Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,727 CVEs tracked 53,701 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,078 Nuclei templates 52,396 vendors 43,936 researchers
53,701 results Clear all
CVE-2025-5840 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
SourceCodester Client DBMS 1.0 - Unrestricted Upload
A vulnerability, which was classified as critical, was found in SourceCodester Client Database Management System 1.0. This affects an unknown part of the file /user_update_customer_order.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to initiate the attack remotely.
CWE-284 Jun 07, 2025
CVE-2025-22870 4.4 MEDIUM 1 PoC Analysis EPSS 0.00
Proxy Pattern - Info Disclosure
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
CWE-115 Mar 12, 2025
CVE-2025-31131 8.6 HIGH SSVC PoC 3 PoCs Analysis NUCLEI EPSS 0.08
Yeswiki < 4.5.2 - Unauthenticated Path Traversal
YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
CWE-22 Apr 01, 2025
CVE-2025-42999 9.1 CRITICAL KEV SSVC ACTIVE RANSOMWARE 1 PoC Analysis EPSS 0.48
SAP NetWeaver Visual Composer Metadata Uploader - Code Injection
SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
CWE-502 May 13, 2025
CVE-2025-27580 7.5 HIGH 1 PoC Analysis EPSS 0.01
NIH BRICS <14.0.0-67 - Privilege Escalation
NIH BRICS (aka Biomedical Research Informatics Computing System) through 14.0.0-67 generates predictable tokens (that depend on username, time, and the fixed 7Dl9#dj- string) and thus allows unauthenticated users with a Common Access Card (CAC) to escalate privileges and compromise any account, including administrators.
CWE-335 Apr 24, 2025
CVE-2025-52122 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.00
Freeform <5.10.16 - Code Injection
Freeform 5.0.0 to before 5.10.16, a plugin for CraftCMS, contains an Server-side template injection (SSTI) vulnerability, resulting in arbitrary code injection for all users that have access to editing a form (submission title).
CWE-1336 Aug 27, 2025
CVE-2025-5054 4.7 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Canonical apport <2.32.0 - Info Disclosure
Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).
CWE-362 May 30, 2025
CVE-2025-3419 7.5 HIGH 1 PoC Analysis EPSS 0.00
Eventin plugin <4.0.26 - Info Disclosure
The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 4.0.26 via the proxy_image() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. CVE-2025-47445 is a duplicate of this vulnerability.
CWE-73 May 08, 2025
CVE-2025-3054 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.01
WP User Frontend Pro <4.1.3 - Code Injection
The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this requires the 'Private Message' module to be enabled and the Business version of the PRO software to be in use.
CWE-434 Jun 05, 2025
CVE-2025-46701 7.3 HIGH 2 PoCs Analysis EPSS 0.00
Apache Tomcat <11.0.6 - Security Constraint Bypass
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
CWE-178 May 29, 2025
CVE-2025-45542 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.01
Vishalmathur Cloudclassroom-php Project - SQL Injection
SQL injection vulnerability in the registrationform endpoint of CloudClassroom-PHP-Project v1.0. The pass parameter is vulnerable due to improper input validation, allowing attackers to inject SQL queries.
CWE-89 Jun 02, 2025
CVE-2025-46816 9.4 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.00
goshs <1.0.5 - Command Injection
goshs is a SimpleHTTPServer written in Go. Starting in version 0.3.4 and prior to version 1.0.5, running goshs without arguments makes it possible for anyone to execute commands on the server. The function `dispatchReadPump` does not checks the option cli `-c`, thus allowing anyone to execute arbitrary command through the use of websockets. Version 1.0.5 fixes the issue.
CWE-284 May 06, 2025
CVE-2025-4632 9.8 CRITICAL KEV SSVC ACTIVE 1 PoC Analysis NUCLEI EPSS 0.49
Samsung MagicINFO <21.1052 - Path Traversal
Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1052 allows attackers to write arbitrary file as system authority.
CWE-22 May 13, 2025
CVE-2025-46047 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Silverpeas < 6.4.3 - Improper Input Validation
A User enumeration vulnerability in the /CredentialsServlet/ForgotPassword endpoint in Silverpeas 6.4.1 and 6.4.2 allows remote attackers to determine valid usernames via the Login parameter.
CWE-20 Sep 02, 2025
CVE-2025-49223 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Naver Billboard.js < 3.15.1 - Prototype Pollution
billboard.js before 3.15.1 was discovered to contain a prototype pollution via the function generate, which could allow attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
CWE-1321 Jun 04, 2025
CVE-2025-32873 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Django < 4.2.21 - Resource Allocation Without Limits
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags().
CWE-770 May 08, 2025
CVE-2025-44148 9.8 CRITICAL SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.15
Mailenable < 10.00 - XSS
Cross Site Scripting (XSS) vulnerability in MailEnable before v10 allows a remote attacker to execute arbitrary code via the failure.aspx component
CWE-79 Jun 03, 2025
CVE-2025-46203 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Changeweb Unifiedtransform - Incorrect Privilege Assignment
An issue in Unifiedtransform v2.0 allows a remote attacker to escalate privileges via the /students/edit/{id} endpoint.
CWE-266 Jun 04, 2025
CVE-2025-46204 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Unifiedtransform v2.0 - Privilege Escalation
An issue in Unifiedtransform v2.0 allows a remote attacker to escalate privileges via the /course/edit/{id} endpoint.
CWE-266 Jun 04, 2025
CVE-2025-27590 9.0 CRITICAL 1 PoC Analysis EPSS 0.13
Oxidized Web < 0.15.0 - Path Traversal
In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web.
CWE-22 Mar 03, 2025