Latest Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,727 CVEs tracked 53,701 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,078 Nuclei templates 52,396 vendors 43,936 researchers
53,701 results Clear all
CVE-2025-46099 7.2 HIGH 1 PoC Analysis EPSS 0.00
Pluck - Unrestricted File Upload
In Pluck CMS 4.7.20-dev, an authenticated attacker can upload or create a crafted PHP file under the albums module directory and access it via the module routing logic in albums.site.php, resulting in arbitrary command execution through a GET parameter.
CWE-434 Jul 23, 2025
CVE-2025-47176 7.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.01
Microsoft 365 Apps - Path Traversal
'.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally.
CWE-22 Jun 10, 2025
CVE-2025-7753 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
code-projects Online Appointment Booking System 1.0 - SQL Injection
A vulnerability was found in code-projects Online Appointment Booking System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/adddoctor.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Jul 17, 2025
CVE-2025-44608 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Vishalmathur Cloudclassroom-php Project - SQL Injection
CloudClassroom-PHP Project v1.0 was discovered to contain a SQL injection vulnerability via the viewid parameter.
CWE-89 Jul 25, 2025
CVE-2025-2135 8.8 HIGH 2 PoCs Analysis EPSS 0.03
Google Chrome <134.0.6998.88 - Heap Corruption
Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Mar 10, 2025
CVE-2025-52688 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.00
Access Point <unknown> - Command Injection
Successful exploitation of the vulnerability could allow an attacker to inject commands with root privileges on the access point, potentially leading to the loss of confidentiality, integrity, availability, and full control of the access point.
CWE-77 Jul 16, 2025
CVE-2025-4660 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
SecureConnector - RCE
A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent.  This does not impact Linux or OSX Secure Connector.
CWE-276 May 13, 2025
CVE-2025-52689 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.01
Firmware - Privilege Escalation
Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point.
CWE-384 Jul 16, 2025
CVE-2025-52089 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.03
Totolink N300rb Firmware - Missing Authentication
A hidden remote support feature protected by a static secret in TOTOLINK N300RB firmware version 8.54 allows an authenticated attacker to execute arbitrary OS commands with root privileges.
CWE-306 Jul 11, 2025
CVE-2025-44177 8.2 HIGH EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.09
WSS Protop - Path Traversal
A directory traversal vulnerability was discovered in White Star Software Protop version 4.4.2-2024-11-27, specifically in the /pt3upd/ endpoint. An unauthenticated attacker can remotely read arbitrary files on the underlying OS using encoded traversal sequences.
CWE-22 Jul 09, 2025
CVE-2025-49744 7.0 HIGH 1 PoC Analysis EPSS 0.02
Microsoft Windows 10 1507 < 10.0.10240.21073 - Race Condition
Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
CWE-362 Jul 08, 2025
CVE-2025-49677 7.0 HIGH 1 PoC Analysis EPSS 0.02
Microsoft Windows 11 22h2 < 10.0.22621.5624 - Use After Free
Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
CWE-416 Jul 08, 2025
CVE-2025-6563 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
MikroTik RouterOS <7.19.2 - XSS
A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.
CWE-20 Jul 03, 2025
CVE-2025-23167 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Node.js 20 - Request Smuggling
A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`. This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests. The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination. Impact: * This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.
CWE-444 May 19, 2025
CVE-2025-5349 8.8 HIGH 1 PoC Analysis EPSS 0.00
NetScaler ADC & Gateway - Info Disclosure
Improper access control on the NetScaler Management Interface in NetScaler ADC and NetScaler Gateway
CWE-1284 Jun 17, 2025
CVE-2025-50492 7.5 HIGH 1 PoC 1 Writeup Analysis EPSS 0.00
PHPGurukul e-Diary Mgt <v1 - Session Hijacking
Improper session invalidation in the component /edms/change-password.php of PHPGurukul e-Diary Management System v1 allows attackers to execute a session hijacking attack.
CWE-20 Jul 28, 2025
CVE-2025-45953 9.1 CRITICAL SSVC PoC 1 PoC 1 Writeup Analysis EPSS 0.00
PHPGurukul Hostel Mgt Sys 2.1 - Session Hijacking
A vulnerability was found in PHPGurukul Hostel Management System 2.1 in the /hostel/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely
CWE-384 Apr 28, 2025
CVE-2025-45949 9.8 CRITICAL SSVC PoC 1 PoC 1 Writeup Analysis EPSS 0.00
PHPGurukul User Registration & Login and User Management System V3.3 - Session Hijacking
A critical vulnerability was found in PHPGurukul User Registration & Login and User Management System V3.3 in the /loginsystem/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely and leading to account takeover.
CWE-384 Apr 28, 2025
CVE-2025-45947 9.8 CRITICAL SSVC PoC 1 PoC 1 Writeup Analysis EPSS 0.01
Phpgurukul Online Banquet Booking System - Code Injection
An issue in phpgurukul Online Banquet Booking System V1.2 allows an attacker to execute arbitrary code via the /obbs/change-password.php file of the My Account - Change Password component
CWE-94 Apr 28, 2025
CVE-2025-0316 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
WP Directorybox Manager <2.5 - Auth Bypass
The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
CWE-288 Feb 08, 2025