CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
403 results Clear all
CVE-2025-22433 7.8 HIGH EPSS 0.00
IntentForwarderActivity - Privilege Escalation
In canForward of IntentForwarderActivity.java, there is a possible bypass of the cross profile intent filter most commonly used in Work Profile scenarios due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Sep 02, 2025
CVE-2025-22431 5.5 MEDIUM EPSS 0.00
Google Android - Denial of Service
In multiple locations, there is a possible method for a malicious app to prevent dialing emergency services under limited circumstances due to a logic error in the code. This could lead to local denial of service until the phone reboots with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Sep 02, 2025
CVE-2025-22429 9.8 CRITICAL EPSS 0.00
Logic Error - Privilege Escalation
In multiple locations, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Sep 02, 2025
CVE-2025-22427 7.3 HIGH EPSS 0.00
Android - Privilege Escalation
In onCreate of NotificationAccessConfirmationActivity.java, there is a possible way to grant notification access above the lock screen due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CWE-693 Sep 02, 2025
CVE-2024-49720 7.8 HIGH EPSS 0.00
Permissions.java - Privilege Escalation
In multiple functions of Permissions.java, there is a possible way to override the state of the user's location permissions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Sep 02, 2025
CVE-2025-20347 5.4 MEDIUM EPSS 0.00
Cisco Nexus Dashboard - Info Disclosure
A vulnerability in the REST API endpoints of Cisco Nexus Dashboard and Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to view sensitive information or upload and modify files on an affected device. This vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit th vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions, such as accessing sensitive information regarding HTTP Proxy and NTP configurations, uploading images, and damaging image files on an affected device.
CWE-693 Aug 27, 2025
CVE-2025-43728 9.6 CRITICAL EPSS 0.00
Dell ThinOS <2508_10.0127 - Privilege Escalation
Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass.
CWE-693 Aug 27, 2025
CVE-2025-54143 9.8 CRITICAL EPSS 0.00
Firefox for iOS < 141 - Info Disclosure
Sandboxed iframes on webpages could potentially allow downloads to the device, bypassing the expected sandbox restrictions declared on the parent page This vulnerability affects Firefox for iOS < 141.
CWE-693 Aug 19, 2025
CVE-2025-50897 4.3 MEDIUM 2 Writeups EPSS 0.00
riscv-boom SonicBOOM 1.2 - Memory Corruption
A vulnerability exists in riscv-boom SonicBOOM 1.2 (BOOMv1.2) processor implementation, where valid virtual-to-physical address translations configured with write permissions (PTE_W) in SV39 mode may incorrectly trigger a Store/AMO access fault during store instructions (sd). This occurs despite the presence of proper page table entries and valid memory access modes. The fault is reproducible when transitioning into virtual memory and attempting store operations in mapped kernel memory, indicating a potential flaw in the MMU, PMP, or memory access enforcement logic. This may cause unexpected kernel panics or denial of service in systems using BOOMv1.2.
CWE-284 Aug 19, 2025
CVE-2025-24835 6.5 MEDIUM EPSS 0.00
Intel(R) Arc(TM) B-Series <32.0.101.6737 - DoS
Protection mechanism failure in the Intel(R) Graphics Driver for the Intel(R) Arc(TM) B-Series graphics before version 32.0.101.6737 may allow an authenticated user to potentially enable denial of service via local access.
CWE-693 Aug 12, 2025
CVE-2025-24523 3.5 LOW EPSS 0.00
Intel(R) Tiber(TM) Edge Platform <24.11.1 - DoS
Protection mechanism failure for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.
CWE-693 Aug 12, 2025
CVE-2025-3770 7.0 HIGH EPSS 0.00
EDK2 - RCE
EDK2 contains a vulnerability in BIOS where an attacker may cause “Protection Mechanism Failure” by local access. Successful exploitation of this vulnerability will lead to arbitrary code execution and impact Confidentiality, Integrity, and Availability.
CWE-693 Aug 07, 2025
CVE-2025-8656 6.8 MEDIUM EPSS 0.00
Kenwood DMX958XR - Privilege Escalation
Kenwood DMX958XR Protection Mechanism Failure Software Downgrade Vulnerability. This vulnerability allows physically present attackers to downgrade software on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the libSystemLib library. The issue results from the lack of proper validation of version information before performing an update. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-26355.
CWE-693 Aug 06, 2025
CVE-2025-43273 9.1 CRITICAL EPSS 0.00
macOS Sonoma <14.8 - Privilege Escalation
A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14.8. A sandboxed process may be able to circumvent sandbox restrictions.
CWE-693 Jul 30, 2025
CVE-2025-43261 9.8 CRITICAL EPSS 0.00
macOS <15.6-13.7.7 - Info Disclosure
A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to break out of its sandbox.
CWE-693 Jul 30, 2025
CVE-2025-8032 8.1 HIGH EPSS 0.00
Firefox <141, Firefox ESR <128.13, Firefox ESR <140.1, Thunderbird ...
XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
CWE-693 Jul 22, 2025
CVE-2025-52951 5.8 MEDIUM EPSS 0.00
Juniper Networks Junos OS - Privilege Escalation
A Protection Mechanism Failure vulnerability in kernel filter processing of Juniper Networks Junos OS allows an attacker sending IPv6 traffic destined to the device to effectively bypass any firewall filtering configured on the interface. Due to an issue with Junos OS kernel filter processing, the 'payload-protocol' match is not being supported, causing any term containing it to accept all packets without taking any other action. In essence, these firewall filter terms were being processed as an 'accept' for all traffic on the interface destined for the control plane, even when used in combination with other match criteria. This issue only affects firewall filters protecting the device's control plane. Transit firewall filtering is unaffected by this vulnerability. This issue affects Junos OS:  * all versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S11,  * from 22.2 before 22.2R3-S7,  * from 22.4 before 22.4R3-S7,  * from 23.2 before 23.2R2-S4,  * from 23.4 before 23.4R2-S5,  * from 24.2 before 24.2R2-S1,  * from 24.4 before 24.4R1-S2, 24.4R2. This is a more complete fix for previously published CVE-2024-21607 (JSA75748).
CWE-693 Jul 11, 2025
CVE-2025-46358 7.7 HIGH EPSS 0.00
Emerson ValveLink - Info Disclosure
Emerson ValveLink products do not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
CWE-693 Jul 11, 2025
CVE-2025-49740 8.8 HIGH EPSS 0.00
Windows SmartScreen - Privilege Escalation
Protection mechanism failure in Windows SmartScreen allows an unauthorized attacker to bypass a security feature over a network.
CWE-693 Jul 08, 2025
CVE-2025-48800 6.8 MEDIUM EPSS 0.00
Windows BitLocker - Privilege Escalation
Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
CWE-693 Jul 08, 2025