.00
nr modem - DoS
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
CWE-20 Mar 09, 2026
CVE-2025-61613 7.5 HIGH EPSS 0.00
nr modem - DoS
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
CWE-20 Mar 09, 2026
CVE-2025-61612 7.5 HIGH EPSS 0.00
nr modem - DoS
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
CWE-20 Mar 09, 2026
CVE-2025-61611 7.5 HIGH EPSS 0.00
Modem - DoS
In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed..
CWE-20 Mar 09, 2026
CVE-2026-29791 4.9 MEDIUM EPSS 0.00
Agentgateway <0.12.0 - Command Injection
Agentgateway is an open source data plane for agentic AI connectivity within or across any agent framework or environment. Prior to version 0.12.0, when converting MCP tools/call request to OpenAPI request, input path, query, and header values are not sanitized. This issue has been patched in version 0.12.0.
CWE-20 Mar 06, 2026
CVE-2026-29046 1 Writeup EPSS 0.00
TinyWeb <2.04 - Command Injection
TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.04, TinyWeb accepts request header values and later maps them into CGI environment variables (HTTP_*). The parser did not strictly reject dangerous control characters in header lines and header values, including CR, LF, and NUL, and did not consistently defend against encoded forms such as %0d, %0a, and %00. This can enable header value confusion across parser boundaries and may create unsafe data in the CGI execution context. This issue has been patched in version 2.04.
CWE-20 Mar 06, 2026
CVE-2026-0848 10.0 CRITICAL EPSS 0.00
NLTK <=3.9.2 - Code Injection
NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply or replace the JAR file, enabling the execution of arbitrary Java bytecode at import time. This vulnerability can be exploited through methods such as model poisoning, MITM attacks, or dependency poisoning, leading to remote code execution. The issue arises from the direct execution of the JAR file via subprocess with unvalidated classpath input, allowing malicious classes to execute when loaded by the JVM.
CWE-20 Mar 05, 2026
CVE-2025-7375 6.5 MEDIUM EPSS 0.00
Omada EAP610 <1.6.0 - DoS
A denial-of-service (DoS) vulnerability was identified in Omada EAP610 v3. An attacker with adjacent network access can send crafted requests to cause the device’s HTTP service to crash. This results in temporary service unavailability until the device is rebooted. This issue affects Omada EAP610 firmware versions prior to 1.6.0.
CWE-20 Mar 05, 2026
CVE-2025-11143 3.7 LOW EPSS 0.00
Jetty - Auth Bypass
The Jetty URI parser has some key differences to other common parsers when evaluating invalid or unusual URIs. Differential parsing of URIs in systems using multiple components may result in security by-pass. For example a component that enforces a black list may interpret the URIs differently from one that generates a response. At the very least, differential parsing may divulge implementation details.
CWE-20 Mar 05, 2026
CVE-2025-41257 4.8 MEDIUM 1 Writeup EPSS 0.00
Suprema BioStar 2 2.9.11.6 - Auth Bypass
Suprema’s BioStar 2 in version 2.9.11.6 allows users to set new password without providing the current one. Exploiting this flaw combined with other vulnerabilities can lead to unauthorized account access and potential system compromise.
CWE-20 Mar 04, 2026
CVE-2026-3545 9.6 CRITICAL EPSS 0.00
Google Chrome <145.0.7632.159 - Sandbox Escape
Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-20 Mar 04, 2026
CVE-2026-20020 6.8 MEDIUM EPSS 0.00
Cisco Secure Firewall ASA/FTD - DoS
A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. If OSPF authentication is enabled, the attacker must know the secret key to exploit this vulnerability. This vulnerability is due to insufficient input validation when processing OSPF update packets. An attacker could exploit this vulnerability by sending crafted OSPF update packets. A successful exploit could allow the attacker to create a buffer overflow, causing the affected device to reload, resulting in a DoS condition.
CWE-20 Mar 04, 2026
CVE-2026-27443 7.5 HIGH EPSS 0.00
SEPPmail Secure Email Gateway <15.0.1 - Auth Bypass
SEPPmail Secure Email Gateway before version 15.0.1 does not properly sanitize the headers from S/MIME protected MIME entities, allowing an attacker to control trusted headers.
CWE-20 Mar 04, 2026