CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
370 results Clear all
CVE-2025-46363 4.3 MEDIUM EPSS 0.00
Dell Secure Connect Gateway <5.30.00.00 - Path Traversal
Dell Secure Connect Gateway (SCG) 5.0 Application and Appliance version(s) 5.26.00.00 - 5.30.00.00, contain a Relative Path Traversal vulnerability in the SCG exposed for an internal collection download REST API (if this REST API is enabled by Admin user from UI). A low privileged attacker with remote access could potentially exploit this vulnerability, leading to allowing relative path traversal to restricted resources.
CWE-22 Oct 30, 2025
CVE-2025-55752 7.5 HIGH 3 PoCs Analysis EPSS 0.00
Apache Tomcat - Path Traversal
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
CWE-23 Oct 27, 2025
CVE-2025-60023 4.0 MEDIUM 1 Writeup EPSS 0.00
Productivity Suite <4.4.1.19 - Path Traversal
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.
CWE-23 Oct 23, 2025
CVE-2025-59776 4.0 MEDIUM 1 Writeup EPSS 0.00
Productivity Suite <4.4.1.19 - Path Traversal
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.
CWE-23 Oct 23, 2025
CVE-2025-58429 7.5 HIGH 1 Writeup EPSS 0.01
Productivity Suite <4.4.1.19 - Path Traversal
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.
CWE-23 Oct 23, 2025
CVE-2025-62498 8.8 HIGH 1 Writeup EPSS 0.00
Productivity Suite <4.4.1.19 - Path Traversal
A relative path traversal (ZipSlip) vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an attacker who can tamper with a productivity project to execute arbitrary code on the machine where the project is opened.
CWE-23 Oct 23, 2025
CVE-2025-58456 6.8 MEDIUM 1 Writeup EPSS 0.00
Productivity Suite <4.4.1.19 - Path Traversal
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and read arbitrary files on the target machine.
CWE-23 Oct 23, 2025
CVE-2025-58078 7.5 HIGH 1 Writeup EPSS 0.00
Productivity Suite <4.4.1.19 - Path Traversal
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and write files with arbitrary data on the target machine.
CWE-23 Oct 23, 2025
CVE-2025-11898 7.5 HIGH EPSS 0.00
Agentflow - Path Traversal
Agentflow developed by Flowring has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to exploit Relative Path Traversal to download arbitrary system files.
CWE-23 Oct 17, 2025
CVE-2025-10249 6.5 MEDIUM EPSS 0.00
Slider Revolution <6.7.37 - Privilege Escalation
The Slider Revolution plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on several functions in all versions up to, and including, 6.7.37. This makes it possible for authenticated attackers, with Contributor-level access and above, to install and activate plugin add-ons, create sliders, and download arbitrary files.
CWE-23 Oct 09, 2025
CVE-2025-62187 2.9 LOW EPSS 0.00
Anki < 25.02.6 - Path Traversal
In Ankitects Anki before 25.02.6, crafted sound file references could cause files to be written to arbitrary locations on Windows and Linux (media file pathnames are not necessarily relative to the media folder).
CWE-23 Oct 07, 2025
CVE-2025-59835 EPSS 0.00
LangBot <4.3.5 - Privilege Escalation
LangBot is a global IM bot platform designed for LLMs. In versions 4.1.0 up to but not including 4.3.5, authorized attackers can exploit the /api/v1/files/documents interface to perform arbitrary file uploads. Since this interface does not strictly restrict the storage directory of files on the server, it is possible to upload dangerous files to specific system directories. This is fixed in version 4.3.5.
CWE-434 Oct 02, 2025
CVE-2025-59682 3.1 LOW EPSS 0.00
Django < 4.2.25 - Path Traversal
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.
CWE-23 Oct 01, 2025
CVE-2025-60020 6.4 MEDIUM EPSS 0.00
nncp <8.12.0 - Path Traversal
nncp before 8.12.0 allows path traversal (for reading or writing) during freqing and file saving via a crafted path in packet data.
CWE-23 Sep 24, 2025
CVE-2025-59341 1 Writeup EPSS 0.00
Esm-dev Esm.sh - Path Traversal
esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a Local File Inclusion (LFI) issue was identified in the esm.sh service URL handling. An attacker could craft a request that causes the server to read and return files from the host filesystem (or other unintended file sources).
CWE-23 Sep 17, 2025
CVE-2025-59456 5.5 MEDIUM EPSS 0.00
Jetbrains Teamcity < 2025.07.2 - Path Traversal
In JetBrains TeamCity before 2025.07.2 path traversal was possible during project archive upload
CWE-23 Sep 17, 2025
CVE-2025-59336 1 Writeup EPSS 0.00
Luanox <0.1.1 - Path Traversal
Luanox is a module host for Lua packages. Prior to 0.1.1, a file traversal vulnerability can cause potential denial of service by overwriting Phoenix runtime files. Package names like ../../package are not properly filtered and pass the validity check of the rockspec verification system. This causes the uploaded file to be stored at the relative path location. If planned carefully, this could overwrite a runtime file and cause the website to crash. This vulnerability is fixed by 0.1.1.
CWE-22 Sep 16, 2025
CVE-2025-55115 8.8 HIGH EPSS 0.00
Control-M/Agent <9.0.20 - Privilege Escalation
A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions. This vulnerability was fixed in 9.0.20.100 and above.
CWE-23 Sep 16, 2025
CVE-2025-10203 7.8 HIGH EPSS 0.00
Digilent WaveForms <3.24.3 - RCE
Relative path traversal vulnerability due to improper input validation in Digilent WaveForms that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .DWF3WORK file. This vulnerability affects Digilent WaveForms 3.24.3 and prior versions.
CWE-23 Sep 15, 2025
CVE-2025-58760 8.6 HIGH 1 Writeup EPSS 0.00
Tautulli <2.15.3 - Path Traversal
Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `/image` API endpoint in Tautulli v2.15.3 and earlier is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. In Tautulli, the `/image` API endpoint is used to serve static images from the application's data directory to users. This endpoint can be accessed without authentication, and its intended purpose is for server background images and icons within the user interface. Attackers can exfiltrate files from the application file system, including the `tautulli.db` SQLite database containing active JWT tokens, as well as the `config.ini` file which contains the hashed admin password, the JWT token secret, and the Plex Media Server token and connection details. If the password is cracked, or if a valid JWT token is present in the database, an unauthenticated attacker can escalate their privileges to obtain administrative control over the application. Version 2.16.0 contains a fix for the issue.
CWE-23 Sep 09, 2025