Latest Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,727 CVEs tracked 53,701 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,078 Nuclei templates 52,396 vendors 43,936 researchers
53,701 results Clear all
CVE-2025-5329 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Martcode Software Inc. Delta Course Automation through 04022026 <4.02.2026 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Martcode Software Inc. Delta Course Automation allows SQL Injection.This issue affects Delta Course Automation: through 04022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-89 Feb 04, 2026
CVE-2025-5319 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
DIGITA Efficiency Management System <03022026 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Informatics and Communication Technologies Industry and Trade Ltd. Co. DIGITA Efficiency Management System allows SQL Injection.This issue affects DIGITA Efficiency Management System: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-89 Feb 03, 2026
CVE-2025-46080 5.3 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Huocms - Unrestricted File Upload
HuoCMS V3.5.1 has a File Upload Vulnerability. An attacker can exploit this flaw to bypass whitelist restrictions and craft malicious files with specific suffixes, thereby gaining control of the server.
CWE-434 May 29, 2025
CVE-2025-46078 5.3 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Huocms - Unrestricted File Upload
HuoCMS V3.5.1 and before is vulnerable to file upload, which allows attackers to take control of the target server
CWE-434 May 29, 2025
CVE-2025-5298 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Campcodes Online Hospital Management System - Injection
A vulnerability, which was classified as critical, was found in Campcodes Online Hospital Management System 1.0. Affected is an unknown function of the file /admin/betweendates-detailsreports.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-74 May 28, 2025
CVE-2025-4094 9.8 CRITICAL 3 PoCs Analysis EPSS 0.03
DIGITS: WordPress Mobile <8.4.6.1 - Info Disclosure
The DIGITS: WordPress Mobile Number Signup and Login WordPress plugin before 8.4.6.1 does not rate limit OTP validation attempts, making it straightforward for attackers to bruteforce them.
May 21, 2025
CVE-2025-4971 HIGH 1 PoC Analysis EPSS 0.01
Broadcom Automic Automation Agent Unix <24.3.0 HF4-21.0.13 HF1 - Pr...
Broadcom Automic Automation Agent Unix versions < 24.3.0 HF4 and < 21.0.13 HF1 allow low privileged users who have execution rights on the agent executable to escalate their privileges.
CWE-426 May 20, 2025
CVE-2025-4389 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Crawlomatic Multipage Scraper Post Generator <2.6.8.1 - File Upload
The Crawlomatic Multipage Scraper Post Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the crawlomatic_generate_featured_image() function in all versions up to, and including, 2.6.8.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 May 17, 2025
CVE-2025-5196 6.6 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.01
Wing FTP Server <7.4.3 - Privilege Escalation
A vulnerability has been found in Wing FTP Server up to 7.4.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Lua Admin Console. The manipulation leads to execution with unnecessary privileges. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 7.4.4 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: "[W]e do not consider it as a security vulnerability, because the system admin in WingFTP has full permissions [...], but you can suggest the user run WingFTP service as Normal User rather than SYSTEM/Root, it will be safer."
CWE-250 May 26, 2025
CVE-2025-46173 6.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Code-projects Online Exam Mastering System - XSS
code-projects Online Exam Mastering System 1.0 is vulnerable to Cross Site Scripting (XSS) via the name field in the feedback form.
CWE-79 May 27, 2025
CVE-2025-2907 9.8 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.10
Order Delivery Date Pro for WooCommerce < 12.3.1 - Arbitrary Option Update
The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.
CWE-352 Apr 26, 2025
CVE-2025-48708 4.0 MEDIUM 1 PoC Analysis EPSS 0.00
Artifex Ghostscript <10.05.1 - Info Disclosure
gs_lib_ctx_stash_sanitized_arg in base/gslibctx.c in Artifex Ghostscript before 10.05.1 lacks argument sanitization for the # case. A created PDF document includes its password in cleartext.
CWE-212 May 23, 2025
CVE-2025-46822 HIGH SSVC PoC 2 PoCs Analysis NUCLEI EPSS 0.07
OsamaTaher Java-springboot-codebase - Path Traversal
OsamaTaher/Java-springboot-codebase is a collection of Java and Spring Boot code snippets, applications, and projects. Prior to commit c835c6f7799eacada4c0fc77e0816f250af01ad2, insufficient path traversal mechanisms make absolute path traversal possible. This vulnerability allows unauthorized access to sensitive internal files. Commit c835c6f7799eacada4c0fc77e0816f250af01ad2 contains a patch for the issue.
CWE-36 May 21, 2025
CVE-2025-2594 8.1 HIGH SSVC PoC 2 PoCs Analysis EPSS 0.07
WordPress Plugin <4.1.3 - Auth Bypass
The User Registration & Membership WordPress plugin before 4.1.3 does not properly validate data in an AJAX action when the Membership Addon is enabled, allowing attackers to authenticate as any user, including administrators, by simply using the target account's user ID.
Apr 22, 2025
CVE-2025-25014 9.1 CRITICAL 1 PoC Analysis EPSS 0.03
Kibana - Code Injection
A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.
CWE-1321 May 06, 2025
CVE-2025-46721 6.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
nosurf <1.2.0 - CSRF
nosurf is cross-site request forgery (CSRF) protection middleware for Go. A vulnerability in versions prior to 1.2.0 allows an attacker who controls content on the target site, or on a subdomain of the target site (either via XSS, or otherwise) to bypass CSRF checks and issue requests on user's behalf. Due to misuse of the Go `net/http` library, nosurf categorizes all incoming requests as plain-text HTTP requests, in which case the `Referer` header is not checked to have the same origin as the target webpage. If the attacker has control over HTML contents on either the target website (e.g. `example.com`), or on a website hosted on a subdomain of the target (e.g. `attacker.example.com`), they will also be able to manipulate cookies set for the target website. By acquiring the secret CSRF token from the cookie, or overriding the cookie with a new token known to the attacker, `attacker.example.com` is able to craft cross-site requests to `example.com`. A patch for the issue was released in nosurf 1.2.0. In lieu of upgrading to a patched version of nosurf, users may additionally use another HTTP middleware to ensure that a non-safe HTTP request is coming from the same origin (e.g. by requiring a `Sec-Fetch-Site: same-origin` header in the request).
CWE-352 May 13, 2025
CVE-2025-47181 8.8 HIGH 1 PoC Analysis EPSS 0.02
Microsoft Edge Update < 1.3.195.61 - Symlink Following
Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.
CWE-59 May 22, 2025
CVE-2025-30400 7.8 HIGH KEV SSVC ACTIVE 1 PoC Analysis EPSS 0.01
Windows DWM - Use After Free
Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.
CWE-416 May 13, 2025
CVE-2025-4611 6.4 MEDIUM 1 PoC Analysis EPSS 0.00
Slim SEO - Fast & Automated WordPress SEO Plugin <4.5.3 - XSS
The Slim SEO – Fast & Automated WordPress SEO Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's slim_seo_breadcrumbs shortcode in all versions up to, and including, 4.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79 May 21, 2025
CVE-2025-44998 6.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Prasathmani Tiny File Manager - XSS
A stored cross-site scripting (XSS) vulnerability in the component /tinyfilemanager.php of TinyFileManager v2.4.7 allows attackers to execute arbitrary JavaScript or HTML via injecting a crafted payload into the js-theme-3 parameter.
CWE-79 May 23, 2025