Critical Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2025-34111
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.74
Tikiwiki Cms/groupware < 15.1 - Missing Authentication
An unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/.
CWE-306
Jul 15, 2025
CVE-2025-48828
9.0
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.74
vBulletin - RCE
Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
CWE-424
May 27, 2025
CVE-2025-27007
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.81
OttoKit < 1.0.83 - SureTriggers allows Privilege Escalation
Incorrect Privilege Assignment vulnerability in Brainstorm Force OttoKit suretriggers allows Privilege Escalation.This issue affects OttoKit: from n/a through <= 1.0.82.
CWE-266
May 01, 2025
CVE-2025-27520
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.81
BentoML v1.4.2 - RCE
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3.
CWE-502
Apr 04, 2025
CVE-2025-37164
10.0
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.84
HPE OneView unauthenticated RCE
A remote code execution issue exists in HPE OneView.
CWE-94
Dec 16, 2025
CVE-2025-5306
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.69
Artica Pandora Fms < 778 - Command Injection
Improper Neutralization of Special Elements in the Netflow directory field may allow OS command injection. This issue affects Pandora FMS 774 through 778
CWE-77
Jun 27, 2025
CVE-2025-32375
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.67
Bentoml < 1.4.8 - Insecure Deserialization
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.
CWE-502
Apr 09, 2025
CVE-2025-54253
10.0
CRITICAL
KEV
5 PoCs
Analysis
EPSS 0.20
Adobe Experience Manager Forms < 6.5.23.0 - Incorrect Authorization
Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed.
CWE-863
Aug 05, 2025
CVE-2025-14700
9.9
CRITICAL
3 PoCs
Analysis
EPSS 0.00
Craftycontrol Crafty Controller - Remote Code Execution
An input neutralization vulnerability in the Webhook Template component of Crafty Controller allows a remote, authenticated attacker to perform remote code execution via Server Side Template Injection.
CWE-1336
Dec 17, 2025
CVE-2025-59718
9.8
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.08
Fortinet Fortiproxy < 7.0.22 - Signature Verification Bypass
A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
CWE-347
Dec 09, 2025
CVE-2025-3500
9.0
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Avast Antivirus < 25.3 - Integer Overflow
Integer Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3.
CWE-190
Dec 01, 2025
CVE-2025-10230
10.0
CRITICAL
4 PoCs
Analysis
EPSS 0.00
Samba - RCE
A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.
CWE-78
Nov 07, 2025
CVE-2025-61303
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Hatching Triage Sandbox - DoS
Hatching Triage Sandbox Windows 10 build 2004 (2025-08-14) and Windows 10 LTSC 2021(2025-08-14) contains a vulnerability in its Windows behavioral analysis engine that allows a submitted malware sample to evade detection and cause denial-of-analysis. The vulnerability is triggered when a sample recursively spawns a large number of child processes, generating high log volume and exhausting system resources. As a result, key malicious behavior, including PowerShell execution and reverse shell activity, may not be recorded or reported, misleading analysts and compromising the integrity and availability of sandboxed analysis results.
CWE-400
Oct 20, 2025
CVE-2025-62168
10.0
CRITICAL
4 PoCs
Analysis
EPSS 0.00
Squid < 7.2 - Error Information Exposure
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
CWE-550
Oct 17, 2025
CVE-2025-10492
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Cloud Jasperreports IO < 4.0.0 - Insecure Deserialization
A Java deserialisation vulnerability has been discovered in Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library
CWE-502
Sep 16, 2025
CVE-2025-48148
10.0
CRITICAL
3 PoCs
Analysis
EPSS 0.00
StoreKeeper <14.4.4 - Unrestricted Upload
Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce storekeeper-for-woocommerce allows Using Malicious Files.This issue affects StoreKeeper for WooCommerce: from n/a through <= 14.4.4.
CWE-434
Aug 20, 2025
CVE-2025-6758
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.00
Imithemes Real Spaces - WordPress Properties Directory Theme <= 3.6 - Privilege Escalation
The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'imic_agent_register' function in all versions up to, and including, 3.6. This is due to a lack of restriction in the registration role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during user registration.
CWE-269
Aug 19, 2025
CVE-2025-23048
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Apache HTTP Server < 2.4.64 - Improper Access Control
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.
Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
CWE-284
Jul 10, 2025
CVE-2025-49002
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.26
Dataease < 2.10.10 - Authentication Bypass by Spoofing
DataEase is an open source business intelligence and data visualization tool. Versions prior to version 2.10.10 have a flaw in the patch for CVE-2025-32966 that allow the patch to be bypassed through case insensitivity because INIT and RUNSCRIPT are prohibited. The vulnerability has been fixed in v2.10.10. No known workarounds are available.
CWE-290
Jun 03, 2025
CVE-2025-70830
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.00
Datart 1.0.0-rc.3 - Code Injection
A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.
CWE-94
Feb 17, 2026