CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
46 results Clear all
CVE-2026-22715 5.9 MEDIUM EPSS 0.00
VMWare Workstation/Fusion - Privilege Escalation
VMWare Workstation and Fusion contain a logic flaw in the management of network packets.  Known attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network connections of other Guest VM's.  Resolution: To remediate CVE-2026-22715 please upgrade to VMware Workstation or Fusion Version 25H2U1
CWE-923 Feb 26, 2026
CVE-2025-58742 5.9 MEDIUM EPSS 0.00
Milner ImageDirector Capture <7.6.3.25808 - SSRF
Insufficiently Protected Credentials, Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Connection Settings dialog in Milner ImageDirector Capture on Windows allows Adversary in the Middle (AiTM) by modifying the 'Server' field to redirect client authentication.This issue affects ImageDirector Capture: from 7.0.9 before 7.6.3.25808.
CWE-522 Jan 20, 2026
CVE-2025-61939 8.8 HIGH 1 Writeup EPSS 0.00
MicroServer - SSRF
An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.
CWE-923 Jan 07, 2026
CVE-2025-33176 6.2 MEDIUM EPSS 0.00
NVIDIA RunAI - SSRF
NVIDIA RunAI for all platforms contains a vulnerability where a user could cause an improper restriction of communications channels on an adjacent network. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, and information disclosure.
CWE-923 Nov 04, 2025
CVE-2025-12357 8.3 HIGH 1 Writeup EPSS 0.00
ISO 15118-2 - Man-in-the-Middle
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
CWE-923 Oct 31, 2025
CVE-2025-49734 7.0 HIGH EPSS 0.00
Windows PowerShell - Privilege Escalation
Improper restriction of communication channel to intended endpoints in Windows PowerShell allows an authorized attacker to elevate privileges locally.
CWE-923 Sep 09, 2025
CVE-2025-48807 6.7 MEDIUM EPSS 0.00
Windows Hyper-V - Code Execution
Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally.
CWE-923 Aug 12, 2025
CVE-2025-35978 7.1 HIGH EPSS 0.00
UpdateNavi V1.4 L10-L33 & UpdateNaviInstallService Service 1.2.0091...
Improper restriction of communication channel to intended endpoints issue exists in UpdateNavi V1.4 L10 to L33 and UpdateNaviInstallService Service 1.2.0091 to 1.2.0125. If a local authenticated attacker send malicious data, an arbitrary registry value may be modified or arbitrary code may be executed.
CWE-923 Jun 12, 2025
CVE-2025-22251 3.1 LOW EPSS 0.00
FortiOS <7.6.0 - SSRF
An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to inject unauthorized sessions via crafted FGSP session synchronization packets.
CWE-923 Jun 10, 2025
CVE-2025-20261 8.8 HIGH EPSS 0.00
Cisco IMC - Privilege Escalation
A vulnerability in the SSH connection handling of Cisco Integrated Management Controller (IMC) for Cisco UCS B-Series, UCS C-Series, UCS S-Series, and UCS X-Series Servers could allow an authenticated, remote attacker to access internal services with elevated privileges. This vulnerability is due to insufficient restrictions on access to internal services. An attacker with a valid user account could exploit this vulnerability by using crafted syntax when connecting to the Cisco IMC of an affected device through SSH. A successful exploit could allow the attacker to access internal services with elevated privileges, which may allow unauthorized modifications to the system, including the possibility of creating new administrator accounts on the affected device.
CWE-923 Jun 04, 2025
CVE-2025-48999 8.8 HIGH 1 Writeup EPSS 0.00
DataEase <2.10.10 - Auth Bypass
DataEase is an open source business intelligence and data visualization tool. A bypass of CVE-2025-46566's patch exists in versions prior to 2.10.10. In a malicious payload, `getUrlType()` retrieves `hostName`. Since the judgment statement returns false, it will not enter the if statement and will not be filtered. The payload can be directly concatenated at the replace location to construct a malicious JDBC statement. Version 2.10.10 contains a patch for the issue.
CWE-284 Jun 03, 2025
CVE-2025-46566 9.8 CRITICAL EPSS 0.00
DataEase <2.10.9 - Authenticated RCE
DataEase is an open-source BI tool alternative to Tableau. Prior to version 2.10.9, authenticated users can complete RCE through the backend JDBC link. This issue has been patched in version 2.10.9.
CWE-284 May 01, 2025
CVE-2025-32886 4.0 MEDIUM 1 Writeup EPSS 0.00
goTenna <5.5.3-0.25.5 - Info Disclosure
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. All packets sent over RF are also sent over UART with USB Shell, allowing someone with local access to gain information about the protocol and intercept sensitive data.
CWE-923 May 01, 2025
CVE-2025-23178 7.6 HIGH EPSS 0.00
CWE-923 - SSRF
CWE-923: Improper Restriction of Communication Channel to Intended Endpoints
CWE-923 Apr 29, 2025
CVE-2025-31144 5.8 MEDIUM EPSS 0.00
Quick Agent V3-V2 - SSRF
Quick Agent V3 and Quick Agent V2 contain an issue with improper restriction of communication channel to intended endpoints. If exploited, a remote unauthenticated attacker may attempt to log in to an arbitrary host via Windows system where the product is running.
CWE-923 Apr 28, 2025
CVE-2024-26013 7.5 HIGH EPSS 0.00
Fortinet FortiOS <7.4.4 - SSRF
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15 and before 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9 and before 7.0.15, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2 before 6.4.8 and Fortinet FortiWeb before 7.4.2 may allow an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device
CWE-923 Apr 08, 2025
CVE-2025-29986 8.3 HIGH EPSS 0.01
Dell CEE 9.0.0.0 - SSRF
Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.
CWE-923 Apr 08, 2025
CVE-2024-39271 2.6 LOW EPSS 0.00
Intel PROSet/Wireless <23.80 - Info Disclosure
Improper restriction of communication channel to intended endpoints in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software before version 23.80 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CWE-923 Feb 12, 2025
CVE-2022-43916 6.8 MEDIUM EPSS 0.00
IBM App Connect Enterprise Certified Container <12.7 - DoS
IBM App Connect Enterprise Certified Container 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, and 12.7 Pods do not restrict network egress for Pods that are used for internal infrastructure.
CWE-923 Jan 30, 2025
CVE-2024-22315 4.0 MEDIUM EPSS 0.00
IBM Fusion <2.8.2 - SSRF
IBM Fusion and IBM Fusion HCI 2.3.0 through 2.8.2 is vulnerable to insecure network connection by allowing an attacker who gains access to a Fusion container to establish an external network connection.
CWE-923 Jan 28, 2025