Critical Vulnerabilities with Public Exploits

Updated 36m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
4,101 results Clear all
CVE-2025-22968 9.8 CRITICAL 2 PoCs Analysis EPSS 0.42
Dlink Dwr-m972v Firmware - Code Injection
An issue in D-Link DWR-M972V 1.05SSG allows a remote attacker to execute arbitrary code via SSH using root account without restrictions
CWE-94 Jan 15, 2025
CVE-2025-28009 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Appventure Dietiqa - SQL Injection
A SQL Injection vulnerability exists in the `u` parameter of the progress-body-weight.php endpoint of Dietiqa App v1.0.20.
CWE-89 Apr 17, 2025
CVE-2025-24797 9.4 CRITICAL 1 PoC Analysis EPSS 0.02
Meshtastic Firmware < 2.6.2 - Memory Corruption
Meshtastic is an open source mesh networking solution. A fault in the handling of mesh packets containing invalid protobuf data can result in an attacker-controlled buffer overflow, allowing an attacker to hijack execution flow, potentially resulting in remote code execution. This attack does not require authentication or user interaction, as long as the target device rebroadcasts packets on the default channel. This vulnerability fixed in 2.6.2.
CWE-119 Apr 15, 2025
CVE-2025-30967 9.6 CRITICAL 1 PoC Analysis EPSS 0.00
NotFound WPJobBoard - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in NotFound WPJobBoard wpjobboard allows Upload a Web Shell to a Web Server.This issue affects WPJobBoard: from n/a through < 5.11.1.
CWE-352 Apr 15, 2025
CVE-2025-22953 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Epicor Human Capital Management - SQL Injection
A SQL injection vulnerability exists in Epicor HCM 2021 1.9, with patches available: 5.16.0.1033/HCM2022, 5.17.0.1146/HCM2023, and 5.18.0.573/HCM2024. The injection is specifically in the filter parameter of the JsonFetcher.svc endpoint. An attacker can exploit this vulnerability by injecting malicious SQL payloads into the filter parameter, enabling the unauthorized execution of arbitrary SQL commands on the backend database. If certain features (like xp_cmdshell) are enabled, this may lead to remote code execution.
CWE-89 Mar 28, 2025
CVE-2025-50251 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
makeplane plane <0.23.1 - SSRF
Server side request forgery (SSRF) vulnerability in makeplane plane 0.23.1 via the password recovery.
CWE-918 Aug 13, 2025
CVE-2025-2777 9.3 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.23
SysAid On-Prem <= 23.3.40 - XML External Entity
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the lshw processing functionality, allowing for administrator account takeover and file read primitives.
CWE-611 May 07, 2025
CVE-2025-30216 9.4 CRITICAL 1 PoC Analysis EPSS 0.06
CryptoLib <1.3.3 - Buffer Overflow
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, a Heap Overflow vulnerability occurs in the `Crypto_TM_ProcessSecurity` function (`crypto_tm.c:1735:8`). When processing the Secondary Header Length of a TM protocol packet, if the Secondary Header Length exceeds the packet's total length, a heap overflow is triggered during the memcpy operation that copies packet data into the dynamically allocated buffer `p_new_dec_frame`. This allows an attacker to overwrite adjacent heap memory, potentially leading to arbitrary code execution or system instability. A patch is available at commit 810fd66d592c883125272fef123c3240db2f170f.
CWE-122 Mar 25, 2025
CVE-2025-2620 9.8 CRITICAL 1 PoC Analysis EPSS 0.36
D-Link DAP-1620 1.03 - Buffer Overflow
A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-119 Mar 22, 2025
CVE-2025-2512 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
File Away < 3.9.9.0.1 - Unrestricted File Upload
The File Away plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check and missing file type validation in the upload() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Mar 19, 2025
CVE-2025-29384 9.8 CRITICAL 1 PoC Analysis EPSS 0.10
Tenda Ac9 Firmware - Out-of-Bounds Write
In Tenda AC9 v1.0 V15.03.05.14_multi, the wanMTU parameter of /goform/AdvSetMacMtuWan has a stack overflow vulnerability, which can lead to remote arbitrary code execution.
CWE-787 Mar 14, 2025
CVE-2025-22954 10.0 CRITICAL 1 PoC Analysis EPSS 0.21
Koha <24.11.02 - SQL Injection
GetLateOrMissingIssues in C4/Serials.pm in Koha before 24.11.02 allows SQL Injection in /serials/lateissues-export.pl via the supplierid or serialid parameter.
CWE-89 Mar 12, 2025
CVE-2025-22604 9.1 CRITICAL 1 PoC Analysis EPSS 0.72
Cacti < 1.2.29 - OS Command Injection
Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
CWE-78 Jan 27, 2025
CVE-2025-25650 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 - Info Disclosure
An issue in the storage of NFC card data in Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 allows attackers to produce cloned NFC cards to bypass authentication.
CWE-522 Mar 17, 2025
CVE-2025-0364 9.8 CRITICAL 1 PoC Analysis EPSS 0.22
BigAntSoft BigAnt Server <5.6.06 - RCE
BigAntSoft BigAnt Server, up to and including version 5.6.06, is vulnerable to unauthenticated remote code execution via account registration. An unauthenticated remote attacker can create an administrative user through the default exposed SaaS registration mechanism. Once an administrator, the attacker can upload and execute arbitrary PHP code using the "Cloud Storage Addin," leading to unauthenticated code execution.
CWE-288 Feb 04, 2025
CVE-2025-26206 9.0 CRITICAL 1 PoC Analysis EPSS 0.00
Selldone Storefront - CSRF
Cross Site Request Forgery vulnerability in sell done storefront v.1.0 allows a remote attacker to escalate privileges via the index.html component
CWE-352 Mar 03, 2025
CVE-2025-22785 9.3 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.11
ComMotion Course Booking System <6.0.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ComMotion Course Booking System course-booking-system allows SQL Injection.This issue affects Course Booking System: from n/a through <= 6.0.6.
CWE-89 Jan 15, 2025
CVE-2025-22912 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Edimax Re11s Firmware - Command Injection
RE11S v1.11 was discovered to contain a command injection vulnerability via the component /goform/formAccept.
CWE-77 Jan 16, 2025
CVE-2025-25038 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.29
MiniDVBLinux <5.4 - Command Injection
An OS command injection vulnerability exists in MiniDVBLinux version 5.4 and earlier. The system’s web-based management interface fails to properly sanitize user-supplied input before passing it to operating system commands. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary commands as the root user, potentially compromising the entire device. Exploitation evidence was observed by the Shadowserver Foundation on 2024-04-10 UTC.
CWE-78 Jun 20, 2025
CVE-2025-34035 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.10
EnGenius EnShare Cloud Service <1.4.11 - Command Injection
An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2024-12-05 UTC.
CWE-78 Jun 24, 2025