Critical Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
4,101 results Clear all
CVE-2025-34111 9.8 CRITICAL 2 PoCs Analysis EPSS 0.74
Tikiwiki Cms/groupware < 15.1 - Missing Authentication
An unauthenticated arbitrary file upload vulnerability exists in Tiki Wiki CMS Groupware version 15.1 and earlier via the ELFinder component's default connector (connector.minimal.php), which allows remote attackers to upload and execute malicious PHP scripts in the context of the web server. The vulnerable component does not enforce file type validation, allowing attackers to craft a POST request to upload executable PHP payloads through the ELFinder interface exposed at /vendor_extra/elfinder/.
CWE-306 Jul 15, 2025
CVE-2025-48828 9.0 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.74
vBulletin - RCE
Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
CWE-424 May 27, 2025
CVE-2025-27007 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.81
OttoKit < 1.0.83 - SureTriggers allows Privilege Escalation
Incorrect Privilege Assignment vulnerability in Brainstorm Force OttoKit suretriggers allows Privilege Escalation.This issue affects OttoKit: from n/a through <= 1.0.82.
CWE-266 May 01, 2025
CVE-2025-27520 9.8 CRITICAL 3 PoCs Analysis EPSS 0.81
BentoML v1.4.2 - RCE
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3.
CWE-502 Apr 04, 2025
CVE-2025-37164 10.0 CRITICAL KEV 5 PoCs Analysis NUCLEI EPSS 0.84
HPE OneView unauthenticated RCE
A remote code execution issue exists in HPE OneView.
CWE-94 Dec 16, 2025
CVE-2025-5306 9.8 CRITICAL 1 PoC Analysis EPSS 0.69
Artica Pandora Fms < 778 - Command Injection
Improper Neutralization of Special Elements in the Netflow directory field may allow OS command injection. This issue affects Pandora FMS 774 through 778
CWE-77 Jun 27, 2025
CVE-2025-32375 9.8 CRITICAL 2 PoCs Analysis EPSS 0.67
Bentoml < 1.4.8 - Insecure Deserialization
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.
CWE-502 Apr 09, 2025
CVE-2025-54253 10.0 CRITICAL KEV 5 PoCs Analysis EPSS 0.20
Adobe Experience Manager Forms < 6.5.23.0 - Incorrect Authorization
Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed.
CWE-863 Aug 05, 2025
CVE-2025-14700 9.9 CRITICAL 3 PoCs Analysis EPSS 0.00
Craftycontrol Crafty Controller - Remote Code Execution
An input neutralization vulnerability in the Webhook Template component of Crafty Controller allows a remote, authenticated attacker to perform remote code execution via Server Side Template Injection.
CWE-1336 Dec 17, 2025
CVE-2025-59718 9.8 CRITICAL KEV 3 PoCs Analysis EPSS 0.08
Fortinet Fortiproxy < 7.0.22 - Signature Verification Bypass
A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
CWE-347 Dec 09, 2025
CVE-2025-3500 9.0 CRITICAL 2 PoCs Analysis EPSS 0.00
Avast Antivirus < 25.3 - Integer Overflow
Integer Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3.
CWE-190 Dec 01, 2025
CVE-2025-10230 10.0 CRITICAL 4 PoCs Analysis EPSS 0.00
Samba - RCE
A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.
CWE-78 Nov 07, 2025
CVE-2025-61303 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Hatching Triage Sandbox - DoS
Hatching Triage Sandbox Windows 10 build 2004 (2025-08-14) and Windows 10 LTSC 2021(2025-08-14) contains a vulnerability in its Windows behavioral analysis engine that allows a submitted malware sample to evade detection and cause denial-of-analysis. The vulnerability is triggered when a sample recursively spawns a large number of child processes, generating high log volume and exhausting system resources. As a result, key malicious behavior, including PowerShell execution and reverse shell activity, may not be recorded or reported, misleading analysts and compromising the integrity and availability of sandboxed analysis results.
CWE-400 Oct 20, 2025
CVE-2025-62168 10.0 CRITICAL 4 PoCs Analysis EPSS 0.00
Squid < 7.2 - Error Information Exposure
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
CWE-550 Oct 17, 2025
CVE-2025-10492 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
Cloud Jasperreports IO < 4.0.0 - Insecure Deserialization
A Java deserialisation vulnerability has been discovered in Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library
CWE-502 Sep 16, 2025
CVE-2025-48148 10.0 CRITICAL 3 PoCs Analysis EPSS 0.00
StoreKeeper <14.4.4 - Unrestricted Upload
Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce storekeeper-for-woocommerce allows Using Malicious Files.This issue affects StoreKeeper for WooCommerce: from n/a through <= 14.4.4.
CWE-434 Aug 20, 2025
CVE-2025-6758 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
Imithemes Real Spaces - WordPress Properties Directory Theme <= 3.6 - Privilege Escalation
The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'imic_agent_register' function in all versions up to, and including, 3.6. This is due to a lack of restriction in the registration role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during user registration.
CWE-269 Aug 19, 2025
CVE-2025-23048 9.1 CRITICAL 2 PoCs Analysis EPSS 0.00
Apache HTTP Server < 2.4.64 - Improper Access Control
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
CWE-284 Jul 10, 2025
CVE-2025-49002 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.26
Dataease < 2.10.10 - Authentication Bypass by Spoofing
DataEase is an open source business intelligence and data visualization tool. Versions prior to version 2.10.10 have a flaw in the patch for CVE-2025-32966 that allow the patch to be bypassed through case insensitivity because INIT and RUNSCRIPT are prohibited. The vulnerability has been fixed in v2.10.10. No known workarounds are available.
CWE-290 Jun 03, 2025
CVE-2025-70830 9.9 CRITICAL 1 PoC Analysis EPSS 0.00
Datart 1.0.0-rc.3 - Code Injection
A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.
CWE-94 Feb 17, 2026