Latest Vulnerabilities with Public Exploits
Updated 17m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,703 results
Clear all
CVE-2025-3969
6.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Codeprojects News Publishing Site Dashboard 1.0 - Unrestricted Upload
A vulnerability was found in codeprojects News Publishing Site Dashboard 1.0. It has been rated as critical. This issue affects some unknown processing of the file /edit-category.php of the component Edit Category Page. The manipulation of the argument category_image leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-284
Apr 27, 2025
CVE-2025-1323
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.26
Plechevandrey Wp-recall < 16.26.12 - SQL Injection
The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to SQL Injection via the 'databeat' parameter in all versions up to, and including, 16.26.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Mar 08, 2025
CVE-2025-24271
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Apple Ipados < 17.7.6 - Missing Authentication
An access issue was addressed with improved access restrictions. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing.
CWE-306
Apr 29, 2025
CVE-2025-43929
4.1
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Kovidgoyal Kitty < 0.41.0 - Origin Validation Error
open_actions.py in kitty before 0.41.0 does not ask for user confirmation before running a local executable file that may have been linked from an untrusted document (e.g., a document opened in KDE ghostwriter).
CWE-346
Apr 20, 2025
CVE-2025-0401
5.3
MEDIUM
SSVC PoC
3 PoCs
Analysis
EPSS 0.00
Reggie 1.0 - Path Traversal
A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-22
Jan 13, 2025
CVE-2025-43919
5.8
MEDIUM
SSVC PoC
3 PoCs
Analysis
EPSS 0.00
GNU Mailman < 2.1.39 - Path Traversal
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
CWE-22
Apr 20, 2025
CVE-2025-3855
4.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
CodeCanyon RISE Ultimate Project Manager 3.8.2 - Improper Control o...
A vulnerability was found in CodeCanyon RISE Ultimate Project Manager 3.8.2 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php/team_members/save_profile_image/ of the component Profile Picture Handler. The manipulation of the argument profile_image_file leads to improper control of resource identifiers. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-99
Apr 22, 2025
CVE-2025-3914
8.8
HIGH
1 PoC
Analysis
EPSS 0.03
Aeropage Sync for Airtable <3.2.0 - Code Injection
The Aeropage Sync for Airtable plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aeropage_media_downloader' function in all versions up to, and including, 3.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Apr 26, 2025
CVE-2025-43865
8.2
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
NPM React-router < 7.5.2 - Data Authenticity Bypass
React Router is a router for React. In versions on the 7.0 branch prior to version 7.5.2, it's possible to modify pre-rendered data by adding a header to the request. This allows to completely spoof its contents and modify all the values of the data object passed to the HTML. This issue has been patched in version 7.5.2.
CWE-345
Apr 25, 2025
CVE-2025-43864
7.5
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
NPM React-router < 7.5.2 - Improper Exception Handling
React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2.
CWE-755
Apr 25, 2025
CVE-2025-2404
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
Ubit STOYS <20250916 - XSS
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ubit Information Technologies STOYS allows Cross-Site Scripting (XSS).This issue affects STOYS: from 2 before 20250916.
CWE-79
Sep 16, 2025
CVE-2025-32965
CRITICAL
1 PoC
Analysis
EPSS 0.00
xrpl.js <4.2.1-4.2.4, 2.14.2 - Code Injection
xrpl.js is a JavaScript/TypeScript API for interacting with the XRP Ledger in Node.js and the browser. Versions 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js were compromised and contained malicious code designed to exfiltrate private keys. Version 2.14.2 is also malicious, though it is less likely to lead to exploitation as it is not compatible with other 2.x versions. Anyone who used one of these versions should stop immediately and rotate any private keys or secrets used with affected systems. Users of xrpl.js should pgrade to version 4.2.5 or 2.14.3 to receive a patch. To secure funds, think carefully about whether any keys may have been compromised by this supply chain attack, and mitigate by sending funds to secure wallets, and/or rotating keys. If any account's master key is potentially compromised, disable the key.
CWE-506
Apr 22, 2025
CVE-2025-50363
5.4
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Phpgurukul Maid Hiring Management System 1.0 - XSS
Phpgurukul Maid Hiring Management System 1.0 is vulnerable to Cross Site Scripting (XSS) in /maid-hiring.php va the name field.
CWE-79
Nov 03, 2025
CVE-2025-31137
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
React-router Express < 7.4.1 - HTTP Request Smuggling
React Router is a multi-strategy router for React bridging the gap from React 18 to React 19. There is a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler. This issue has been patched and released in Remix 2.16.3 and React Router 7.4.1.
CWE-444
Apr 01, 2025
CVE-2025-24963
5.9
MEDIUM
SSVC PoC
2 PoCs
Analysis
NUCLEI
EPSS 0.24
Vitest Browser Mode - Local File Read
Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handler from remote to get the content of arbitrary files.This `__screenshot-error` handler on the browser mode HTTP server responds any file on the file system. This code was added by commit `2d62051`. Users explicitly exposing the browser mode server to the network by `browser.api.host: true` may get any files exposed. This issue has been addressed in versions 2.1.9 and 3.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-22
Feb 04, 2025
CVE-2025-29529
6.5
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
ITC Systems Multiplan/Matrix OneCard <3.7.4.1002 - SQL Injection
ITC Systems Multiplan/Matrix OneCard platform v3.7.4.1002 was discovered to contain a SQL injection vulnerability via the component Forgotpassword.aspx.
CWE-89
Apr 24, 2025
CVE-2025-28121
6.1
MEDIUM
SSVC PoC
2 PoCs
Analysis
EPSS 0.01
Code-projects Online Exam Mastering System - XSS
code-projects Online Exam Mastering System 1.0 is vulnerable to Cross Site Scripting (XSS) in feedback.php via the "q" parameter allowing remote attackers to execute arbitrary code.
CWE-79
Apr 21, 2025
CVE-2025-43921
5.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
GNU Mailman < 2.1.39 - Incorrect Authorization
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
CWE-863
Apr 20, 2025
CVE-2025-43920
5.4
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.01
GNU Mailman < 2.1.39 - OS Command Injection
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
CWE-78
Apr 20, 2025
CVE-2025-28355
4.7
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Personal-management-system Personal Management System - CSRF
Volmarg Personal Management System 1.4.65 is vulnerable to Cross Site Request Forgery (CSRF) allowing attackers to execute arbitrary code and obtain sensitive information via the SameSite cookie attribute defaults value set to none
CWE-352
Apr 18, 2025