CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
309 results Clear all
CVE-2025-32457 7.7 HIGH EPSS 0.00
Onsemi Qcs-ax3-s5 Firmware - Command Injection
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE-88 Jun 08, 2025
CVE-2025-32456 7.7 HIGH EPSS 0.00
Onsemi Qcs-ax3-s5 Firmware - Command Injection
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE-88 Jun 08, 2025
CVE-2025-32455 7.7 HIGH EPSS 0.00
Onsemi Qcs-ax3-s5 Firmware - Command Injection
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CWE-88 Jun 08, 2025
CVE-2025-49008 1 Writeup EPSS 0.00
Atheos <6.0.4 - Command Injection
Atheos is a self-hosted browser-based cloud integrated development environment. Prior to version 6.0.4, improper use of `escapeshellcmd()` in `/components/codegit/traits/execute.php` allows argument injection, leading to arbitrary command execution. Atheos administrators and users of vulnerable versions are at risk of data breaches or server compromise. Version 6.0.4 introduces a `Common::safe_execute` function that sanitizes all arguments using `escapeshellarg()` prior to execution and migrated all components potentially vulnerable to similar exploits to use this new templated execution system.
CWE-78 Jun 05, 2025
CVE-2025-3945 7.2 HIGH EPSS 0.00
Tridium Niagara <4.14.2-4.15.1-4.10.11 - Command Injection
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Tridium Niagara Framework on QNX, Tridium Niagara Enterprise Security on QNX allows Command Delimiters. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
CWE-88 May 22, 2025
CVE-2025-1712 8.8 HIGH EPSS 0.00
Checkmk <2.4.0p1,<2.3.0p32,<2.2.0p42,2.1.0 - Command Injection
Argument injection in special agent configuration in Checkmk <2.4.0p1, <2.3.0p32, <2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files
CWE-88 May 21, 2025
CVE-2025-31499 8.8 HIGH 1 Writeup EPSS 0.01
Jellyfin < 10.10.7 - Remote Code Execution
Jellyfin is an open source self hosted media server. Versions before 10.10.7 are vulnerable to argument injection in FFmpeg. This can be leveraged to possibly achieve remote code execution by anyone with credentials to a low-privileged user. This vulnerability was previously reported in CVE-2023-49096 and patched in version 10.8.13, but the patch can be bypassed. The original fix sanitizes some parameters to make injection impossible, but certain unsanitized parameters can still be used for argument injection. The same unauthenticated endpoints are vulnerable: /Videos/<itemId>/stream and /Videos/<itemId>/stream.<container>, likely alongside similar endpoints in AudioController. This argument injection can be exploited to achieve arbitrary file write, leading to possible remote code execution through the plugin system. While the unauthenticated endpoints are vulnerable, a valid itemId is required for exploitation and any authenticated attacker could easily retrieve a valid itemId to make the exploit work. This vulnerability is patched in version 10.10.7.
CWE-88 Apr 15, 2025
CVE-2025-32931 9.1 CRITICAL 2 Writeups EPSS 0.00
DevDojo Voyager <1.8.0 - Command Injection
DevDojo Voyager 1.4.0 through 1.8.0, when Laravel 8 or later is used, allows authenticated administrators to execute arbitrary OS commands via a specific php artisan command.
CWE-88 Apr 14, 2025
CVE-2024-47516 9.8 CRITICAL EPSS 0.01
Pagure - RCE
A vulnerability was found in Pagure. An argument injection in Git during retrieval of the repository history leads to remote code execution on the Pagure instance.
CWE-88 Mar 26, 2025
CVE-2025-29768 4.4 MEDIUM 1 Writeup EPSS 0.00
Vim <9.1.1198 - Info Disclosure
Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files in versions prior to 9.1.1198. The impact is medium because a user must be made to view such an archive with Vim and then press 'x' on such a strange filename. The issue has been fixed as of Vim patch v9.1.1198.
CWE-88 Mar 13, 2025
CVE-2025-27146 2.7 LOW 1 Writeup EPSS 0.00
matrix-appservice-irc <3.0.3 - Command Injection
matrix-appservice-irc is a Node.js IRC bridge for Matrix. The matrix-appservice-irc bridge up to version 3.0.3 contains a vulnerability which can lead to arbitrary IRC command execution as the puppeted user. The attacker can only inject commands executed as their own IRC user. The vulnerability has been patched in matrix-appservice-irc version 3.0.4.
CWE-88 Feb 25, 2025
CVE-2025-24845 5.5 MEDIUM EPSS 0.00
Defense Platform Home Edition <3.9.51.x - Command Injection
Improper neutralization of argument delimiters in a command ('Argument Injection') issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker provides specially crafted data to the specific process of the Windows system where the product is running, the system may cause a Blue Screen of Death (BSOD), and as a result, cause a denial-of-service (DoS) condition.
CWE-88 Feb 06, 2025
CVE-2025-0065 7.8 HIGH EPSS 0.00
TeamViewer <15.62 - Privilege Escalation
Improper Neutralization of Argument Delimiters in the TeamViewer_service.exe component of TeamViewer Clients prior version 15.62 for Windows allows an attacker with local unprivileged access on a Windows system to elevate privileges via argument injection.
CWE-88 Jan 28, 2025
CVE-2022-31749 6.5 MEDIUM 2 PoCs Analysis EPSS 0.01
WatchGuard Fireware OS <12.8.1-12.5.10 - Command Injection
An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances
CWE-88 Jan 28, 2025
CVE-2025-23073 3.5 LOW EPSS 0.00
Wikimedia Foundation Mediawiki - GlobalBlocking Extension - Info Di...
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - GlobalBlocking Extension allows Retrieve Embedded Sensitive Data. This issue briefly impacted the master branch of MediaWiki’s GlobalBlocking Extension.
CWE-88 Jan 14, 2025
CVE-2024-9131 7.2 HIGH EPSS 0.00
Arista NG Firewall < 17.1.1 - Command Injection
A user with administrator privileges can perform command injection
CWE-88 Jan 10, 2025
CVE-2025-21613 9.8 CRITICAL EPSS 0.03
go-git <5.13 - Command Injection
go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.
CWE-88 Jan 06, 2025
CVE-2024-51532 7.1 HIGH EPSS 0.00
Dell PowerStore - Command Injection
Dell PowerStore contains an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to modification of arbitrary system files.
CWE-88 Dec 19, 2024
CVE-2024-11633 9.1 CRITICAL EPSS 0.19
Ivanti Connect Secure <22.7R2.4 - Command Injection
Argument injection in Ivanti Connect Secure before version 22.7R2.4 allows a remote authenticated attacker with admin privileges to achieve remote code execution
CWE-88 Dec 10, 2024
CVE-2021-1484 6.5 MEDIUM EPSS 0.00
Cisco Catalyst Sd-wan Manager - Denial of Service
A vulnerability in the web UI of Cisco&nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to inject arbitrary commands on an affected system and cause a denial of service (DoS) condition. This vulnerability is due to improper input validation of user-supplied input to the device template configuration. An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to cause a DoS condition on the affected system.Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE-88 Nov 15, 2024