Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,701 results
Clear all
CVE-2025-44137
8.2
HIGH
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.00
Maptiler Tileserver Php - Path Traversal
MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
CWE-22
Jul 29, 2025
CVE-2025-44136
9.8
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.11
Maptiler Tileserver Php - XSS
MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter "layer" is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim's browser.
CWE-79
Jul 29, 2025
CVE-2025-27415
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Nuxt <3.16.0 - SSRF
Nuxt is an open-source web development framework for Vue.js. Prior to 3.16.0, by sending a crafted HTTP request to a server behind an CDN, it is possible in some circumstances to poison the CDN cache and highly impacts the availability of a site. It is possible to craft a request, such as https://mysite.com/?/_payload.json which will be rendered as JSON. If the CDN in front of a Nuxt site ignores the query string when determining whether to cache a route, then this JSON response could be served to future visitors to the site. An attacker can perform this attack to a vulnerable site in order to make a site unavailable indefinitely. It is also possible in the case where the cache will be reset to make a small script to send a request each X seconds (=caching duration) so that the cache is permanently poisoned making the site completely unavailable. This vulnerability is fixed in 3.16.0.
CWE-349
Mar 19, 2025
CVE-2025-7605
7.3
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
AVL Rooms 1.0 - SQL Injection
A vulnerability was found in code-projects AVL Rooms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /profile.php. The manipulation of the argument first_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-74
Jul 14, 2025
CVE-2025-7606
7.3
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
code-projects AVL Rooms 1.0 - SQL Injection
A vulnerability classified as critical has been found in code-projects AVL Rooms 1.0. This affects an unknown part of the file /city.php. The manipulation of the argument city leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-74
Jul 14, 2025
CVE-2025-26159
6.1
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Nasirkhan Laravel-starter < 11.11.0 - XSS
Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field.
CWE-79
Apr 22, 2025
CVE-2025-52357
4.1
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
FiberHome FD602GW-DX-R410 V2.2.14 - XSS
Cross-Site Scripting (XSS) vulnerability exists in the ping diagnostic feature of FiberHome FD602GW-DX-R410 router (firmware V2.2.14), allowing an authenticated attacker to execute arbitrary JavaScript code in the context of the router s web interface. The vulnerability is triggered via user-supplied input in the ping form field, which fails to sanitize special characters. This can be exploited to hijack sessions or escalate privileges through social engineering or browser-based attacks.
CWE-79
Jul 09, 2025
CVE-2025-47933
9.0
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
Argoproj Argo CD < 2.13.8 - XSS
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.13.8, 2.14.13, and 3.0.4, an attacker can perform arbitrary actions on behalf of the victim via the API. Due to the improper filtering of URL protocols in the repository page, an attacker can achieve cross-site scripting with permission to edit the repository. This issue has been patched in versions 2.13.8, 2.14.13, and 3.0.4.
CWE-79
May 29, 2025
CVE-2025-1753
7.8
HIGH
SSVC PoC
1 PoC
1 Writeup
Analysis
EPSS 0.00
LLama-Index CLI <0.12.20 - Command Injection
LLama-Index CLI version v0.12.20 contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the `--files` argument, which is directly passed into `os.system`. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system.
CWE-78
May 28, 2025
CVE-2025-47277
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.01
Vllm < 0.8.5 - Insecure Deserialization
vLLM, an inference and serving engine for large language models (LLMs), has an issue in versions 0.6.5 through 0.8.4 that ONLY impacts environments using the `PyNcclPipe` KV cache transfer integration with the V0 engine. No other configurations are affected. vLLM supports the use of the `PyNcclPipe` class to establish a peer-to-peer communication domain for data transmission between distributed nodes. The GPU-side KV-Cache transmission is implemented through the `PyNcclCommunicator` class, while CPU-side control message passing is handled via the `send_obj` and `recv_obj` methods on the CPU side. The intention was that this interface should only be exposed to a private network using the IP address specified by the `--kv-ip` CLI parameter. The vLLM documentation covers how this must be limited to a secured network. The default and intentional behavior from PyTorch is that the `TCPStore` interface listens on ALL interfaces, regardless of what IP address is provided. The IP address given was only used as a client-side address to use. vLLM was fixed to use a workaround to force the `TCPStore` instance to bind its socket to a specified private interface. As of version 0.8.5, vLLM limits the `TCPStore` socket to the private interface as configured.
CWE-502
May 20, 2025
CVE-2025-43859
9.1
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
Pypi H11 < 0.16.0 - HTTP Request Smuggling
h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.
CWE-444
Apr 24, 2025
CVE-2025-31489
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.05
MinIO - Incomplete Signature Validation for Unsigned-Trailer Uploads
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. The signature component of the authorization may be invalid, which would mean that as a client you can use any arbitrary secret to upload objects given the user already has prior WRITE permissions on the bucket. Prior knowledge of access-key, and bucket name this user might have access
to - and an access-key with a WRITE permissions is necessary. However with relevant information in place, uploading random objects to buckets is trivial and easy via curl. This issue is fixed in RELEASE.2025-04-03T14-56-28Z.
CWE-347
Apr 03, 2025
CVE-2025-27095
4.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
JumpServer <4.8.0, 3.10.18 - Privilege Escalation
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18.
CWE-266
Mar 31, 2025
CVE-2025-27834
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Artifex Ghostscript < 10.05.0 - Buffer Overflow
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs via an oversized Type 4 function in a PDF document to pdf/pdf_func.c.
CWE-120
Mar 25, 2025
CVE-2025-29783
9.0
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.03
Vllm < 0.8.0 - Insecure Deserialization
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. When vLLM is configured to use Mooncake, unsafe deserialization exposed directly over ZMQ/TCP on all network interfaces will allow attackers to execute remote code on distributed hosts. This is a remote code execution vulnerability impacting any deployments using Mooncake to distribute KV across distributed hosts. This vulnerability is fixed in 0.8.0.
CWE-502
Mar 19, 2025
CVE-2025-25015
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.01
Kibana <8.17.1 - RCE
Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests.
In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors
CWE-1321
Mar 05, 2025
CVE-2025-0851
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.37
Ai.djl API < 0.31.1 - Path Traversal
A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.
CWE-36
Jan 29, 2025
CVE-2025-0291
8.8
HIGH
1 PoC
Analysis
EPSS 0.12
Google Chrome <131.0.6778.264 - RCE
Type Confusion in V8 in Google Chrome prior to 131.0.6778.264 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE-843
Jan 08, 2025
CVE-2025-45778
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
Languagesloth The Language Sloth - XSS
A stored cross-site scripting (XSS) vulnerability in The Language Sloth Web Application v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Description text field.
CWE-79
Aug 01, 2025
CVE-2025-4578
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.01
Dimdavid File Provider < 1.2.3 - SQL Injection
The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CWE-89
Jun 04, 2025