CVE & Exploit Intelligence Database

Updated 42m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
290 results Clear all
CVE-2026-30225 5.3 MEDIUM 1 Writeup EPSS 0.00
OliveTin <3000.11.1 - Privilege Escalation
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, an authentication context confusion vulnerability in RestartAction allows a low‑privileged authenticated user to execute actions they are not permitted to run. RestartAction constructs a new internal connect.Request without preserving the original caller’s authentication headers or cookies. When this synthetic request is passed to StartAction, the authentication resolver falls back to the guest user. If the guest account has broader permissions than the authenticated caller, this results in privilege escalation and unauthorized command execution. This vulnerability allows a low‑privileged authenticated user to bypass ACL restrictions and execute arbitrary configured shell actions. This issue has been patched in version 3000.11.1.
CWE-250 Mar 06, 2026
CVE-2026-20017 6.0 MEDIUM EPSS 0.00
Cisco Secure FTD Software - Command Injection
A vulnerability in the CLI of Cisco Secure FTD Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root. To exploit this vulnerability, the attacker must have valid administrative credentials on an affected device. This vulnerability is due to insufficient input validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input for a specific CLI command. A successful exploit could allow the attacker to execute commands on the underlying operating system as&nbsp;root.
CWE-250 Mar 04, 2026
CVE-2026-21426 6.7 MEDIUM EPSS 0.00
Dell PowerScale OneFS <9.10.1.6/9.11.0.0-9.12.0.1 - Privilege Escal...
Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an execution with unnecessary privileges vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service, elevation of privileges, and information disclosure.
CWE-250 Mar 04, 2026
CVE-2026-21424 6.7 MEDIUM EPSS 0.00
Dell PowerScale OneFS <9.10.1.6/9.11.0.0-9.12.0.1 - Privilege Escal...
Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an execution with unnecessary privileges vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
CWE-250 Mar 04, 2026
CVE-2026-21421 6.7 MEDIUM EPSS 0.00
Dell PowerScale OneFS <9.10.1.6/9.11.0.0-9.12.0.1 - Privilege Escal...
Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an execution with unnecessary privileges vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges.
CWE-250 Mar 04, 2026
CVE-2026-21882 8.4 HIGH 1 Writeup EPSS 0.00
theshit <0.2.0 - Privilege Escalation
theshit is a command-line utility that automatically detects and fixes common mistakes in shell commands. Prior to version 0.2.0, improper privilege dropping allows local privilege escalation via command re-execution. This issue has been patched in version 0.2.0.
CWE-250 Mar 02, 2026
CVE-2026-20037 4.4 MEDIUM EPSS 0.00
Cisco UCS Manager - Privilege Escalation
A vulnerability in the NX-OS CLI privilege levels of Cisco UCS Manager Software could allow an authenticated, local attacker with read-only privileges to modify files and perform unauthorized actions on an affected system. &nbsp; This vulnerability exists because unnecessary privileges are given to the user. An attacker could exploit this vulnerability by authenticating to a device as a read-only user and connecting to the NX-OS CLI. A successful exploit could allow the attacker to create or overwrite files in the file system or perform limited privileged actions on an affected device.&nbsp; &nbsp;
CWE-250 Feb 25, 2026
CVE-2026-27208 9.2 CRITICAL EPSS 0.00
bleon-ethical/api-gateway-deploy 1.0.0 - Command Injection
bleon-ethical/api-gateway-deploy provides API gateway deployment. Version 1.0.0 is vulnerable to an attack chain involving OS Command Injection and Privilege Escalation. This allows an attacker to execute arbitrary commands with root privileges within the container, potentially leading to a container escape and unauthorized infrastructure modifications. This is fixed in version 1.0.1 by implementing strict input sanitization and secure delimiters in entrypoint.sh, enforcing a non-root user (appuser) in the Dockerfile, and establishing mandatory security quality gates.
CWE-88 Feb 24, 2026
CVE-2026-27002 9.8 CRITICAL 1 Writeup EPSS 0.00
OpenClaw <2026.2.15 - Privilege Escalation
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access. OpenClaw 2026.2.15 blocks dangerous sandbox Docker settings and includes runtime enforcement when building `docker create` args; config-schema validation for `network=host`, `seccompProfile=unconfined`, `apparmorProfile=unconfined`; and security audit findings to surface dangerous sandbox docker config. As a workaround, do not configure `agents.*.sandbox.docker.binds` to mount system directories or Docker socket paths, keep `agents.*.sandbox.docker.network` at `none` (default) or `bridge`, and do not use `unconfined` for seccomp/AppArmor profiles.
CWE-250 Feb 20, 2026
CVE-2025-1790 EPSS 0.00
Genetec Sipelia Plugin - Privilege Escalation
Local privilege escalation in Genetec Sipelia Plugin. An authenticated low-privileged Windows user could exploit this vulnerability to gain elevated privileges on the affected system.
CWE-250 Feb 13, 2026
CVE-2026-25740 EPSS 0.00
Captive Browser <25.11-26.05 - Command Injection
captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings. In 25.05 and earlier, when programs.captive-browser is enabled, any user of the system can run arbitrary commands with the CAP_NET_RAW capability (binding to privileged ports, spoofing localhost traffic from privileged services...). This vulnerability is fixed in 25.11 and 26.05.
CWE-250 Feb 09, 2026
CVE-2026-0870 7.8 HIGH EPSS 0.00
MacroHub - Privilege Escalation
MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. Due to the MacroHub application launching external applications with improper privileges, allowing authenticated local attackers to execute arbitrary code with SYSTEM privileges.
CWE-250 Feb 09, 2026
CVE-2026-25643 9.1 CRITICAL 4 PoCs Analysis EPSS 0.00
Frigate <0.16.4 - RCE
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4.
CWE-78 Feb 06, 2026
CVE-2025-13375 9.8 CRITICAL EPSS 0.00
IBM CCA 7.5.52-8.4.82 - Privilege Escalation
IBM Common Cryptographic Architecture (CCA) 7.5.52 and 8.4.82 could allow an unauthenticated user to execute arbitrary commands with elevated privileges on the system.
CWE-250 Feb 04, 2026
CVE-2026-22549 4.9 MEDIUM EPSS 0.00
F5 BIG-IP - Info Disclosure
A vulnerability exists in F5 BIG-IP Container Ingress Services that may allow excessive permissions to read cluster secrets.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-250 Feb 04, 2026
CVE-2025-58383 7.2 HIGH EPSS 0.00
Brocade Fabric OS <9.2.1c2 - Privilege Escalation
A vulnerability in Brocade Fabric OS versions before 9.2.1c2 could allow an administrator-level user to execute the bind command, to escalate privileges and bypass security controls allowing the execution of arbitrary commands.
CWE-250 Feb 03, 2026
CVE-2025-58379 5.5 MEDIUM EPSS 0.00
Brocade Fabric OS <9.2.1 - Info Disclosure
Brocade Fabric OS before 9.2.1 has a vulnerability that could allow a local authenticated attacker to reveal command line passwords using commands that may expose higher privilege sensitive information by a lower privileged user.
CWE-250 Feb 03, 2026
CVE-2025-36184 7.2 HIGH EPSS 0.00
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 1...
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 could allow an instance owner to execute malicious code that escalate their privileges to root due to execution of unnecessary privileges operated at a higher than minimum level.
CWE-250 Jan 30, 2026
CVE-2026-1680 7.8 HIGH EPSS 0.00
Edgemo Local Admin Service 1.2.7.23180 - Privilege Escalation
Improper access control in the WCF endpoint in Edgemo (now owned by Danoffice IT) Local Admin Service 1.2.7.23180 on Windows allows a local user to escalate their privileges to local administrator via direct communication with the LocalAdminService.exe named pipe, bypassing client-side group membership restrictions.
CWE-250 Jan 30, 2026
CVE-2025-36059 4.7 MEDIUM EPSS 0.00
IBM Business Automation Workflow <25.0.0-24.0.0 - Privilege Escalation
IBM Business Automation Workflow containers 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, and 24.0.0 through 24.0.0 Interim Fix 006. IBM Cloud Pak for Business Automation could allow a local user with access to the container to execute OS system calls.
CWE-250 Jan 20, 2026