CVE & Exploit Intelligence Database

Updated 25m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
73 results Clear all
CVE-2026-20107 5.5 MEDIUM EPSS 0.00
Cisco APIC - DoS
A vulnerability in the Object Model CLI component of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, local attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. To exploit this vulnerability, the attacker must have valid user credentials and any role that includes CLI access. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by issuing crafted commands at the CLI prompt. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
CWE-1220 Feb 25, 2026
CVE-2025-48517 EPSS 0.00
SEV firmware - Privilege Escalation
Insufficient Granularity of Access Control in SEV firmware could allow a privileged user with a malicious hypervisor to create a SEV-ES guest with an ASID in the range meant for SEV-SNP guests potentially resulting in a partial loss of confidentiality.
CWE-1220 Feb 10, 2026
CVE-2025-48514 EPSS 0.00
SEV firmware - Privilege Escalation
Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentially resulting in a loss of confidentiality.
CWE-1220 Feb 10, 2026
CVE-2026-0873 EPSS 0.00
Cryptobox - Privilege Escalation
On a Cryptobox platform where administrator segregation based on entities is used, some vulnerabilities in Ercom Cryptobox administration console allows an authenticated entity administrator with knowledge to elevate his account to global administrator.
CWE-1220 Feb 04, 2026
CVE-2024-4147 6.5 MEDIUM EPSS 0.00
lunary-ai/lunary <1.2.13 - Privilege Escalation
In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to delete prompts created in other organizations through ID manipulation. The vulnerability stems from the application's failure to validate the ownership of the prompt before deletion, only checking if the user has permissions to delete such resources without verifying if it belongs to the user's project or organization. As a result, users can remove prompts not owned by their organization or project, leading to legitimate users being unable to access the removed prompts and causing information inconsistencies.
CWE-1220 Feb 02, 2026
CVE-2025-11246 5.4 MEDIUM EPSS 0.00
GitLab CE/EE <18.5.5-18.7.1 - Privilege Escalation
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.4 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user with specific permissions to remove all project runners from unrelated projects by manipulating GraphQL runner associations.
CWE-1220 Jan 09, 2026
CVE-2025-8306 EPSS 0.00
Asseco InfoMedica - Info Disclosure
Asseco InfoMedica is a comprehensive solution used to manage both administrative and medical tasks in the healthcare sector. A low privileged user is able to obtain encoded passwords of all other accounts (including main administrator) due to lack of granularity in access control.  Chained exploitation of this vulnerability and CVE-2025-8307 allows an attacker to escalate privileges. This vulnerability has been fixed in versions 4.50.1 and 5.38.0
CWE-1220 Jan 08, 2026
CVE-2025-20305 4.3 MEDIUM EPSS 0.00
Cisco ISE - Info Disclosure
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability exists because certain files lack proper data protection mechanisms. An attacker with read-only Administrator privileges could exploit this vulnerability by performing actions where the results should only be viewable to a high-privileged user. A successful exploit could allow the attacker to view passwords that are normally not visible to read-only administrators.
CWE-1220 Nov 05, 2025
CVE-2025-8053 9.1 CRITICAL EPSS 0.00
Opentext Flipper <3.1.2 - Privilege Escalation
Insufficient Granularity of Access Control vulnerability in opentext Flipper allows Exploiting Incorrectly Configured Access Control Security Levels. The vulnerability could allow a low privilege user to interact with the backend API without sufficient privileges. This issue affects Flipper: 3.1.2.
CWE-1220 Oct 20, 2025
CVE-2025-8049 8.8 HIGH EPSS 0.00
Opentext Flipper <3.1.2 - Privilege Escalation
Insufficient Granularity of Access Control vulnerability in opentext Flipper allows Exploiting Incorrectly Configured Access Control Security Levels. The vulnerability could allow a low-privilege user to elevate privileges within the application. This issue affects Flipper: 3.1.2.
CWE-1220 Oct 20, 2025
CVE-2025-54461 5.3 MEDIUM EPSS 0.00
ChatLuck - Info Disclosure
ChatLuck contains an insufficient granularity of access control vulnerability in Invitation of Guest Users. If exploited, an uninvited guest user may register itself as a guest user.
CWE-1220 Oct 16, 2025
CVE-2025-7493 9.1 CRITICAL EPSS 0.00
FreeIPA - Privilege Escalation
A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrator's name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
CWE-1220 Sep 30, 2025
CVE-2024-21947 7.5 HIGH EPSS 0.00
System Management Mode - Memory Corruption
Improper input validation in the system management mode (SMM) could allow a privileged attacker to overwrite arbitrary memory potentially resulting in arbitrary code execution at the SMM level.
CWE-1220 Sep 06, 2025
CVE-2025-31961 3.7 LOW EPSS 0.00
HCL Connections - Info Disclosure
HCL Connections contains a broken access control vulnerability that may allow unauthorized user to update data in certain scenarios.
CWE-1220 Aug 15, 2025
CVE-2025-2498 3.1 LOW EPSS 0.00
Gitlab EE <18.0.6-18.2.2 - Auth Bypass
An improper access control in Gitlab EE affecting all versions from 12.0 prior to 18.0.6, 18.1 prior to 18.1.4, and 18.2 prior to 18.2.2 that under certain conditions could have allowed users to view assigned issues from restricted groups by bypassing IP restrictions.
CWE-1220 Aug 13, 2025
CVE-2025-22839 7.5 HIGH EPSS 0.00
Intel(R) Xeon(R) 6 Scalable - Privilege Escalation
Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.
CWE-1220 Aug 12, 2025
CVE-2025-7001 4.3 MEDIUM EPSS 0.00
GitLab CE/EE <18.0.5-18.2.1 - Privilege Escalation
An issue has been discovered in GitLab CE/EE affecting all versions from 15.0 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that could have allowed priviledged users to access certain resource_group information through the API which should have been unavailable.
CWE-1220 Jul 24, 2025
CVE-2025-3648 EPSS 0.00
ServiceNow - Info Disclosure
A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain conditional access control list (ACL) configurations, this vulnerability could enable unauthenticated and authenticated users to use range query requests to infer instance data that is not intended to be accessible to them. To assist customers in enhancing access controls, ServiceNow has introduced additional access control frameworks in Xanadu and Yokohama, such as Query ACLs, Security Data Filters and Deny-Unless ACLs. Additionally, in May 2025, ServiceNow delivered to customers a security update that is designed to enhance customer ACL configurations. Customers, please review the KB Articles in the References section.
CWE-1220 Jul 08, 2025
CVE-2025-27026 4.9 MEDIUM EPSS 0.00
Infinera G42 R6.1.3 - Privilege Escalation
A missing double-check feature in the WebGUI for CLI deactivation in Infinera G42 version R6.1.3 allows an authenticated administrator to make other management interfaces unavailable via local and network interfaces. The CLI deactivation via the WebGUI does not only stop CLI interface but deactivates also Linux Shell, WebGUI and Physical Serial Console access. No confirmation is asked at deactivation time. Loosing access to these services device administrators are at risk of completely loosing device control.
CWE-1220 Jul 02, 2025
CVE-2025-4404 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
FreeIPA - Privilege Escalation
A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
CWE-1220 Jun 17, 2025