CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
13,514 results Clear all
CVE-2026-0536 7.8 HIGH EPSS 0.00
Autodesk 3ds Max < 2026.3.2 - Out-of-Bounds Write
A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CWE-787 Feb 04, 2026
CVE-2026-0661 7.8 HIGH EPSS 0.00
Autodesk 3ds Max < 2026.3.2 - Out-of-Bounds Write
A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CWE-787 Feb 04, 2026
CVE-2026-0659 7.8 HIGH EPSS 0.00
Autodesk Arnold/Autodesk 3ds Max - RCE
A maliciously crafted USD file, when loaded or imported into Autodesk Arnold or Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CWE-787 Feb 04, 2026
CVE-2026-0538 7.8 HIGH EPSS 0.00
Autodesk 3ds Max < 2026.3.2 - Out-of-Bounds Write
A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CWE-787 Feb 04, 2026
CVE-2026-0537 7.8 HIGH EPSS 0.00
Autodesk 3ds Max < 2026.3.2 - Out-of-Bounds Write
A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CWE-787 Feb 04, 2026
CVE-2026-1861 8.8 HIGH EPSS 0.00
Google Chrome <144.0.7559.132 - Buffer Overflow
Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-122 Feb 03, 2026
CVE-2025-62799 9.8 CRITICAL 1 Writeup EPSS 0.00
Fast DDS <3.4.1-2.6.11 - Buffer Overflow
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption ( RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
CWE-787 Feb 03, 2026
CVE-2025-62602 7.5 HIGH 1 Writeup EPSS 0.00
Fast DDS <3.4.1, <3.3.1, <2.6.11 - Buffer Overflow
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage are tampered with — specially `readOctetVector` reads an unchecked `vecsize` that is propagated unchanged into `readData` as the `length` parameter — the attacker-contro lled `vecsize` can trigger a 32-bit integer overflow during the `length` calculation. That overflow can cause large alloca tion attempt that quickly leads to OOM, enabling a remotely-triggerable denial-of-service and remote process termination. Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
CWE-787 Feb 03, 2026
CVE-2025-62601 7.5 HIGH 1 Writeup EPSS 0.00
Fast DDS <3.4.1, <3.3.1, <2.6.11 - Buffer Overflow
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage — specifically by tampering with the `str_size` value read by `readString` (called from `readBinaryProperty`) — are modified, a 32-bit integer overflow can occur, causing `std::vector::resize` to use an attacker-controlled size and quickly trigger heap buffer overflow and remote process term ination. Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
CWE-787 Feb 03, 2026
CVE-2026-25502 7.8 HIGH 1 Writeup EPSS 0.00
Color Iccdev < 2.3.1.2 - Out-of-Bounds Write
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC profiles, allows potential arbitrary code execution through crafted NamedColor2 tags. This issue has been patched in version 2.3.1.2.
CWE-121 Feb 03, 2026
CVE-2026-1788 1 Writeup EPSS 0.00
Xquic Server <1.8.3 - Buffer Overflow
: Out-of-bounds Write vulnerability in Xquic Project Xquic Server xquic on Linux (QUIC protocol implementation, packet processing module modules) allows : Buffer Manipulation.This issue affects Xquic Server: through 1.8.3.
CWE-787 Feb 03, 2026
CVE-2026-20418 9.8 CRITICAL EPSS 0.00
Thread - Privilege Escalation
In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465153; Issue ID: MSV-4927.
CWE-787 Feb 02, 2026
CVE-2026-20417 5.3 MEDIUM EPSS 0.00
pcie - Privilege Escalation
In pcie, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10314946 / ALPS10340155; Issue ID: MSV-5154.
CWE-787 Feb 02, 2026
CVE-2026-20413 6.7 MEDIUM EPSS 0.00
imgsys - Privilege Escalation
In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10362725; Issue ID: MSV-5694.
CWE-1285 Feb 02, 2026
CVE-2026-20412 7.8 HIGH EPSS 0.00
cameraisp - Privilege Escalation
In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5733.
CWE-787 Feb 02, 2026
CVE-2026-20410 6.7 MEDIUM EPSS 0.00
imgsys - Privilege Escalation
In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10362552; Issue ID: MSV-5760.
CWE-787 Feb 02, 2026
CVE-2026-20409 7.8 HIGH EPSS 0.00
imgsys - Privilege Escalation
In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10363246; Issue ID: MSV-5779.
CWE-787 Feb 02, 2026
CVE-2026-20408 8.8 HIGH EPSS 0.00
Wlan - Buffer Overflow
In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461651; Issue ID: MSV-4758.
CWE-122 Feb 02, 2026
CVE-2026-20407 9.3 CRITICAL EPSS 0.00
Wlan STA driver - Privilege Escalation
In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00464377; Issue ID: MSV-4905.
CWE-787 Feb 02, 2026
CVE-2026-20404 6.5 MEDIUM 2 PoCs Analysis EPSS 0.00
Modem - DoS
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837.
CWE-787 Feb 02, 2026