CVE & Exploit Intelligence Database

Updated 23m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
13,470 results Clear all
CVE-2026-3038 7.5 HIGH
rtsock_msg_buffer - Buffer Overflow
The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been validated, but this is not necessarily the case, and it's possible for a malicious userspace program to craft a request which triggers a 127-byte overflow. In practice, this overflow immediately overwrites the canary for the rtsock_msg_buffer() stack frame, resulting in a panic once the function returns. The bug allows an unprivileged user to crash the kernel by triggering a stack buffer overflow in rtsock_msg_buffer(). In particular, the overflow will corrupt a stack canary value that is verified when the function returns; this mitigates the impact of the stack overflow by triggering a kernel panic. Other kernel bugs may exist which allow userspace to find the canary value and thus defeat the mitigation, at which point local privilege escalation may be possible.
CWE-787 Mar 09, 2026
CVE-2025-41766 8.8 HIGH EPSS 0.00
Device - Stack Buffer Overflow
A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.
CWE-787 Mar 09, 2026
CVE-2026-3703 9.8 CRITICAL 1 Writeup EPSS 0.00
Wavlink NU516U1 251208 - Memory Corruption
A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exploit has been published and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
CWE-119 Mar 08, 2026
CVE-2018-25198 6.2 MEDIUM 1 PoC Analysis EPSS 0.00
eToolz 3.4.8.0 - Buffer Overflow
eToolz 3.4.8.0 contains a denial of service vulnerability that allows local attackers to crash the application by supplying oversized input buffers. Attackers can create a payload file containing 255 bytes of data that triggers a buffer overflow condition when processed by the application.
CWE-787 Mar 06, 2026
CVE-2026-28552 6.5 MEDIUM EPSS 0.00
IMS Module - Memory Corruption
Out-of-bounds write vulnerability in the IMS module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-19 Mar 05, 2026
CVE-2026-1678 9.4 CRITICAL EPSS 0.00
Linux Kernel - Buffer Overflow
dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled.
CWE-787 Mar 05, 2026
CVE-2026-3544 8.8 HIGH EPSS 0.00
Google Chrome <145.0.7632.159 - Buffer Overflow
Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
CWE-787 Mar 04, 2026
CVE-2026-3537 8.8 HIGH EPSS 0.00
Google Chrome Android <145.0.7632.159 - Memory Corruption
Object lifecycle issue in PowerVR in Google Chrome on Android prior to 145.0.7632.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
CWE-787 Mar 04, 2026
CVE-2026-20023 6.1 MEDIUM EPSS 0.00
Cisco ASA/FTD - Memory Corruption
A vulnerability in the OSPF protocol of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to corrupt memory on an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to memory corruption when parsing OSPF protocol packets. An attacker could exploit this vulnerability by sending crafted OSPF packets to an affected device. A successful exploit could allow the attacker to cause memory corruption causing the affected device to reboot, resulting in a DoS condition.
CWE-787 Mar 04, 2026
CVE-2026-20067 5.8 MEDIUM EPSS 0.00
Cisco Snort 3 - DoS
Multiple Cisco products are affected by a vulnerability in the Snort 3 detection engine that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart, resulting in an interruption of packet inspection.&nbsp; This vulnerability is due to incomplete error checking when parsing the Multicast DNS fields of the HTTP header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection to be parsed by Snort 3. A successful exploit could allow the attacker to cause a DoS condition when the Snort 3 Detection Engine unexpectedly restarts.
CWE-787 Mar 04, 2026
CVE-2026-3094 7.8 HIGH EPSS 0.00
Delta Electronics CNCSoft-G2 - Code Injection
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
CWE-787 Mar 04, 2026
CVE-2026-27622 7.8 HIGH EPSS 0.00
OpenEXR - Memory Corruption
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector<unsigned int> total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32. overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6.
CWE-787 Mar 03, 2026
CVE-2025-70240 9.8 CRITICAL 1 Writeup EPSS 0.00
D-Link DIR-513 v1.10 - Buffer Overflow
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard51.
CWE-121 Mar 03, 2026
CVE-2025-70239 9.8 CRITICAL 1 Writeup EPSS 0.00
D-Link DIR-513 v1.10 - Buffer Overflow
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard55.
CWE-121 Mar 03, 2026
CVE-2025-70234 9.8 CRITICAL 1 Writeup EPSS 0.00
D-Link DIR-513 v1.10 - Buffer Overflow
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetQoS.
CWE-121 Mar 03, 2026
CVE-2026-29022 7.3 HIGH 1 Writeup EPSS 0.00
dr_libs <=0.14.4 - Memory Corruption
dr_libs version 0.14.4 and earlier (fixed in commit 8a7258c) contain a heap buffer overflow vulnerability in the drwav__read_smpl_to_metadata_obj() function of dr_wav.h that allows memory corruption via crafted WAV files. Attackers can exploit a mismatch between sampleLoopCount validation in pass 1 and unconditional processing in pass 2 to overflow heap allocations with 36 bytes of attacker-controlled data through any drwav_init_*_with_metadata() call on untrusted input.
CWE-122 Mar 03, 2026
CVE-2025-70241 9.8 CRITICAL 1 Writeup EPSS 0.00
D-Link DIR-513 v1.10 - Buffer Overflow
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWANType_Wizard5.
CWE-121 Mar 03, 2026
CVE-2025-70237 9.8 CRITICAL 1 Writeup EPSS 0.00
D-Link DIR-513 v1.10 - Buffer Overflow
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetPortTr.
CWE-121 Mar 03, 2026
CVE-2025-70236 9.8 CRITICAL 1 Writeup EPSS 0.00
D-Link DIR-513 v1.10 - Buffer Overflow
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDomainFilter.
CWE-787 Mar 03, 2026
CVE-2025-66945 9.1 CRITICAL 1 Writeup EPSS 0.00
Zdir Pro 4.x - Path Traversal
A path traversal vulnerability exists in the ZIP extraction API of Zdir Pro 4.x. When a crafted ZIP archive is processed by the backend at /api/extract, files may be written outside the intended directory, leading to arbitrary file overwrite and potentially remote code execution
CWE-787 Mar 03, 2026