Latest Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,701 results
Clear all
CVE-2025-4840
7.5
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Erumfaham Likes And Dislikes < 1.0.0 - SQL Injection
The inprosysmedia-likes-dislikes-post WordPress plugin through 1.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CWE-89
Jun 10, 2025
CVE-2025-21574
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Oracle Mysql Cluster < 7.6.33 - Denial of Service
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CWE-400
Apr 15, 2025
CVE-2025-6970
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.33
Pixelite Events Manager < 6.6.5 - SQL Injection
The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 7.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Jul 09, 2025
CVE-2025-6759
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Citrix Virtual Apps And Desktops - Improper Privilege Management
Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Windows Virtual Delivery Agent for CVAD and Citrix DaaS
CWE-269
Jul 08, 2025
CVE-2025-53547
8.5
HIGH
1 PoC
Analysis
EPSS 0.00
Helm <3.18.4 - Local Code Execution
Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.
CWE-94
Jul 08, 2025
CVE-2025-4866
6.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Weibo Rill-flow - Injection
A vulnerability was found in weibocom rill-flow 0.1.18. It has been classified as critical. Affected is an unknown function of the component Management Console. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-74
May 18, 2025
CVE-2025-47228
6.7
MEDIUM
SSVC PoC
2 PoCs
Analysis
EPSS 0.05
Netmake ScriptCase <9.12.006 - Command Injection
In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), shell injection in the SSH connection settings allows authenticated attackers to execute system commands via crafted HTTP requests.
CWE-78
Jul 05, 2025
CVE-2025-47175
7.8
HIGH
2 PoCs
Analysis
EPSS 0.01
Microsoft 365 Apps - Use After Free
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CWE-416
Jun 10, 2025
CVE-2025-47171
6.7
MEDIUM
1 PoC
Analysis
EPSS 0.03
Microsoft Office - Improper Input Validation
Improper input validation in Microsoft Office Outlook allows an authorized attacker to execute code locally.
CWE-20
Jun 10, 2025
CVE-2025-47161
7.8
HIGH
1 PoC
Analysis
EPSS 0.06
Microsoft Defender For Endpoint - Improper Access Control
Improper access control in Microsoft Defender for Endpoint allows an authorized attacker to elevate privileges locally.
CWE-284
May 15, 2025
CVE-2025-31650
7.5
HIGH
8 PoCs
Analysis
EPSS 0.10
Apache Tomcat <9.0.103 - DoS
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.
This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.90 though 8.5.100.
Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
CWE-459
Apr 28, 2025
CVE-2025-29628
9.4
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.00
Gardyn 4 - Info Disclosure, RCE
A Gardyn Azure IoT Hub connection string is downloaded over an insecure HTTP connection in Gardyn Home Kit firmware before master.619, Home Kit Mobile Application before 2.11.0, and Home Kit Cloud API before 2.12.2026 leaving the string vulnerable to interception and modification through a Man-in-the-Middle attack. This may result in the attacker capturing device credentials or taking control of vulnerable home kits.
CWE-200
Jul 25, 2025
CVE-2025-6907
7.3
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Anisha Car Rental System - Injection
A vulnerability classified as critical was found in code-projects Car Rental System 1.0. This vulnerability affects unknown code of the file /book_car.php. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-74
Jun 30, 2025
CVE-2025-27817
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.20
Apache Kafka Client - Arbitrary File Read
A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url" configuratin to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products.
Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly.
CWE-918
Jun 10, 2025
CVE-2025-6543
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
EPSS 0.02
NetScaler ADC & Gateway < - Buffer Overflow
Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
CWE-119
Jun 25, 2025
CVE-2025-38089
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Linux kernel - Use After Free
In the Linux kernel, the following vulnerability has been resolved:
sunrpc: handle SVC_GARBAGE during svc auth processing as auth error
tianshuo han reported a remotely-triggerable crash if the client sends a
kernel RPC server a specially crafted packet. If decoding the RPC reply
fails in such a way that SVC_GARBAGE is returned without setting the
rq_accept_statp pointer, then that pointer can be dereferenced and a
value stored there.
If it's the first time the thread has processed an RPC, then that
pointer will be set to NULL and the kernel will crash. In other cases,
it could create a memory scribble.
The server sunrpc code treats a SVC_GARBAGE return from svc_authenticate
or pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531
says that if authentication fails that the RPC should be rejected
instead with a status of AUTH_ERR.
Handle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of
AUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This
sidesteps the whole problem of touching the rpc_accept_statp pointer in
this situation and avoids the crash.
CWE-476
Jun 30, 2025
CVE-2025-47166
8.8
HIGH
1 PoC
Analysis
EPSS 0.14
Microsoft Sharepoint Enterprise Server - Insecure Deserialization
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CWE-502
Jun 10, 2025
CVE-2025-6860
6.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
SourceCodester Best Salon Management System 1.0 - SQL Injection
A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /panel/staff_commision.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-74
Jun 29, 2025
CVE-2025-6916
8.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Totolink T6 Firmware - Missing Authentication
A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1.5cu.748_B20211015. This affects the function Form_Login of the file /formLoginAuth.htm. The manipulation of the argument authCode/goURL leads to missing authentication. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used.
CWE-287
Jun 30, 2025
CVE-2025-6586
7.2
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
WordPress Download Plugin <2.2.8 - RCE
The Download Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the dpwap_plugin_locInstall function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Jul 04, 2025