Vulnerabilities Exploited in the Wild with Public PoC

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
2,390 results Clear all
CVE-2025-33073 8.8 HIGH KEV 15 PoCs Analysis EPSS 0.49
Windows SMB - Privilege Escalation
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
CWE-284 Jun 10, 2025
CVE-2025-54253 10.0 CRITICAL KEV 5 PoCs Analysis EPSS 0.20
Adobe Experience Manager Forms < 6.5.23.0 - Incorrect Authorization
Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed.
CWE-863 Aug 05, 2025
CVE-2025-49596 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.03
Modelcontextprotocol Inspector < 0.14.1 - Missing Authentication
The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
CWE-306 Jun 13, 2025
CVE-2025-24990 7.8 HIGH KEV 1 PoC Analysis EPSS 0.03
Agere Modem - Info Disclosure
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.
CWE-822 Oct 14, 2025
CVE-2025-47827 4.6 MEDIUM KEV 1 PoC Analysis EPSS 0.01
Igel OS < 11.01.100 - Signature Verification Bypass
In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.
CWE-347 Jun 05, 2025
CVE-2025-2611 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.73
ICTBroadcast - Command Injection
The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling. Versions 7.4 and below are known to be vulnerable.
CWE-78 Aug 05, 2025
CVE-2025-2539 7.5 HIGH EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.21
File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read
The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-327 Mar 20, 2025
CVE-2025-36604 7.3 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.13
Dell Unity Operating Environment < 5.5.1.0 - OS Command Injection
Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution.
CWE-78 Aug 04, 2025
CVE-2025-6019 7.0 HIGH EXPLOITED 23 PoCs Analysis EPSS 0.00
libblockdev - Privilege Escalation
A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
CWE-250 Jun 19, 2025
CVE-2025-37899 7.8 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.00
Linux kernel - Use After Free
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.
CWE-416 May 20, 2025
CVE-2025-53772 8.8 HIGH EXPLOITED 4 PoCs Analysis EPSS 0.02
Web Deploy - Code Injection
Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network.
CWE-502 Aug 12, 2025
CVE-2025-5947 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.46
Service Finder Bookings <6.0 - Privilege Escalation
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via authentication bypass in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's cookie value prior to logging them in through the service_finder_switch_back() function. This makes it possible for unauthenticated attackers to login as any user including admins.
CWE-639 Aug 01, 2025
CVE-2025-61882 9.8 CRITICAL KEV RANSOMWARE 18 PoCs Analysis NUCLEI EPSS 0.89
Oracle E-Business Suite CVE-2025-61882 RCE
Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-287 Oct 05, 2025
CVE-2025-3605 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.13
Frontend Login & Registration Blocks <1.0.7 - Privilege Escalation
The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the flr_blocks_user_settings_handle_ajax_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
CWE-639 May 09, 2025
CVE-2025-20352 7.7 HIGH KEV 1 PoC Analysis EPSS 0.03
Cisco IOS - DoS
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following: An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials. An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system. Note: This vulnerability affects all versions of SNMP.
CWE-121 Sep 24, 2025
CVE-2025-10035 10.0 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.50
Fortra Goanywhere Managed File Transfer < 7.6.3 - Command Injection
A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
CWE-502 Sep 18, 2025
CVE-2025-32463 9.3 CRITICAL KEV 98 PoCs Analysis NUCLEI EPSS 0.38
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
CWE-829 Jun 30, 2025
CVE-2025-10585 9.8 CRITICAL KEV 1 PoC Analysis EPSS 0.01
Google Chrome < 140.0.7339.185 - Type Confusion
Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Sep 24, 2025
CVE-2025-51591 3.7 LOW EXPLOITED 2 PoCs Analysis EPSS 0.00
JGM Pandoc v3.6.4 - SSRF
A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.
CWE-918 Jul 11, 2025
CVE-2025-34152 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.16
Shenzhen Aitemi M300 Wi-Fi Repeater - Command Injection
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
CWE-78 Aug 07, 2025