Critical Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2025-56795
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.00
Mealie < 3.0.1 - XSS
Mealie 3.0.1 and earlier is vulnerable to Stored Cross-Site Scripting (XSS) in the recipe creation functionality. Unsanitized user input in the "note" and "text" fields of the "/api/recipes/{recipe_name}" endpoint is rendered in the frontend without proper escaping leading to persistent XSS.
CWE-79
Sep 29, 2025
CVE-2025-54726
9.3
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.01
Miguel Useche JS Archive List - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows SQL Injection.This issue affects JS Archive List: from n/a through < 6.1.6.
CWE-89
Aug 20, 2025
CVE-2025-46408
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
AVTECH EagleEyes <2.0.0 - Info Disclosure
An issue was discovered in the methods push.lite.avtech.com.AvtechLib.GetHttpsResponse and push.lite.avtech.com.Push_HttpService.getNewHttpClient in AVTECH EagleEyes 2.0.0. The methods set ALLOW_ALL_HOSTNAME_VERIFIER, bypassing domain validation.
CWE-297
Sep 15, 2025
CVE-2025-56819
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.10
Running-elephant Datart - OS Command Injection
An issue in Datart v.1.0.0-rc.3 allows a remote attacker to execute arbitrary code via the INIT connection parameter.
CWE-78
Sep 24, 2025
CVE-2025-34157
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.00
Coollabs Coolify < 4.0.0 - XSS
Coolify versions prior to v4.0.0-beta.420.6 are vulnerable to a stored cross-site scripting (XSS) attack in the project creation workflow. An authenticated user with low privileges can create a project with a maliciously crafted name containing embedded JavaScript. When an administrator attempts to delete the project or its associated resource, the payload executes in the admin’s browser context. This results in full compromise of the Coolify instance, including theft of API tokens, session cookies, and access to WebSocket-based terminal sessions on managed servers.
CWE-20
Aug 27, 2025
CVE-2025-20265
10.0
CRITICAL
3 PoCs
Analysis
EPSS 0.00
Cisco Secure Firewall Management Center - Command Injection
A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.
This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level.
Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.
CWE-74
Aug 14, 2025
CVE-2025-57515
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Uniclare Student Portal <v2 - SQL Injection
A SQL injection vulnerability has been identified in Uniclare Student Portal v2. This flaw allows remote attackers to inject arbitrary SQL commands via vulnerable input fields, enabling the execution of time-delay functions to infer database responses.
CWE-89
Oct 06, 2025
CVE-2025-10585
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.01
Google Chrome < 140.0.7339.185 - Type Confusion
Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843
Sep 24, 2025
CVE-2025-59359
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Chaos-mesh Chaos Mesh < 2.7.3 - OS Command Injection
The cleanTcs mutation in Chaos Controller Manager is vulnerable to OS command injection. In conjunction with CVE-2025-59358, this allows unauthenticated in-cluster attackers to perform remote code execution across the cluster.
CWE-78
Sep 15, 2025
CVE-2025-54914
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Microsoft Azure Networking - Improper Access Control
Azure Networking Elevation of Privilege Vulnerability
CWE-284
Sep 04, 2025
CVE-2025-55746
9.3
CRITICAL
1 PoC
Analysis
EPSS 0.00
Directus <11.9.3 - File Upload
Directus is a real-time API and App dashboard for managing SQL database content. From 10.8.0 to before 11.9.3, a vulnerability exists in the file update mechanism which allows an unauthenticated actor to modify existing files with arbitrary contents (without changes being applied to the files' database-resident metadata) and / or upload new files, with arbitrary content and extensions, which won't show up in the Directus UI. This vulnerability is fixed in 11.9.3.
CWE-434
Aug 20, 2025
CVE-2025-42957
9.9
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.00
SAP S/4HANA - Code Injection
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
CWE-94
Aug 12, 2025
CVE-2025-5095
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Burk Technology ARC Solo - Auth Bypass
Burk Technology ARC Solo's password change mechanism can be utilized without proper
authentication procedures, allowing an attacker to take over the device.
A password change request can be sent directly to the device's HTTP
endpoint without providing valid credentials. The system does not
enforce proper authentication or session validation, allowing the
password change to proceed without verifying the request's legitimacy.
CWE-306
Aug 08, 2025
CVE-2025-58443
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.12
FOG <1.5.10.1673 - Auth Bypass
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CWE-287
Sep 06, 2025
CVE-2025-53693
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Sitecore XM/X <10.5 - Cache Poisoning
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.
CWE-470
Sep 03, 2025
CVE-2025-2776
9.3
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.63
SysAid On-Prem <= 23.3.40 - XML External Entity
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.
CWE-611
May 07, 2025
CVE-2025-55575
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
SMM Panel 3.1 - SQL Injection
SQL Injection vulnerability in SMM Panel 3.1 allowing remote attackers to gain sensitive information via a crafted HTTP request with action=service_detail.
CWE-89
Aug 25, 2025
CVE-2025-53632
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Chall-Manager - Path Traversal
Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.
CWE-22
Jul 10, 2025
CVE-2025-34036
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.19
TVT White-Labeled DVR - Command Injection
An OS command injection vulnerability exists in white-labeled DVRs manufactured by TVT, affecting a custom HTTP service called "Cross Web Server" that listens on TCP ports 81 and 82. The web interface fails to sanitize input in the URI path passed to the language extraction functionality. When the server processes a request to /language/[lang]/index.html, it uses the [lang] input unsafely in a tar extraction command without proper escaping. This allows an unauthenticated remote attacker to inject shell commands and achieve arbitrary command execution as root. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
CWE-78
Jun 24, 2025
CVE-2025-25256
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.45
Fortinet FortiSIEM - OS Command Injection
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
CWE-78
Aug 12, 2025