CVE & Exploit Intelligence Database

Updated 42m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
52 results Clear all
CVE-2026-2817 4.4 MEDIUM EPSS 0.00
Spring Data Geode - Info Disclosure
Use of insecure directory in Spring Data Geode snapshot import extracts archives into predictable, permissive directories under the system temp location. On shared hosts, a local user with basic privileges can access another user’s extracted snapshot contents, leading to unintended exposure of cache data.
CWE-538 Feb 19, 2026
CVE-2025-10279 7.0 HIGH 1 Writeup EPSS 0.00
mlflow <2.20.3 - Code Injection
In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with write access to the `/tmp` directory to exploit a race condition and overwrite `.py` files in the virtual environment, leading to arbitrary code execution. The issue is resolved in version 3.4.0.
CWE-379 Feb 02, 2026
CVE-2025-71176 6.8 MEDIUM EPSS 0.00
pytest <9.0.2 - DoS
pytest through 9.0.2 on UNIX relies on directories with the /tmp/pytest-of-{user} name pattern, which allows local users to cause a denial of service or possibly gain privileges.
CWE-379 Jan 22, 2026
CVE-2025-64896 5.5 MEDIUM EPSS 0.00
Creative Cloud Desktop <6.4.0.361 - DoS
Creative Cloud Desktop versions 6.4.0.361 and earlier are affected by a Creation of Temporary File in Directory with Incorrect Permissions vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to disrupt the application's functionality by manipulating temporary files. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-379 Dec 09, 2025
CVE-2025-33111 4.3 MEDIUM EPSS 0.00
IBM Controller <11.1.1 - Info Disclosure
IBM Controller 11.1.0 through 11.1.1 and IBM Cognos Controller 11.0.0 through 11.0.1 FP6 is vulnerable to creation of temporary files without atomic operations which may expose sensitive information to an authenticated user due to race condition attacks.
CWE-379 Dec 08, 2025
CVE-2024-7562 EPSS 0.00
InstallShield <2023 R2-2021 R2 - Privilege Escalation
A potential elevated privilege issue has been reported with InstallShield built Standalone MSI setups having multiple InstallScript custom actions configured. All supported versions (InstallShield 2023 R2, InstallShield 2022 R2 and InstallShield 2021 R2) are affected by this issue.
CWE-379 Jun 12, 2025
CVE-2025-32802 6.1 MEDIUM EPSS 0.00
Kea <2.7.8 - Code Injection
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
CWE-379 May 28, 2025
CVE-2025-32438 8.8 HIGH 1 Writeup EPSS 0.00
NixOS - Privilege Escalation
make-initrd-ng is a tool for copying binaries and their dependencies. Local privilege escalation affecting all NixOS users. With systemd.shutdownRamfs.enable enabled (the default) a local user is able to create a program that will be executed by root during shutdown. Patches exist for NixOS 24.11 and 25.05 / unstable. As a workaround, set systemd.shutdownRamfs.enable = false;.
CWE-378 Apr 15, 2025
CVE-2025-27148 8.8 HIGH 1 Writeup EPSS 0.00
Gradle - Privilege Escalation
Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. On Unix-like systems, the system temporary directory can be created with open permissions that allow multiple users to create and delete files within it. This library initialization could be vulnerable to a local privilege escalation from an attacker quickly deleting and recreating files in the system temporary directory. Gradle builds that rely on versions of net.rubygrapefruit:native-platform prior to 0.22-milestone-28 could be vulnerable to a local privilege escalation from an attacker quickly deleting and recreating files in the system temporary directory. In net.rubygrapefruit:native-platform prior to version 0.22-milestone-28, if the `Native.get(Class<>)` method was called, without calling `Native.init(File)` first, with a non-`null` argument used as working file path, then the library would initialize itself using the system temporary directory and NativeLibraryLocator.java lines 68 through 78. Version 0.22-milestone-28 has been released with changes that fix the problem. Initialization is now mandatory and no longer uses the system temporary directory, unless such a path is passed for initialization. The only workaround for affected versions is to make sure to do a proper initialization, using a location that is safe. Gradle 8.12, only that exact version, had codepaths where the initialization of the underlying native integration library took a default path, relying on copying the binaries to the system temporary directory. Any execution of Gradle exposed this exploit. Users of Windows or modern versions of macOS are not vulnerable, nor are users of a Unix-like operating system with the "sticky" bit set or `noexec` on their system temporary directory vulnerable. This problem was fixed in Gradle 8.12.1. Gradle 8.13 release also upgrades to a version of the native library that no longer has that bug. Some workarounds are available. On Unix-like operating systems, ensure that the "sticky" bit is set. This only allows the original user (or root) to delete a file. Mounting `/tmp` as `noexec` will prevent Gradle 8.12 from starting. Those who are are unable to change the permissions of the system temporary directory can move the Java temporary directory by setting the System Property java.io.tmpdir. The new path needs to limit permissions to the build user only.
CWE-378 Feb 25, 2025
CVE-2025-21162 5.5 MEDIUM EPSS 0.00
Adobe Photoshop Elements - Privilege Escalation
Photoshop Elements versions 2025.0 and earlier are affected by a Creation of Temporary File in Directory with Incorrect Permissions vulnerability that could result in privilege escalation in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-379 Feb 11, 2025
CVE-2025-21173 7.3 HIGH EPSS 0.02
.NET - Privilege Escalation
.NET Elevation of Privilege Vulnerability
CWE-379 Jan 14, 2025
CVE-2024-9950 7.8 HIGH 1 PoC Analysis EPSS 0.02
Forescout SecureConnector <11.3.07.0109 - Info Disclosure
A vulnerability in Forescout SecureConnector v11.3.07.0109 on Windows allows unauthenticated user to modify compliance scripts due to insecure temporary directory.
CWE-379 Jan 02, 2025
CVE-2024-9500 7.8 HIGH EPSS 0.01
Autodesk Installer - Privilege Escalation
A maliciously crafted DLL file when placed in temporary files and folders that are leveraged by the Autodesk Installer could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to insecure privilege management.
CWE-379 Nov 15, 2024
CVE-2023-6080 7.8 HIGH 1 Writeup EPSS 0.00
Lakesidesoftware Systrack Lsiagent < 11.0 - Privilege Escalation
Lakeside Software’s SysTrack LsiAgent Installer version 10.7.8 for Windows contains a local privilege escalation vulnerability which allows attackers SYSTEM level access.
CWE-379 Oct 18, 2024
CVE-2024-36821 6.8 MEDIUM 1 PoC Analysis EPSS 0.13
Linksys Velop WiFi 5 - Privilege Escalation
Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root.
CWE-379 Jun 11, 2024
CVE-2023-38533 3.3 LOW EPSS 0.00
TIA Administrator <V3 SP2 - Privilege Escalation
A vulnerability has been identified in TIA Administrator (All versions < V3 SP2). The affected component creates temporary download files in a directory with insecure permissions. This could allow any authenticated attacker on Windows to disrupt the update process.
CWE-379 Jun 11, 2024
CVE-2024-24693 7.2 HIGH EPSS 0.00
Zoom Rooms Client for Windows <5.17.5 - DoS
Improper access control in the installer for Zoom Rooms Client for Windows before version 5.17.5 may allow an authenticated user to conduct a denial of service via local access.
CWE-379 Mar 13, 2024
CVE-2023-3181 7.8 HIGH 1 Writeup EPSS 0.00
Splashtop Software Updater < - DLL Hijacking
The C:\Program Files (x86)\Splashtop\Splashtop Software Updater\uninst.exe process creates a folder at C:\Windows\Temp~nsu.tmp and copies itself to it as Au_.exe. The C:\Windows\Temp~nsu.tmp\Au_.exe file is automatically launched as SYSTEM when the system reboots or when a standard user runs an MSI repair using Splashtop Streamer’s Windows Installer. Since the C:\Windows\Temp~nsu.tmp folder inherits permissions from C:\Windows\Temp and Au_.exe is susceptible to DLL hijacking, standard users can write a malicious DLL to it and elevate their privileges.
CWE-379 Jan 25, 2024
CVE-2023-40438 5.5 MEDIUM EPSS 0.00
Apple Ipados < 16.7 - Denial of Service
An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14, iOS 16.7 and iPadOS 16.7. An app may be able to access edited photos saved to a temporary directory.
CWE-379 Jan 10, 2024
CVE-2023-49797 8.8 HIGH 1 Writeup EPSS 0.00
Pyinstaller < 5.13.1 - Incorrect Permission Assignment
PyInstaller bundles a Python application and all its dependencies into a single package. A PyInstaller built application, elevated as a privileged process, may be tricked by an unprivileged attacker into deleting files the unprivileged user does not otherwise have access to. A user is affected if **all** the following are satisfied: 1. The user runs an application containing either `matplotlib` or `win32com`. 2. The application is ran as administrator (or at least a user with higher privileges than the attacker). 3. The user's temporary directory is not locked to that specific user (most likely due to `TMP`/`TEMP` environment variables pointing to an unprotected, arbitrary, non default location). Either: A. The attacker is able to very carefully time the replacement of a temporary file with a symlink. This switch must occur exactly between `shutil.rmtree()`'s builtin symlink check and the deletion itself B: The application was built with Python 3.7.x or earlier which has no protection against Directory Junctions links. The vulnerability has been addressed in PR #7827 which corresponds to `pyinstaller >= 5.13.1`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-379 Dec 09, 2023