CVE & Exploit Intelligence Database

Updated 42m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
107 results Clear all
CVE-2026-27691 6.2 MEDIUM 1 Writeup EPSS 0.00
iccDEV <=2.3.1.4 - Memory Corruption
iccDEV provides a set of libraries and tools for working with ICC color management profiles. In versions up to and including 2.3.1.4, signed integer overflow in iccFromCube.cpp during multiplication triggers undefined behavior, potentially causing crashes or incorrect ICC profile generation when processing crafted/large cube inputs. Commit 43ae18dd69fc70190d3632a18a3af2f3da1e052a fixes the issue. No known workarounds are available.
CWE-190 Feb 25, 2026
CVE-2026-25989 7.5 HIGH EPSS 0.00
ImageMagick <7.1.2-15/6.9.13-40 - DoS
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
CWE-193 Feb 24, 2026
CVE-2026-24856 7.8 HIGH 1 Writeup EPSS 0.00
iccDEV <2.3.1.2 - RCE
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Versions prior to 2.3.1.2 have an undefined behavior issue when floating-point NaN values are converted to unsigned short integer types during ICC profile XML parsing potentially corrupting memory structures and enabling arbitrary code execution. This vulnerability affects users of the iccDEV library who process ICC color profiles. ICC Profile Injection vulnerabilities arise when user-controllable input is incorporated into ICC profile data or other structured binary blobs in an unsafe manner. Version 2.3.1.2 contains a fix for the issue. No known workarounds are available.
CWE-704 Jan 28, 2026
CVE-2025-71002 6.5 MEDIUM EPSS 0.00
Oneflow - Divide By Zero
A floating-point exception (FPE) in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
CWE-681 Jan 28, 2026
CVE-2026-21693 8.8 HIGH EPSS 0.00
Color Iccdev < 2.3.1.2 - Type Confusion
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccSegmentedCurveXml::ToXml()` at `IccXML/IccLibXML/IccMpeXml.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.
CWE-681 Jan 07, 2026
CVE-2026-21688 8.8 HIGH EPSS 0.00
Color Iccdev < 2.3.1.2 - Integer Overflow
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `SIccCalcOp::ArgsPushed()` at `IccProfLib/IccMpeCalc.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.
CWE-190 Jan 07, 2026
CVE-2026-21673 7.8 HIGH 1 Writeup EPSS 0.00
Color Iccdev < 2.3.1.1 - Integer Overflow
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1 and below have overflows and underflows in CIccXmlArrayType::ParseTextCountNum(). This vulnerability affects users of the iccDEV library who process ICC color profiles. This issue is fixed in version 2.3.1.1.
CWE-190 Jan 06, 2026
CVE-2025-10543 5.3 MEDIUM EPSS 0.00
Eclipse Paho Go MQTT v3.1 <=1.5.0 - Buffer Overflow
In Eclipse Paho Go MQTT v3.1 library (paho.mqtt.golang) versions <=1.5.0 UTF-8 encoded strings, passed into the library, may be incorrectly encoded if their length exceeds 65535 bytes. This may lead to unexpected content in packets sent to the server (for example, part of an MQTT topic may leak into the message body in a PUBLISH packet). The issue arises because the length of the data passed in was converted from an int64/int32 (depending upon CPU) to an int16 without checks for overflows. The int16 length was then written, followed by the data (e.g. topic). This meant that when the data (e.g. topic) was over 65535 bytes then the amount of data written exceeds what the length field indicates. This could lead to a corrupt packet, or mean that the excess data leaks into another field (e.g. topic leaks into message body).
CWE-681 Dec 02, 2025
CVE-2025-58063 7.1 HIGH 1 Writeup EPSS 0.00
Coredns < 1.12.4 - Denial of Service
CoreDNS is a DNS server that chains plugins. Starting in version 1.2.0 and prior to version 1.12.4, the CoreDNS etcd plugin contains a TTL confusion vulnerability where lease IDs are incorrectly used as TTL values, enabling DNS cache pinning attacks. This effectively creates a DoS condition for DNS resolution of affected services. The `TTL()` function in `plugin/etcd/etcd.go` incorrectly casts etcd lease IDs (64-bit integers) to uint32 and uses them as TTL values. Large lease IDs become very large TTLs when cast to uint32. This enables cache pinning attacks. Version 1.12.4 contains a fix for the issue.
CWE-681 Sep 09, 2025
CVE-2025-53733 8.4 HIGH EPSS 0.00
Microsoft Office Word - Code Injection
Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CWE-681 Aug 12, 2025
CVE-2025-24059 7.8 HIGH EPSS 0.00
Windows Common Log File System Driver - Privilege Escalation
Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CWE-681 Mar 11, 2025
CVE-2024-49093 8.8 HIGH EPSS 0.01
Windows ReFS - Privilege Escalation
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CWE-681 Dec 12, 2024
CVE-2024-7747 6.5 MEDIUM EPSS 0.00
Wallet for WooCommerce <1.5.6 - Info Disclosure
The Wallet for WooCommerce plugin for WordPress is vulnerable to incorrect conversion between numeric types in all versions up to, and including, 1.5.6. This is due to a numerical logic flaw when transferring funds to another user. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create funds during a transfer and distribute these funds to any number of other users or their own account, rendering products free. Attackers could also request to withdraw funds if the Wallet Withdrawal extension is used and the request is approved by an administrator.
CWE-681 Nov 28, 2024
CVE-2024-38044 7.2 HIGH EPSS 0.05
DHCP Server Service - RCE
DHCP Server Service Remote Code Execution Vulnerability
CWE-681 Jul 09, 2024
CVE-2024-32481 5.3 MEDIUM 1 Writeup EPSS 0.01
Vyper <0.4.0b1 - Info Disclosure
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in version 0.3.8 and prior to version 0.4.0b1, when looping over a `range` of the form `range(start, start + N)`, if `start` is negative, the execution will always revert. This issue is caused by an incorrect assertion inserted by the code generation of the range `stmt.parse_For_range()`. The issue arises when `start` is signed, instead of using `sle`, `le` is used and `start` is interpreted as an unsigned integer for the comparison. If it is a negative number, its 255th bit is set to `1` and is hence interpreted as a very large unsigned integer making the assertion always fail. Any contract having a `range(start, start + N)` where `start` is a signed integer with the possibility for `start` to be negative is affected. If a call goes through the loop while supplying a negative `start` the execution will revert. Version 0.4.0b1 fixes the issue.
CWE-681 Apr 25, 2024
CVE-2024-26162 8.8 HIGH EPSS 0.02
Microsoft Windows 10 1507 < 10.0.10240.20526 - Remote Code Execution
Microsoft ODBC Driver Remote Code Execution Vulnerability
CWE-681 Mar 12, 2024
CVE-2024-1552 7.5 HIGH EPSS 0.00
Firefox < 123, Firefox ESR < 115.8, Thunderbird < 115.8 - Code Inje...
Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
CWE-681 Feb 20, 2024
CVE-2023-28063 6.7 MEDIUM EPSS 0.00
Dell Optiplex 3000 Micro Firmware - Denial of Service
Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
CWE-681 Feb 06, 2024
CVE-2023-46848 8.6 HIGH EPSS 0.10
Squid - DoS
Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
CWE-681 Nov 03, 2023
CVE-2023-5184 7.0 HIGH EPSS 0.00
Zephyr IPM - Buffer Overflow
Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.
CWE-681 Sep 27, 2023