CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
403 results Clear all
CVE-2025-46281 8.8 HIGH EPSS 0.00
macOS Tahoe <26.2 - Privilege Escalation
A logic issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.2. An app may be able to break out of its sandbox.
CWE-693 Dec 17, 2025
CVE-2025-13326 3.9 LOW EPSS 0.00
Mattermost Desktop App <6.0.0 - Privilege Escalation
Mattermost Desktop App versions <6.0.0 fail to enable the Hardened Runtime on the Mattermost Desktop App when packaged for Mac App Store which allows an attacker to inherit TCC permissions via copying the binary to a tmp folder.
CWE-693 Dec 17, 2025
CVE-2025-14095 6.8 MEDIUM EPSS 0.00
Radiometer Products - Privilege Escalation
A "Privilege boundary violation" vulnerability is identified affecting multiple Radiometer Products. Exploitation of this vulnerability gives a user with physical access to the analyzer, the possibility to gain unauthorized access to functionalities outside the restricted environment. The vulnerability is due to weakness in the design of access control implementation in application software.  Other related CVE's are CVE-2025-14096 & CVE-2025-14097. Affected customers have been informed about this vulnerability. This CVE is being published to provide transparency. Required configuration for Exposure: Physical access to the analyzer is needed. Temporary work Around: Only authorized people can physically access the analyzer. Permanent solution: Local Radiometer representatives will contact all affected customers to discuss a permanent solution. Exploit Status: Researchers have provided working proof-of-concept. Radiometer is not aware of any publicly available exploit at the time of publication.                                                                                                                                                                                        Note: CVSS score 6.8 when underlying OS is Windows 7 or Windows XP Operating systems and CVSS score 5.7 when underlying OS is Windows 8 or Windows 10 operating systems.
CWE-284 Dec 17, 2025
CVE-2025-14304 6.8 MEDIUM EPSS 0.00
ASRock Motherboard - Memory Corruption
Certain motherboard models developed by ASRock and its subsidiaries, ASRockRack and ASRockInd. has a Protection Mechanism Failure vulnerability. Because IOMMU was not properly enabled, unauthenticated physical attackers can use a DMA-capable PCIe device to read and write arbitrary physical memory before the OS kernel and its security features are loaded.
CWE-693 Dec 17, 2025
CVE-2025-14303 6.8 MEDIUM EPSS 0.00
MSI Motherboard - Memory Corruption
Certain motherboard models developed by MSI has a Protection Mechanism Failure vulnerability. Because IOMMU was not properly enabled, unauthenticated physical attackers can use a DMA-capable PCIe device to read and write arbitrary physical memory before the OS kernel and its security features are loaded.
CWE-693 Dec 17, 2025
CVE-2025-14302 6.8 MEDIUM EPSS 0.00
GIGABYTE Motherboard - Memory Corruption
Certain motherboard models developed by GIGABYTE has a Protection Mechanism Failure vulnerability. Because IOMMU was not properly enabled, unauthenticated physical attackers can use a DMA-capable PCIe device to read and write arbitrary physical memory before the OS kernel and its security features are loaded.
CWE-693 Dec 17, 2025
CVE-2025-65319 9.1 CRITICAL 3 Writeups EPSS 0.00
Blue Mail <1.140.103 - Info Disclosure
When using the attachment interaction functionality, Blue Mail 1.140.103 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software.
CWE-693 Dec 16, 2025
CVE-2025-65318 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Canary Mail <5.1.40 - Info Disclosure
When using the attachment interaction functionality, Canary Mail 5.1.40 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software.
CWE-693 Dec 16, 2025
CVE-2025-36938 6.8 MEDIUM EPSS 0.00
Google Android - Code Injection
In U-Boot of append_uint32_le(), there is a possible fault injection due to a logic error in the code. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Dec 11, 2025
CVE-2025-67460 7.8 HIGH EPSS 0.00
Zoom Rooms for Windows <6.6.0 - Privilege Escalation
Protection Mechanism Failure of Software Downgrade in Zoom Rooms for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via local access.
CWE-693 Dec 10, 2025
CVE-2025-67485 5.3 MEDIUM EPSS 0.00
mad-proxy <0.3 - Auth Bypass
mad-proxy is a Python-based HTTP/HTTPS proxy server for detection and blocking of malicious web activity using custom security policies. Versions 0.3 and below allow attackers to bypass HTTP/HTTPS traffic interception rules, potentially exposing sensitive traffic. This issue does not have a fix at the time of publication.
CWE-693 Dec 10, 2025
CVE-2025-34413 EPSS 0.00
Legality WHISTLEBLOWING by DigitalPA - Info Disclosure
Legality WHISTLEBLOWING by DigitalPA contains a protection mechanism failure in which critical HTTP security headers are not emitted by default. Affected deployments omit Content-Security-Policy, Referrer-Policy, Permissions-Policy, Cross-Origin-Embedder-Policy, Cross-Origin-Opener-Policy, and Cross-Origin-Resource-Policy (with CSP delivered via HTML meta elements being inadequate). The absence of these headers weakens browser-side defenses and increases exposure to client-side attacks such as cross-site scripting, clickjacking, referer leakage, and cross-origin data disclosure.
CWE-693 Dec 09, 2025
CVE-2025-66204 8.1 HIGH 1 Writeup EPSS 0.00
WBCE CMS <1.6.5 - Auth Bypass
WBCE CMS is a content management system. Version 1.6.4 contains a brute-force protection bypass where an attacker can indefinitely reset the counter by modifying `X-Forwarded-For` on each request, gaining unlimited password guessing attempts, effectively bypassing all brute-force protection. The application fully trusts the `X-Forwarded-For` header without validating it or restricting its usage. This issue is fixed in version 1.6.5.
CWE-693 Dec 09, 2025
CVE-2025-48626 9.8 CRITICAL EPSS 0.00
Google Android Background Application Launch - Privilege Escalation
In multiple locations, there is a possible way to launch an application from the background due to a precondition check failure. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Dec 08, 2025
CVE-2025-66479 1 Writeup EPSS 0.00
Anthropic Sandbox Runtime <0.0.16 - SSRF
Anthropic Sandbox Runtime is a lightweight sandboxing tool for enforcing filesystem and network restrictions on arbitrary processes at the OS level, without requiring a container. Prior to 0.0.16, due to a bug in sandboxing logic, sandbox-runtime did not properly enforce a network sandbox if the sandbox policy did not configure any allowed domains. This could allow sandboxed code to make network requests outside of the sandbox. A patch for this was released in v0.0.16.
CWE-693 Dec 04, 2025
CVE-2025-64763 3.7 LOW EPSS 0.00
Envoy <1.33.12, 1.34.10, 1.35.6, 1.36.2 - Info Disclosure
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, when Envoy is configured in TCP proxy mode to handle CONNECT requests, it accepts client data before issuing a 2xx response and forwards that data to the upstream TCP connection. If a forwarding proxy upstream from Envoy then responds with a non-2xx status, this can cause a de-synchronized CONNECT tunnel state. By default Envoy continues to allow early CONNECT data to avoid disrupting existing deployments. The envoy.reloadable_features.reject_early_connect_data runtime flag can be set to reject CONNECT requests that send data before a 2xx response when intermediaries upstream from Envoy may reject establishment of a CONNECT tunnel.
CWE-693 Dec 03, 2025
CVE-2025-29864 EPSS 0.00
ESTsoft ALZip <12.29 - RCE
Protection Mechanism Failure vulnerability in ESTsoft ALZip on Windows allows SmartScreen bypass.This issue affects ALZip: from 12.01 before 12.29.
CWE-693 Dec 03, 2025
CVE-2025-65100 1 Writeup EPSS 0.00
Isar <0.11 - Info Disclosure
Isar is an integration system for automated root filesystem generation. In versions 0.11-rc1 and 0.11, defining ISAR_APT_SNAPSHOT_DATE alone does not set the correct timestamp value for security distribution, leading to missed security updates. This issue has been patched via commit 738bcbb.
CWE-693 Nov 19, 2025
CVE-2025-11260 5.3 MEDIUM EPSS 0.00
WP Headless CMS Framework <1.15 - Auth Bypass
The WP Headless CMS Framework plugin for WordPress is vulnerable to protection mechanism bypass in all versions up to, and including, 1.15. This is due to the plugin only checking for the existence of the Authorization header in a request when determining if the nonce protection should be bypassed. This makes it possible for unauthenticated attackers to access content they should not have access to.
CWE-693 Nov 13, 2025
CVE-2025-62453 5.0 MEDIUM EPSS 0.00
GitHub Copilot & VSCode - Info Disclosure
Improper validation of generative ai output in GitHub Copilot and Visual Studio Code allows an authorized attacker to bypass a security feature locally.
CWE-693 Nov 11, 2025