Latest Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,703 results
Clear all
CVE-2025-30144
6.5
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.02
fast-jwt <5.0.6 - Info Disclosure
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly validate the iss claim based on the RFC 7519. The iss (issuer) claim validation within the fast-jwt library permits an array of strings as a valid iss value. This design flaw enables a potential attack where a malicious actor crafts a JWT with an iss claim structured as ['https://attacker-domain/', 'https://valid-iss']. Due to the permissive validation, the JWT will be deemed valid. Furthermore, if the application relies on external libraries like get-jwks that do not independently validate the iss claim, the attacker can leverage this vulnerability to forge a JWT that will be accepted by the victim application. Essentially, the attacker can insert their own domain into the iss array, alongside the legitimate issuer, and bypass the intended security checks. This issue is fixed in 5.0.6.
CWE-290
Mar 19, 2025
CVE-2025-24011
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.31
Umbraco Cms < 14.3.2 - Information Disclosure
Umbraco is a free and open source .NET content management system. Starting in version 14.0.0 and prior to versions 14.3.2 and 15.1.2, it's possible to determine whether an account exists based on an analysis of response codes and timing of Umbraco management API responses. Versions 14.3.2 and 15.1.2 contain a patch. No known workarounds are available.
CWE-200
Jan 21, 2025
CVE-2025-2126
6.3
MEDIUM
1 PoC
Analysis
EPSS 0.01
JoomlaUX JUX Real Estate 3.4.0 - SQL Injection
A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0 on Joomla and classified as critical. This issue affects some unknown processing of the file /extensions/realestate/index.php/properties/list/list-with-sidebar/realties of the component GET Parameter Handler. The manipulation of the argument title leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-74
Mar 09, 2025
CVE-2025-2512
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.06
File Away < 3.9.9.0.1 - Unrestricted File Upload
The File Away plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check and missing file type validation in the upload() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Mar 19, 2025
CVE-2025-29384
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.11
Tenda Ac9 Firmware - Out-of-Bounds Write
In Tenda AC9 v1.0 V15.03.05.14_multi, the wanMTU parameter of /goform/AdvSetMacMtuWan has a stack overflow vulnerability, which can lead to remote arbitrary code execution.
CWE-787
Mar 14, 2025
CVE-2025-30066
8.6
HIGH
KEV
SSVC ACTIVE
2 PoCs
Analysis
EPSS 0.92
tj-actions <46 - Info Disclosure
tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)
CWE-506
Mar 15, 2025
CVE-2025-22954
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.19
Koha <24.11.02 - SQL Injection
GetLateOrMissingIssues in C4/Serials.pm in Koha before 24.11.02 allows SQL Injection in /serials/lateissues-export.pl via the supplierid or serialid parameter.
CWE-89
Mar 12, 2025
CVE-2025-66575
7.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
VeeVPN 1.6.1 - Code Injection
VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
CWE-428
Dec 04, 2025
CVE-2025-66574
5.4
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
TranzAxis 3.2.41.10.26 - XSS
TranzAxis 3.2.41.10.26 allows authenticated users to inject cross-site scripting via the `Open Object in Tree` endpoint, allowing attackers to steal session cookies and potentially escalate privileges.
CWE-79
Dec 04, 2025
CVE-2025-66572
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Loaded Commerce 6.6 - XSS
Loaded Commerce 6.6 contains a client-side template injection vulnerability that allows unauthenticated attackers to execute code on the server via the search parameter.
CWE-78
Dec 04, 2025
CVE-2025-27410
6.5
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.17
PwnDoc <1.2.0 - Path Traversal
PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
CWE-22
Feb 28, 2025
CVE-2025-25612
7.1
HIGH
1 PoC
Analysis
EPSS 0.01
FS Inc S3150-8T2F <S3150-8T2F_2.2.0D_135103 - XSS
FS Inc S3150-8T2F prior to version S3150-8T2F_2.2.0D_135103 is vulnerable to Cross Site Scripting (XSS) in the Time Range Configuration functionality of the administration interface. An attacker can inject malicious JavaScript into the "Time Range Name" field, which is improperly sanitized. When this input is saved, it is later executed in the browser of any user accessing the affected page, including administrators, resulting in arbitrary script execution in the user's browser.
CWE-79
Mar 17, 2025
CVE-2025-26417
4.0
MEDIUM
1 PoC
Analysis
EPSS 0.00
Google Android - Information Disclosure
In checkWhetherCallingAppHasAccess of DownloadProvider.java, there is a possible bypass of user consent when opening files in shared storage due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-610
Aug 26, 2025
CVE-2025-22604
9.1
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.70
Cacti < 1.2.29 - OS Command Injection
Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
CWE-78
Jan 27, 2025
CVE-2025-25650
9.1
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 - Info Disclosure
An issue in the storage of NFC card data in Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 allows attackers to produce cloned NFC cards to bypass authentication.
CWE-522
Mar 17, 2025
CVE-2025-27607
8.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.22
Python JSON Logger <4 Mar 2025 - RCE
Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0.
CWE-829
Mar 07, 2025
CVE-2025-27893
1.8
LOW
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Archer Platform <6.14.00202.10024 - Privilege Escalation
In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. NOTE: the Supplier analyzed the reported exploitation steps and found that, although the user can modify the immutable field, upon switching to View mode the field is reverted to its original value, without anything being saved to the database (and consequently there is no impact).
CWE-472
Mar 11, 2025
CVE-2025-25621
4.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Changeweb Unifiedtransform - Improper Access Control
Unifiedtransform 2.0 is vulnerable to Incorrect Access Control, which allows teachers to take attendance of fellow teachers. This affected endpoint is /courses/teacher/index?teacher_id=2&semester_id=1.
CWE-284
Mar 17, 2025
CVE-2025-25620
5.4
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Changeweb Unifiedtransform - XSS
Unifiedtransform 2.0 is vulnerable to Cross Site Scripting (XSS) in the Create assignment function.
CWE-79
Mar 10, 2025
CVE-2025-25618
3.3
LOW
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Changeweb Unifiedtransform - Improper Access Control
Incorrect Access Control in Unifiedtransform 2.0 leads to Privilege Escalation allowing the change of Section Name and Room Number by Teachers.
CWE-284
Mar 17, 2025