CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
370 results Clear all
CVE-2025-43016 5.4 MEDIUM EPSS 0.00
JetBrains Rider <2025.1.2 - Privilege Escalation
In JetBrains Rider before 2025.1.2 custom archive unpacker allowed arbitrary file overwrite during remote debug session
CWE-23 Apr 25, 2025
CVE-2025-27791 EPSS 0.01
Collabora Online <24.04.12.4-22.05.25 - Path Traversal
Collabora Online is a collaborative online office suite based on LibreOffice technology. In versions prior to 24.04.12.4, 23.05.19, and 22.05.25, there is a path traversal flaw in handling the CheckFileInfo BaseFileName field returned from WOPI servers. This allows for a file to be written anywhere the uid running Collabora Online can write, if such a response was supplied by a malicious WOPI server. By combining this flaw with a Time of Check, Time of Use DNS lookup issue with a WOPI server address under attacker control, it is possible to present such a response to be processed by a Collabora Online instance. This issue has been patched in versions 24.04.13.1, 23.05.19, and 22.05.25.
CWE-23 Apr 15, 2025
CVE-2025-32017 8.8 HIGH 1 Writeup EPSS 0.00
Umbraco Cms < 14.3.4 - Path Traversal
Umbraco is a free and open source .NET content management system. Authenticated users to the Umbraco backoffice are able to craft management API request that exploit a path traversal vulnerability to upload files into a incorrect location. The issue affects Umbraco 14+ and is patched in 14.3.4 and 15.3.1.
CWE-23 Apr 08, 2025
CVE-2025-32409 8.1 HIGH EPSS 0.02
Ratta SuperNote A6 X2 Nomad <December 2024 - RCE
Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct image-update location as a consequence of both directory traversal and unintended handling of concurrency.
CWE-23 Apr 07, 2025
CVE-2025-32137 4.9 MEDIUM EPSS 0.01
s2Member <250214 - Path Traversal
Relative Path Traversal vulnerability in Cristián Lávaque s2Member allows Path Traversal. This issue affects s2Member: from n/a through 250214.
CWE-23 Apr 04, 2025
CVE-2023-40714 9.9 CRITICAL EPSS 0.01
Fortinet FortiSIEM <6.7.2-6.6.3 - Path Traversal
A relative path traversal in Fortinet FortiSIEM versions 7.0.0, 6.7.0 through 6.7.2, 6.6.0 through 6.6.3, 6.5.1, 6.5.0 allows attacker to escalate privilege via uploading certain GUI elements
CWE-23 Apr 02, 2025
CVE-2025-2007 8.1 HIGH EPSS 0.06
WordPress CSV/XML Datafeed Plugin <7.19 - Privilege Escalation
The Import Export Suite for CSV and XML Datafeed plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the deleteImage() function in all versions up to, and including, 7.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CWE-23 Apr 01, 2025
CVE-2025-2961 4.3 MEDIUM 1 Writeup EPSS 0.00
opensolon <3.1.0 - Path Traversal
A vulnerability classified as problematic was found in opensolon up to 3.1.0. This vulnerability affects the function render_mav of the file /aa of the component org.noear.solon.core.handle.RenderManager. The manipulation of the argument template with the input ../org/example/HelloApp.class leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-24 Mar 30, 2025
CVE-2025-29789 7.5 HIGH 1 Writeup EPSS 0.00
Open-emr Openemr < 7.0.3 - Path Traversal
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.3.0 are vulnerable to Directory Traversal in the Load Code feature. Version 7.3.0 contains a patch for the issue.
CWE-22 Mar 25, 2025
CVE-2025-27553 7.5 HIGH EPSS 0.01
Apache Commons Vfs < 2.10.0 - Path Traversal
Relative Path Traversal vulnerability in Apache Commons VFS before 2.10.0. The FileObject API in Commons VFS has a 'resolveFile' method that takes a 'scope' parameter. Specifying 'NameScope.DESCENDENT' promises that "an exception is thrown if the resolved file is not a descendent of the base file". However, when the path contains encoded ".." characters (for example, "%2E%2E/bar.txt"), it might return file objects that are not a descendent of the base file, without throwing an exception. This issue affects Apache Commons VFS: before 2.10.0. Users are recommended to upgrade to version 2.10.0, which fixes the issue.
CWE-23 Mar 23, 2025
CVE-2024-9363 7.5 HIGH EPSS 0.00
Polyaxon - DoS
An unauthorized file deletion vulnerability exists in the latest version of the Polyaxon platform, which can lead to denial of service by terminating critical containers. An attacker can delete important files within the containers, such as `polyaxon.sock`, causing the API container to exit unexpectedly. This disrupts related services and prevents the system from functioning normally, without requiring authentication or UUID parameters.
CWE-23 Mar 20, 2025
CVE-2024-8551 9.1 CRITICAL EPSS 0.00
modelscope/agentscope < - Path Traversal
A path traversal vulnerability exists in the save-workflow and load-workflow functionality of modelscope/agentscope versions prior to the fix. This vulnerability allows an attacker to read and write arbitrary JSON files on the filesystem, potentially leading to the exposure or modification of sensitive information such as configuration files, API keys, and hardcoded passwords.
CWE-23 Mar 20, 2025
CVE-2024-7058 4.4 MEDIUM EPSS 0.00
Lollms Web UI - Path Traversal
A vulnerability in the sanitize_path function in parisneo/lollms-webui v10 - latest allows an attacker to bypass path sanitization by using relative paths such as './'. This can lead to unauthorized access to directories within the personality_folder on the victim's computer.
CWE-23 Mar 20, 2025
CVE-2024-6583 4.3 MEDIUM EPSS 0.00
stangirard/quivr - Path Traversal
A path traversal vulnerability exists in the latest version of stangirard/quivr. This vulnerability allows an attacker to upload files to arbitrary paths in an S3 bucket by manipulating the file path in the upload request.
CWE-23 Mar 20, 2025
CVE-2024-6483 5.3 MEDIUM EPSS 0.00
aimhubio/aim <3.19.3 - Path Traversal
A vulnerability in the `runs/delete-batch` endpoint of aimhubio/aim version 3.19.3 allows for arbitrary file or directory deletion through path traversal. The endpoint does not mitigate path traversal when handling user-specified run-names, which are used to specify log/metadata files for deletion. This can be exploited to delete arbitrary files or directories, potentially causing denial of service or data loss.
CWE-23 Mar 20, 2025
CVE-2024-10513 7.2 HIGH 1 Writeup EPSS 0.00
Mintplexlabs Anythingllm < 1.2.2 - Path Traversal
A path traversal vulnerability exists in the 'document uploads manager' feature of mintplex-labs/anything-llm, affecting the latest version prior to 1.2.2. This vulnerability allows users with the 'manager' role to access and manipulate the 'anythingllm.db' database file. By exploiting the vulnerable endpoint '/api/document/move-files', an attacker can move the database file to a publicly accessible directory, download it, and subsequently delete it. This can lead to unauthorized access to sensitive data, privilege escalation, and potential data loss.
CWE-22 Mar 20, 2025
CVE-2024-8510 5.3 MEDIUM EPSS 0.00
N-central <2024.6 - Path Traversal
N-central is vulnerable to a path traversal that allows unintended access to the Apache Tomcat WEB-INF directory. Customer data is not exposed. This vulnerability is present in all deployments of N-central prior to N-central 2024.6.
CWE-22 Mar 17, 2025
CVE-2024-54449 8.8 HIGH EPSS 0.00
Logicaldoc < 9.1 - Path Traversal
The API used to interact with documents in the application contains two endpoints with a flaw that allows an authenticated attacker to write a file with controlled contents to an arbitrary location on the underlying file system. This can be used to facilitate RCE. An account with ‘read’ and ‘write’ privileges on at least one existing document in the application is required to exploit the vulnerability. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC.
CWE-23 Mar 14, 2025
CVE-2024-12019 EPSS 0.00
API - Info Disclosure
The API used to interact with documents in the application contains a flaw that allows an authenticated attacker to read the contents of files on the underlying operating system. An account with ‘read’ and ‘download’ privileges on at least one existing document in the application is required to exploit the vulnerability. Exploitation of this vulnerability would allow an attacker to read the contents of any file available within the privileges of the system user running the application.
CWE-23 Mar 14, 2025
CVE-2025-2056 7.5 HIGH EPSS 0.01
Wpplugins Hide MY WP Ghost < 5.4.02 - Path Traversal
The WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 5.4.01 via the showFile function. This makes it possible for unauthenticated attackers to read the contents of specific file types on the server, which can contain sensitive information.
CWE-23 Mar 14, 2025