Latest Vulnerabilities with Public Exploits

Updated 7m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
53,627 results Clear all
CVE-2026-25676 7.8 HIGH 2 PoCs Analysis EPSS 0.00
M-Track Duo HD <1.0.0 - Code Injection
The installer of M-Track Duo HD version 1.0.0 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with administrator privileges.
CWE-427 Feb 12, 2026
CVE-2026-26235 7.5 HIGH 2 PoCs Analysis EPSS 0.00
JUNG Smart Visu Server 1.1.1050 - DoS
JUNG Smart Visu Server 1.1.1050 contains a denial of service vulnerability that allows unauthenticated attackers to remotely shutdown or reboot the server. Attackers can send a single POST request to trigger the server reboot without requiring any authentication.
CWE-306 Feb 12, 2026
CVE-2026-1729 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
AdForest theme <6.0.12 - Auth Bypass
The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.0.12. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the 'sb_login_user_with_otp_fun' function. This makes it possible for unauthenticated attackers to log in as arbitrary users, including administrators.
CWE-306 Feb 12, 2026
CVE-2026-26215 CRITICAL 2 PoCs Analysis EPSS 0.00
manga-image-translator <beta-0.3 - Unauthenticated RCE
manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability that can lead to unauthenticated remote code execution. The FastAPI endpoints /simple_execute/{method} and /execute/{method} deserialize attacker-controlled request bodies using pickle.loads() without validation. Although a nonce-based authorization check is intended to restrict access, the nonce defaults to an empty string and the check is skipped, allowing remote attackers to execute arbitrary code in the server context by sending a crafted pickle payload.
CWE-502 Feb 11, 2026
CVE-2026-20700 7.8 HIGH KEV 3 PoCs Analysis EPSS 0.00
Apple watchOS <26.3 - Memory Corruption
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, tvOS 26.3, visionOS 26.3, watchOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.
CWE-119 Feb 11, 2026
CVE-2026-26012 6.5 MEDIUM 3 PoCs Analysis EPSS 0.00
Dani-garcia Vaultwarden < 1.35.3 - Incorrect Authorization
vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to 1.35.3, a regular organization member can retrieve all ciphers within an organization, regardless of collection permissions. The endpoint /ciphers/organization-details is accessible to any organization member and internally uses Cipher::find_by_org to retrieve all ciphers. These ciphers are returned with CipherSyncType::Organization without enforcing collection-level access control. This vulnerability is fixed in 1.35.3.
CWE-863 Feb 11, 2026
CVE-2026-25924 8.4 HIGH 2 PoCs Analysis EPSS 0.00
Kanboard < 1.2.50 - Incorrect Authorization
Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a security control bypass vulnerability in Kanboard allows an authenticated administrator to achieve full Remote Code Execution (RCE). Although the application correctly hides the plugin installation interface when the PLUGIN_INSTALLER configuration is set to false, the underlying backend endpoint fails to verify this security setting. An attacker can exploit this oversight to force the server to download and install a malicious plugin, leading to arbitrary code execution. This vulnerability is fixed in 1.2.50.
CWE-863 Feb 11, 2026
CVE-2026-2249 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
METIS DFS <oscore 2.1.234-r18 - RCE
METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with 'daemon' privileges. This results in the compromise of the software, granting unauthorized access to modify configuration, read and alter sensitive data, or disrupt services.
CWE-287 Feb 11, 2026
CVE-2026-2248 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
METIS WIC <= oscore 2.1.234-r18 - RCE
METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt device operations
CWE-287 Feb 11, 2026
CVE-2026-1560 8.8 HIGH 2 PoCs Analysis EPSS 0.00
WordPress Lazy Blocks <4.2.0 - Authenticated RCE
The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the 'LazyBlocks_Blocks' class. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
CWE-94 Feb 11, 2026
CVE-2026-21531 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Microsoft Azure Conversation Authorin... - Insecure Deserialization
Deserialization of untrusted data in Azure SDK allows an unauthorized attacker to execute code over a network.
CWE-502 Feb 10, 2026
CVE-2026-21510 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.03
Microsoft Windows Shell - Protection Mechanism Failure
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
CWE-693 Feb 10, 2026
CVE-2026-22153 8.1 HIGH 3 PoCs Analysis EPSS 0.00
Fortinet Fortios < 7.6.5 - Authentication Bypass
An Authentication Bypass by Primary Weakness vulnerability [CWE-305] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4 may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, when the remote LDAP server is configured in a specific way.
CWE-305 Feb 10, 2026
CVE-2026-25939 9.1 CRITICAL 2 PoCs Analysis EPSS 0.00
Frangoteam Fuxa < 1.2.11 - Missing Authorization
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. From 1.2.8 through version 1.2.10, an authorization bypass vulnerability in the FUXA allows an unauthenticated, remote attacker to create and modify arbitrary schedulers, exposing connected ICS/SCADA environments to follow-on actions. This has been patched in FUXA version 1.2.11.
CWE-862 Feb 09, 2026
CVE-2026-25961 7.5 HIGH 2 PoCs Analysis EPSS 0.00
SumatraPDF <3.5.2 - RCE
SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, SumatraPDF's update mechanism disables TLS hostname verification (INTERNET_FLAG_IGNORE_CERT_CN_INVALID) and executes installers without signature checks. A network attacker with any valid TLS certificate (e.g., Let's Encrypt) can intercept the update check request, inject a malicious installer URL, and achieve arbitrary code execution.
CWE-295 Feb 09, 2026
CVE-2026-25890 8.1 HIGH 2 PoCs 1 Writeup Analysis EPSS 0.00
Filebrowser < 2.57.1 - Incorrect Authorization
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, an authenticated user can bypass the application's "Disallow" file path rules by modifying the request URL. By adding multiple slashes (e.g., //private/) to the path, the authorization check fails to match the rule, while the underlying filesystem resolves the path correctly, granting unauthorized access to restricted files. This vulnerability is fixed in 2.57.1.
CWE-863 Feb 09, 2026
CVE-2026-25807 8.8 HIGH 2 PoCs Analysis EPSS 0.00
ZAI Shell <9.0.3 - RCE
ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure complex environments. Prior to 9.0.3, the P2P terminal sharing feature (share start) opens a TCP socket on port 5757 without any authentication mechanism. Any remote attacker can connect to this port using a simple socket script. An attacker who connects to a ZAI-Shell P2P session running in --no-ai mode can send arbitrary system commands. If the host user approves the command without reviewing its contents, the command executes directly with the user's privileges, bypassing all Sentinel safety checks. This vulnerability is fixed in 9.0.3.
CWE-94 Feb 09, 2026
CVE-2026-25916 4.3 MEDIUM 2 PoCs Analysis EPSS 0.00
Roundcube Webmail <1.5.13 & <1.6.13 - XSS
Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13, when "Block remote images" is used, does not block SVG feImage.
CWE-420 Feb 09, 2026
CVE-2026-25857 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Tenda G300-F <16.01.14.2 - Command Injection
Tenda G300-F router firmware version 16.01.14.2 and prior contain an OS command injection vulnerability in the WAN diagnostic functionality (formSetWanDiag). The implementation constructs a shell command that invokes curl and incorporates attacker-controlled input into the command line without adequate neutralization. As a result, a remote attacker with access to the affected management interface can inject additional shell syntax and execute arbitrary commands on the device with the privileges of the management process.
CWE-78 Feb 07, 2026
CVE-2026-2113 7.3 HIGH 2 PoCs Analysis EPSS 0.00
yuan1994 tpadmin <1.3.12 - Deserialization
A security vulnerability has been detected in yuan1994 tpadmin up to 1.3.12. This affects an unknown part in the library /public/static/admin/lib/webuploader/0.1.5/server/preview.php of the component WebUploader. The manipulation leads to deserialization. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-502 Feb 07, 2026