CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
2,165 results Clear all
CVE-2025-64658 7.5 HIGH EPSS 0.00
Microsoft Windows 10 1809 < 10.0.17763.8146 - Race Condition
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Shell allows an authorized attacker to elevate privileges locally.
CWE-362 Dec 09, 2025
CVE-2025-62573 7.0 HIGH EPSS 0.00
Microsoft Windows 10 1607 < 10.0.14393.8688 - Race Condition
Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.
CWE-362 Dec 09, 2025
CVE-2025-62469 7.0 HIGH EPSS 0.00
Microsoft Windows 11 24h2 < 10.0.26100.7392 - Race Condition
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
CWE-415 Dec 09, 2025
CVE-2025-48625 7.0 HIGH EPSS 0.00
UsbDataAdvancedProtectionHook - Privilege Escalation
In multiple locations of UsbDataAdvancedProtectionHook.java, there is a possible way to access USB data when the screen is off due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-362 Dec 08, 2025
CVE-2025-48564 7.0 HIGH EPSS 0.00
Multiple Locations - Privilege Escalation
In multiple locations, there is a possible intent filter bypass due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-362 Dec 08, 2025
CVE-2025-66328 8.4 HIGH EPSS 0.00
Network Management Module - DoS
Multi-thread race condition vulnerability in the network management module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-362 Dec 08, 2025
CVE-2025-66327 7.1 HIGH EPSS 0.00
Network Module - Info Disclosure
Race condition vulnerability in the network module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CWE-362 Dec 08, 2025
CVE-2025-66326 6.7 MEDIUM EPSS 0.00
Audio Module - DoS
Race condition vulnerability in the audio module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-362 Dec 08, 2025
CVE-2025-66322 5.1 MEDIUM EPSS 0.00
Camera Framework Module - DoS
Multi-thread race condition vulnerability in the camera framework module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-362 Dec 08, 2025
CVE-2025-66321 5.1 MEDIUM EPSS 0.00
Camera Framework <unknown> - DoS
Multi-thread race condition vulnerability in the camera framework module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-362 Dec 08, 2025
CVE-2025-66320 5.1 MEDIUM EPSS 0.00
Camera Framework Module - DoS
Multi-thread race condition vulnerability in the camera framework module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-362 Dec 08, 2025
CVE-2025-13721 7.5 HIGH EPSS 0.00
Google Chrome < 143.0.7499.40 - Race Condition
Race in v8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CWE-362 Dec 02, 2025
CVE-2025-20765 4.7 MEDIUM EPSS 0.00
Linuxfoundation Yocto - Race Condition
In aee daemon, there is a possible system crash due to a race condition. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10190802; Issue ID: MSV-4833.
CWE-362 Dec 02, 2025
CVE-2025-64313 5.3 MEDIUM EPSS 0.00
Huawei Harmonyos - Race Condition
Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-362 Nov 28, 2025
CVE-2025-58316 7.3 HIGH EPSS 0.00
Video-Related System Service - DoS
DoS vulnerability in the video-related system service module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-362 Nov 28, 2025
CVE-2025-58303 8.4 HIGH EPSS 0.00
Screen Recording Framework Module - Use After Free
UAF vulnerability in the screen recording framework module. Impact: Successful exploitation of this vulnerability may affect availability.
CWE-362 Nov 28, 2025
CVE-2025-12472 EPSS 0.00
Looker <upgrade - RCE
An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.103+ * 24.18.195+ * 25.0.72+ * 25.6.60+ * 25.8.42+ * 25.10.22+
CWE-362 Nov 19, 2025
CVE-2025-12383 7.4 HIGH EPSS 0.00
Eclipse Jersey < 2.46 - Race Condition
In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignoring of critical SSL configurations - such as mutual authentication, custom key/trust stores, and other security settings. This issue may result in SSLHandshakeException under normal circumstances, but under certain conditions, it could lead to unauthorized trust in insecure servers (see PoC)
CWE-362 Nov 18, 2025
CVE-2024-7017 7.5 HIGH EPSS 0.00
Google Chrome < 126.0.6478.182 - Race Condition
Inappropriate implementation in DevTools in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-362 Nov 14, 2025
CVE-2025-64345 1.8 LOW 1 Writeup EPSS 0.00
Crates.io Wasmtime < 38.0.4 - Race Condition
Wasmtime is a runtime for WebAssembly. Prior to version 38.0.4, 37.0.3, 36.0.3, and 24.0.5, Wasmtime's Rust embedder API contains an unsound interaction where a WebAssembly shared linear memory could be viewed as a type which provides safe access to the host (Rust) to the contents of the linear memory. This is not sound for shared linear memories, which could be modified in parallel, and this could lead to a data race in the host. Patch releases have been issued for all supported versions of Wasmtime, notably: 24.0.5, 36.0.3, 37.0.3, and 38.0.4. These releases reject creation of shared memories via `Memory::new` and shared memories are now excluded from core dumps. As a workaround, eembeddings affected by this issue should use `SharedMemory::new` instead of `Memory::new` to create shared memories. Affected embeddings should also disable core dumps if they are unable to upgrade. Note that core dumps are disabled by default but the wasm threads proposal (and shared memory) is enabled by default.
CWE-362 Nov 12, 2025