Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,627 results
Clear all
CVE-2026-3442
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
Red Hat Enterprise Linux 10 - Buffer Overflow
A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer overflow, specifically an out-of-bounds read, exists in the bfd linker component. An attacker could exploit this by convincing a user to process a specially crafted malicious XCOFF object file. Successful exploitation may lead to the disclosure of sensitive information or cause the application to crash, resulting in an application level denial of service.
CWE-125
Mar 16, 2026
CVE-2026-2461
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
Missing authorization check allows unauthorized modification of other users' comments on a board
Mattermost Plugins versions <=11.3 11.0.3 11.2.2 10.10.11.0 fail to implement authorisation checks on comment block modifications, which allows an authorised attacker with editor permission to modify comments created by other board members. Mattermost Advisory ID: MMSA-2025-00559
CWE-639
Mar 16, 2026
CVE-2026-31899
7.5
HIGH
2 PoCs
1 Writeup
Analysis
EPSS 0.00
CairoSVG - DoS
CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to Kozea/CairoSVG has exponential denial of service via recursive <use> element amplification in cairosvg/defs.py. This causes CPU exhaustion from a small input.
CWE-674
Mar 13, 2026
CVE-2026-25596
4.8
MEDIUM
2 PoCs
1 Writeup
Analysis
EPSS 0.00
InvoicePlane 1.7.0 - Stored XSS
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Product Unit Name fields. An authenticated administrator can inject malicious JavaScript that executes when any administrator views an invoice containing a product with the malicious unit. Version 1.7.1 patches the issue.
CWE-79
Feb 18, 2026
CVE-2026-25595
4.8
MEDIUM
2 PoCs
1 Writeup
Analysis
EPSS 0.00
InvoicePlane 1.7.0 - Stored XSS
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Invoice Number field. An authenticated administrator can inject malicious JavaScript that executes when any administrator views the affected invoice or visits the dashboard. Version 1.7.1 patches the issue.
CWE-79
Feb 18, 2026
CVE-2026-25594
4.8
MEDIUM
2 PoCs
1 Writeup
Analysis
EPSS 0.00
InvoicePlane 1.7.0 - Stored XSS
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Family Name field. The `family_name` value is rendered without HTML encoding inside the family dropdown on the product form. When an administrator creates a family with a malicious name, the payload executes in the browser of any administrator who visits the product form. Version 1.7.1 patches the issue.
CWE-79
Feb 18, 2026
CVE-2026-1999
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
GitHub Enterprise Server - Auth Bypass
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to merge their own pull request into a repository without having push access by exploiting an authorization bypass in the enable_auto_merge mutation for pull requests. This issue only affected repositories that allow forking as the attack relies on opening a pull request from an attacker-controlled fork into the target repository. Exploitation was only possible in specific scenarios. It required a clean pull request status and only applied to branches without branch protection rules enabled. This vulnerability affected GitHub Enterprise Server versions prior to 3.19.2, 3.18.5, and 3.17.11, and was fixed in versions 3.19.2, 3.18.5, and 3.17.11. This vulnerability was reported via the GitHub Bug Bounty program.
CWE-863
Feb 18, 2026
CVE-2026-25548
9.1
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
InvoicePlane 1.7.0 - RCE via LFI & Log Poisoning
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning attack. An authenticated administrator can execute arbitrary system commands on the server by manipulating the `public_invoice_template` setting to include poisoned log files containing PHP code. Version 1.7.1 patches the issue.
CWE-94
Feb 18, 2026
CVE-2026-3796
5.3
MEDIUM
1 PoC
1 Writeup
Analysis
EPSS 0.00
Qi-ANXIN QAX Virus Removal - Privilege Escalation
A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. The affected element is the function ZwTerminateProcess in the library QKSecureIO_Imp.sys of the component Mini Filter Driver. Executing a manipulation can lead to improper access controls. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-284
Mar 09, 2026
CVE-2026-20833
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Windows Kerberos - Info Disclosure
Use of a broken or risky cryptographic algorithm in Windows Kerberos allows an authorized attacker to disclose information locally.
CWE-327
Jan 13, 2026
CVE-2026-4092
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Clasp <3.2.0 - Path Traversal
Path Traversal in Clasp impacting versions < 3.2.0 allows a remote attacker to perform remote code execution via a malicious Google Apps Script project containing specially crafted filenames with directory traversal sequences.
CWE-22
Mar 13, 2026
CVE-2026-25177
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Active Directory Domain Services - Privilege Escalation
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
CWE-641
Mar 10, 2026
CVE-2026-26117
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Azure Windows Virtual Machine Agent - Privilege Escalation
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.
CWE-288
Mar 10, 2026
CVE-2026-4105
6.7
MEDIUM
1 PoC
Analysis
EPSS 0.00
systemd - Privilege Escalation
A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.
CWE-284
Mar 13, 2026
CVE-2026-27097
8.1
HIGH
2 PoCs
Analysis
EPSS 0.00
CasaMia Theme <=1.1.2 - PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes CasaMia | Property Rental Real Estate WordPress Theme casamia allows PHP Local File Inclusion.This issue affects CasaMia | Property Rental Real Estate WordPress Theme: from n/a through <= 1.1.2.
CWE-98
Mar 05, 2026
CVE-2026-1311
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Worry Proof Backup Plugin <0.2.4 - Path Traversal
The Worry Proof Backup plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 0.2.4 via the backup upload functionality. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload a malicious ZIP archive with path traversal sequences to write arbitrary files anywhere on the server, including executable PHP files. This can lead to remote code execution.
CWE-22
Feb 26, 2026
CVE-2026-27470
8.8
HIGH
3 PoCs
Analysis
EPSS 0.00
ZoneMinder <=1.36.37, 1.37.61-1.38.0 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
CWE-89
Feb 21, 2026
CVE-2026-0926
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.20
Prodigy Commerce WordPress Plugin <3.2.9 - LFI
The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arbitrary files or execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-98
Feb 19, 2026
CVE-2026-31816
9.1
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.24
Budibase <=3.31.4 - Auth Bypass
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a webhook path pattern to the query string of any request. The isWebhookEndpoint() function uses an unanchored regex that tests against ctx.request.url, which in Koa includes the full URL with query parameters. When the regex matches, the authorized() middleware immediately calls return next(), skipping all authentication, authorization, role checks, and CSRF protection. This means a completely unauthenticated, remote attacker can access any server-side API endpoint by simply appending ?/webhooks/trigger (or any webhook pattern variant) to the URL.
CWE-74
Mar 09, 2026
CVE-2026-27884
5.3
MEDIUM
2 PoCs
1 Writeup
Analysis
EPSS 0.00
NetExec <1.5.1 - Path Traversal
NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An attacker can craft a filename in an SMB share that includes these characters, which when spider_plus crawls and downloads, can write or overwrite arbitrary files. The issue is patched in v1.5.1. As a workaround, do not run spider_plus with DOWNLOAD=true against targets.
CWE-22
Feb 26, 2026