Latest Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,760 CVEs tracked 53,703 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 52,442 vendors 43,944 researchers
53,703 results Clear all
CVE-2025-34506 8.8 HIGH SSVC PoC 1 PoC Analysis EPSS 0.01
Wbce Cms < 1.6.3 - Unrestricted File Upload
WBCE CMS version 1.6.3 and prior contains an authenticated remote code execution vulnerability that allows administrators to upload malicious modules. Attackers can craft a specially designed ZIP module with embedded PHP reverse shell code to gain remote system access when the module is installed.
CWE-434 Dec 11, 2025
CVE-2025-22223 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Spring Security 6.4.0-6.4.3 - Auth Bypass
Spring Security 6.4.0 - 6.4.3 may not correctly locate method security annotations on parameterized types or methods. This may cause an authorization bypass.  You are not affected if you are not using @EnableMethodSecurity, or you do not have method security annotations on parameterized types or methods, or all method security annotations are attached to target methods
CWE-290 Mar 24, 2025
CVE-2025-31864 5.9 MEDIUM 1 PoC Analysis EPSS 0.00
Beam me up Scotty - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Out the Box Beam me up Scotty beam-me-up-scotty allows Stored XSS.This issue affects Beam me up Scotty: from n/a through <= 1.0.23.
CWE-79 Apr 01, 2025
CVE-2025-30921 7.6 HIGH 1 PoC Analysis EPSS 0.00
Tribulant Software Newsletters <4.9.9.7 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Software Newsletters newsletters-lite allows SQL Injection.This issue affects Newsletters: from n/a through <= 4.9.9.7.
CWE-89 Mar 27, 2025
CVE-2025-24985 7.8 HIGH KEV SSVC ACTIVE 1 PoC Analysis EPSS 0.02
Windows Fast FAT Driver - Code Injection
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
CWE-190 Mar 11, 2025
CVE-2025-26055 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.01
Infinxt iEdge 100 <2.1.32 - Command Injection
An OS Command Injection vulnerability exists in the Infinxt iEdge 100 2.1.32 Troubleshoot module, specifically in the tracertVal parameter of the Tracert function.
CWE-78 Apr 01, 2025
CVE-2025-26054 5.4 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Infinxt iEdge 100 2.1.32 - XSS
Infinxt iEdge 100 2.1.32 is vulnerable to Cross Site Scripting (XSS) via the "Description" field during LAN configuration.
CWE-79 Apr 01, 2025
CVE-2025-26056 5.4 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.01
Infinxt iEdge 100 2.1.32 - Command Injection
A command injection vulnerability exists in the Infinxt iEdge 100 2.1.32 in the Troubleshoot module "MTR" functionality. The vulnerability is due to improper validation of user-supplied input in the mtrIp parameter. An attacker can exploit this flaw to execute arbitrary operating system commands on the underlying system with the same privileges as the web application process.
CWE-77 Apr 01, 2025
CVE-2025-29602 6.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Flatpress < 1.3.1 - XSS
flatpress 1.3.1 is vulnerable to Cross Site Scripting (XSS) in Administration area via Manage categories.
CWE-79 May 07, 2025
CVE-2025-31129 8.8 HIGH 1 PoC Analysis EPSS 0.00
Io.jooby Jooby-pac4j < 2.17.0 - Insecure Deserialization
Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x).
CWE-502 Mar 31, 2025
CVE-2025-0087 5.1 MEDIUM 2 PoCs Analysis EPSS 0.00
Android - Privilege Escalation
In onCreate of UninstallerActivity.java, there is a possible way to uninstall a different user's app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-689 Sep 04, 2025
CVE-2025-26125 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
IObit Malware Fighter <12.1.0 - Privilege Escalation
An exposed ioctl in the IMFForceDelete driver of IObit Malware Fighter v12.1.0 allows attackers to arbitrarily delete files and escalate privileges.
CWE-782 Mar 17, 2025
CVE-2025-66573 7.5 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Solstice Pod API <6.2 - Info Disclosure
Solstice Pod API (version 5.5, 6.2) contains an unauthenticated API endpoint (`/api/config`) that exposes sensitive information such as the session key, server version, product details, and display name. Unauthorized users can extract live session information by accessing this endpoint without authentication.
CWE-319 Dec 04, 2025
CVE-2025-2777 9.3 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.23
SysAid On-Prem <= 23.3.40 - XML External Entity
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the lshw processing functionality, allowing for administrator account takeover and file read primitives.
CWE-611 May 07, 2025
CVE-2025-30349 7.2 HIGH EXPLOITED SSVC PoC 1 PoC Analysis EPSS 0.19
Horde IMP <6.2.27 - XSS
Horde IMP through 6.2.27, as used with Horde Application Framework through 5.2.23, allows XSS that leads to account takeover via a crafted text/html e-mail message with an onerror attribute (that may use base64-encoded JavaScript code), as exploited in the wild in March 2025.
CWE-79 Mar 21, 2025
CVE-2025-45512 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Denx U-boot - Command Injection
A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows attackers to install crafted firmware files, leading to arbitrary code execution.
CWE-77 Aug 05, 2025
CVE-2025-30216 9.4 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.06
CryptoLib <1.3.3 - Buffer Overflow
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, a Heap Overflow vulnerability occurs in the `Crypto_TM_ProcessSecurity` function (`crypto_tm.c:1735:8`). When processing the Secondary Header Length of a TM protocol packet, if the Secondary Header Length exceeds the packet's total length, a heap overflow is triggered during the memcpy operation that copies packet data into the dynamically allocated buffer `p_new_dec_frame`. This allows an attacker to overwrite adjacent heap memory, potentially leading to arbitrary code execution or system instability. A patch is available at commit 810fd66d592c883125272fef123c3240db2f170f.
CWE-122 Mar 25, 2025
CVE-2025-30567 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.27
WordPress WP01 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP01 WP01 wp01 allows Path Traversal.This issue affects WP01: from n/a through <= 2.6.2.
CWE-22 Mar 25, 2025
CVE-2025-2620 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.36
D-Link DAP-1620 1.03 - Buffer Overflow
A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-119 Mar 22, 2025
CVE-2025-56241 7.5 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Aztech DSL5005EN - Privilege Escalation
Aztech DSL5005EN firmware 1.00.AZ_2013-05-10 and possibly other versions allows unauthenticated attackers to change the administrator password via a crafted POST request to sysAccess.asp. This allows full administrative control of the router without authentication.
CWE-284 Sep 24, 2025