CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
707 results Clear all
CVE-2026-2796 9.8 CRITICAL EPSS 0.00
Firefox <148 - Memory Corruption
JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
CWE-843 Feb 24, 2026
CVE-2026-2783 7.5 HIGH EPSS 0.00
Firefox <148 & ESR <140.8 - Info Disclosure
Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
CWE-843 Feb 24, 2026
CVE-2025-14799 6.5 MEDIUM EPSS 0.00
Brevo WordPress Plugin <=3.3.0 - Auth Bypass
The Brevo - Email, SMS, Web Push, Chat, and more. plugin for WordPress is vulnerable to authorization bypass due to type juggling in all versions up to, and including, 3.3.0. This is due to the use of loose comparison (==) instead of strict comparison (===) when validating the installation ID in the `/wp-json/mailin/v1/mailin_disconnect` REST API endpoint. This makes it possible for unauthenticated attackers to disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings by sending a boolean `true` value for the `id` parameter, which bypasses the authorization check through PHP type juggling.
CWE-843 Feb 18, 2026
CVE-2023-31323 EPSS 0.00
AMD Secure Processor - Memory Corruption
Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA) leading to a memory safety violation potentially resulting in loss of confidentiality, integrity, or availability.
CWE-843 Feb 12, 2026
CVE-2026-21519 7.8 HIGH KEV EPSS 0.03
Microsoft Windows 10 1607 < 10.0.14393.8868 - Type Confusion
Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
CWE-843 Feb 10, 2026
CVE-2026-21330 7.8 HIGH EPSS 0.00
Adobe After Effects < 25.6.4 - Type Confusion
After Effects versions 25.6 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-843 Feb 10, 2026
CVE-2026-24914 4.0 MEDIUM EPSS 0.00
Huawei Harmonyos - Type Confusion
Type confusion vulnerability in the camera module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-416 Feb 06, 2026
CVE-2026-25537 7.5 HIGH 1 Writeup EPSS 0.00
Keats Jsonwebtoken < 10.3.0 - Type Confusion
jsonwebtoken is a JWT lib in rust. Prior to version 10.3.0, there is a Type Confusion vulnerability in jsonwebtoken, specifically, in its claim validation logic. When a standard claim (such as nbf or exp) is provided with an incorrect JSON type (Like a String instead of a Number), the library’s internal parsing mechanism marks the claim as “FailedToParse”. Crucially, the validation logic treats this “FailedToParse” state identically to “NotPresent”. This means that if a check is enabled (like: validate_nbf = true), but the claim is not explicitly marked as required in required_spec_claims, the library will skip the validation check entirely for the malformed claim, treating it as if it were not there. This allows attackers to bypass critical time-based security restrictions (like “Not Before” checks) and commit potential authentication and authorization bypasses. This issue has been patched in version 10.3.0.
CWE-843 Feb 04, 2026
CVE-2025-29867 EPSS 0.00
Hancom Office <10.0.0.12681, <11.0.0.8916, <12.0.0.4426, <13.0.0.30...
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Hancom Inc. Hancom Office 2018, Hancom Inc. Hancom Office 2020, Hancom Inc. Hancom Office 2022, Hancom Inc. Hancom Office 2024 allows File Content Injection.This issue affects Hancom Office 2018: before 10.0.0.12681; Hancom Office 2020: before 11.0.0.8916; Hancom Office 2022: before 12.0.0.4426; Hancom Office 2024: before 13.0.0.3050.
CWE-843 Feb 04, 2026
CVE-2026-1862 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Google Chrome <144.0.7559.132 - Heap Corruption
Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Feb 03, 2026
CVE-2025-65080 EPSS 0.00
Lexmark - RCE
A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.
CWE-843 Feb 03, 2026
CVE-2026-25503 7.1 HIGH 1 Writeup EPSS 0.00
Color Iccdev < 2.3.1.2 - Type Confusion
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, type confusion allowed malformed ICC profiles to trigger undefined behavior when loading invalid icImageEncodingType values causing denial of service. This issue has been patched in version 2.3.1.2.
CWE-704 Feb 03, 2026
CVE-2025-12899 6.5 MEDIUM EPSS 0.00
Zephyr - Info Disclosure
A flaw in Zephyr’s network stack allows an IPv4 packet containing ICMP type 128 to be misclassified as an ICMPv6 Echo Request. This results in an out-of-bounds memory read and creates a potential information-leak vulnerability in the networking subsystem.
CWE-843 Jan 30, 2026
CVE-2026-24874 9.1 CRITICAL EPSS 0.00
themrdemonized xray-monolith <2025.12.30 - Type Confusion
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.
CWE-843 Jan 27, 2026
CVE-2026-20860 7.8 HIGH EPSS 0.00
Windows Ancillary Function Driver - Privilege Escalation
Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CWE-843 Jan 13, 2026
CVE-2026-20811 7.8 HIGH EPSS 0.00
Windows Win32K - ICOMP - Privilege Escalation
Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
CWE-843 Jan 13, 2026
CVE-2026-22028 6.1 MEDIUM EPSS 0.00
Preact < 10.26.10 - Type Confusion
Preact, a lightweight web development framework, JSON serialization protection to prevent Virtual DOM elements from being constructed from arbitrary JSON. A regression introduced in Preact 10.26.5 caused this protection to be softened. In applications where values from JSON payloads are assumed to be strings and passed unmodified to Preact as children, a specially-crafted JSON payload could be constructed that would be incorrectly treated as a valid VNode. When this chain of failures occurs it can result in HTML injection, which can allow arbitrary script execution if not mitigated by CSP or other means. Applications using affected Preact versions are vulnerable if they meet all of the following conditions: first, pass unmodified, unsanitized values from user-modifiable data sources (APIs, databases, local storage, etc.) directly into the render tree; second assume these values are strings but the data source could return actual JavaScript objects instead of JSON strings; and third, the data source either fails to perform type sanitization AND blindly stores/returns raw objects interchangeably with strings, OR is compromised (e.g., poisoned local storage, filesystem, or database). Versions 10.26.10, 10.27.3, and 10.28.2 patch the issue. The patch versions restore the previous strict equality checks that prevent JSON-parsed objects from being treated as valid VNodes. Other mitigations are available for those who cannot immediately upgrade. Validate input types, cast or validate network data, sanitize external data, and use Content Security Policy (CSP).
CWE-843 Jan 08, 2026
CVE-2026-22046 8.8 HIGH EPSS 0.00
iccDEV <2.3.1.2 - Buffer Overflow
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a heap-buffer-overflow vulnerability in `CIccProfileXml::ParseBasic()` at `IccXML/IccLibXML/IccProfileXml.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.
CWE-252 Jan 07, 2026
CVE-2026-21693 8.8 HIGH EPSS 0.00
Color Iccdev < 2.3.1.2 - Type Confusion
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccSegmentedCurveXml::ToXml()` at `IccXML/IccLibXML/IccMpeXml.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.
CWE-681 Jan 07, 2026
CVE-2026-21692 8.8 HIGH EPSS 0.00
Color Iccdev < 2.3.1.2 - Type Confusion
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `ToXmlCurve()` at `IccXML/IccLibXML/IccMpeXml.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.
CWE-704 Jan 07, 2026