Latest Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,760 CVEs tracked 53,703 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 52,442 vendors 43,944 researchers
53,703 results Clear all
CVE-2025-25064 8.8 HIGH 1 PoC Analysis EPSS 0.48
Zimbra Collaboration <10.0.12-10.1.4 - SQL Injection
SQL injection vulnerability in the ZimbraSync Service SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4 due to insufficient sanitization of a user-supplied parameter. Authenticated attackers can exploit this vulnerability by manipulating a specific parameter in the request, allowing them to inject arbitrary SQL queries that could retrieve email metadata.
CWE-89 Feb 03, 2025
CVE-2025-23369 8.8 HIGH 2 PoCs Analysis EPSS 0.12
Github Enterprise Server < 3.12.14 - Signature Verification Bypass
An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed signature spoofing for unauthorized internal users. Instances not utilizing SAML single sign-on or where the attacker is not already an existing user were not impacted. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12.14, 3.13.10, 3.14.7, 3.15.2, and 3.16.0. This vulnerability was reported via the GitHub Bug Bounty program.
CWE-347 Jan 21, 2025
CVE-2025-1015 5.4 MEDIUM 1 PoC Analysis EPSS 0.24
Thunderbird <128.7-<135 - XSS
The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability was fixed in Thunderbird 128.7 and Thunderbird 135.
CWE-79 Feb 04, 2025
CVE-2025-25062 4.4 MEDIUM SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.28
Backdrop CMS <1.28.5, <1.29.3 - XSS
An XSS issue was discovered in Backdrop CMS 1.28.x before 1.28.5 and 1.29.x before 1.29.3. It doesn't sufficiently isolate long text content when the CKEditor 5 rich text editor is used. This allows a potential attacker to craft specialized HTML and JavaScript that may be executed when an administrator attempts to edit a piece of content. This vulnerability is mitigated by the fact that an attacker must have the ability to create long text content (such as through the node or comment forms) and an administrator must edit (not view) the content that contains the malicious content. This problem only exists when using the CKEditor 5 module.
CWE-79 Feb 03, 2025
CVE-2025-22652 7.6 HIGH 1 PoC Analysis EPSS 0.01
kendysond Payment Forms <4.0.1 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in kendysond Payment Forms for Paystack payment-forms-for-paystack allows SQL Injection.This issue affects Payment Forms for Paystack: from n/a through <= 4.0.1.
CWE-89 Mar 27, 2025
CVE-2025-23040 6.6 MEDIUM 1 PoC Analysis EPSS 0.02
GitHub Desktop - Info Disclosure
GitHub Desktop is an open-source Electron-based GitHub app designed for git development. An attacker convincing a user to clone a repository directly or through a submodule can allow the attacker access to the user's credentials through the use of maliciously crafted remote URL. GitHub Desktop relies on Git to perform all network related operations (such as cloning, fetching, and pushing). When a user attempts to clone a repository GitHub Desktop will invoke `git clone` and when Git encounters a remote which requires authentication it will request the credentials for that remote host from GitHub Desktop using the git-credential protocol. Using a maliciously crafted URL it's possible to cause the credential request coming from Git to be misinterpreted by Github Desktop such that it will send credentials for a different host than the host that Git is currently communicating with thereby allowing for secret exfiltration. GitHub username and OAuth token, or credentials for other Git remote hosts stored in GitHub Desktop could be improperly transmitted to an unrelated host. Users should update to GitHub Desktop 3.4.12 or greater which fixes this vulnerability. Users who suspect they may be affected should revoke any relevant credentials.
CWE-522 Jan 15, 2025
CVE-2025-22828 4.3 MEDIUM 1 PoC Analysis EPSS 0.18
Apache Cloudstack - Information Disclosure
CloudStack users can add and read comments (annotations) on resources they are authorised to access.  Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource UUIDs can list and add comments (annotations) to such resources.  An attacker with a user-account and access or prior knowledge of resource UUIDs may exploit this issue to read contents of the comments (annotations) or add malicious comments (annotations) to such resources.  This may cause potential loss of confidentiality of CloudStack environments and resources if the comments (annotations) contain any privileged information. However, guessing or brute-forcing resource UUIDs are generally hard to impossible and access to listing or adding comments isn't same as access to CloudStack resources, making this issue of very low severity and general low impact. CloudStack admins may also disallow listAnnotations and addAnnotation API access to non-admin roles in their environment as an interim measure.
CWE-200 Jan 13, 2025
CVE-2025-24659 7.6 HIGH 1 PoC Analysis EPSS 0.02
WordPress Download Manager Premium <5.9.6 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shahjada WPDM – Premium Packages wpdm-premium-packages allows Blind SQL Injection.This issue affects WPDM – Premium Packages: from n/a through <= 5.9.6.
CWE-89 Jan 24, 2025
CVE-2025-24587 7.6 HIGH 1 PoC Analysis EPSS 0.12
I Thirteen Web Solution Email Subscription Popup <1.2.23 - SQL Inje...
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nks Email Subscription Popup email-subscribe allows Blind SQL Injection.This issue affects Email Subscription Popup: from n/a through <= 1.2.23.
CWE-89 Jan 24, 2025
CVE-2025-24118 7.1 HIGH 1 PoC Analysis EPSS 0.27
Apple Ipados < 17.7.4 - Out-of-Bounds Write
The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory.
CWE-787 Jan 27, 2025
CVE-2025-22785 9.3 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.11
ComMotion Course Booking System <6.0.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ComMotion Course Booking System course-booking-system allows SQL Injection.This issue affects Course Booking System: from n/a through <= 6.0.6.
CWE-89 Jan 15, 2025
CVE-2025-22710 7.6 HIGH 1 PoC Analysis EPSS 0.19
StoreApps Smart Manager <8.52.0 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in storeapps Smart Manager smart-manager-for-wp-e-commerce allows Blind SQL Injection.This issue affects Smart Manager: from n/a through <= 8.52.0.
CWE-89 Jan 21, 2025
CVE-2025-21385 8.8 HIGH 1 PoC Analysis EPSS 0.48
Microsoft Purview - SSRF
A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.
CWE-918 Jan 09, 2025
CVE-2025-22783 8.5 HIGH 1 PoC Analysis EPSS 0.01
Seo Plugin BY Squirrly Seo < 12.4.03 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SEO Squirrly SEO Plugin by Squirrly SEO squirrly-seo allows SQL Injection.This issue affects SEO Plugin by Squirrly SEO: from n/a through <= 12.4.03.
CWE-89 Mar 27, 2025
CVE-2025-22510 7.2 HIGH 1 PoC Analysis EPSS 0.15
WC Price History for Omnibus <2.1.4 - Code Injection
Deserialization of Untrusted Data vulnerability in kkarpieszuk WC Price History for Omnibus wc-price-history allows Object Injection.This issue affects WC Price History for Omnibus: from n/a through <= 2.1.4.
CWE-502 Jan 09, 2025
CVE-2025-22352 7.6 HIGH 1 PoC Analysis EPSS 0.04
ELEXtensions ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ELEXtensions ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes elex-bulk-edit-products-prices-attributes-for-woocommerce-basic allows Blind SQL Injection.This issue affects ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes: from n/a through <= 1.4.9.
CWE-89 Jan 07, 2025
CVE-2025-22912 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.02
Edimax Re11s Firmware - Command Injection
RE11S v1.11 was discovered to contain a command injection vulnerability via the component /goform/formAccept.
CWE-77 Jan 16, 2025
CVE-2025-1122 6.7 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Google Chrome - Out-of-Bounds Write
Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 15753.50.0 stable on Cr50 Boards allows an attacker with root access to gain persistence and Bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process.
CWE-787 Apr 15, 2025
CVE-2025-25037 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.02
Aquatronica Controller System <= 5.1.6 - Information Disclosure
An information disclosure vulnerability exists in Aquatronica Controller System firmware versions <= 5.1.6 and web interface versions <= 2.0. The tcp.php endpoint fails to restrict unauthenticated access, allowing remote attackers to issue crafted POST requests and retrieve sensitive configuration data, including plaintext administrative credentials. Exploitation of this flaw can lead to full compromise of the system, enabling unauthorized manipulation of connected devices and aquarium parameters.
CWE-200 Jun 20, 2025
CVE-2025-5553 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
PHPGurukul Rail Pass Management System 1.0 - SQL Injection
A vulnerability classified as critical was found in PHPGurukul Rail Pass Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /download-pass.php. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Jun 04, 2025