Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,627 results
Clear all
CVE-2026-27825
9.0
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
MCP Atlassian <0.17.0 - Path Traversal
MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, the `confluence_download_attachment` MCP tool accepts a `download_path` parameter that is written to without any directory boundary enforcement. An attacker who can call this tool and supply or access a Confluence attachment with malicious content can write arbitrary content to any path the server process has write access to. Because the attacker controls both the write destination and the written content (via an uploaded Confluence attachment), this constitutes for arbitrary code execution (for example, writing a valid cron entry to `/etc/cron.d/` achieves code execution within one scheduler cycle with no server restart required). Version 0.17.0 fixes the issue.
CWE-22
Mar 10, 2026
CVE-2026-3171
3.5
LOW
1 PoC
Analysis
EPSS 0.00
Patients Waiting Area Queue 1.0 - XSS
A flaw has been found in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /queue.php. This manipulation of the argument firstname/lastname causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used.
CWE-94
Feb 25, 2026
CVE-2026-1512
6.4
MEDIUM
2 PoCs
Analysis
EPSS 0.00
Essential Addons for Elementor - WordPress <6.5.9 - XSS
The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Info Box widget in all versions up to, and including, 6.5.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79
Feb 14, 2026
CVE-2026-3062
9.8
CRITICAL
1 PoC
EPSS 0.00
Google Chrome <145.0.7632.116 - Memory Corruption
Out of bounds read and write in Tint in Google Chrome on Mac prior to 145.0.7632.116 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
CWE-787
Feb 23, 2026
CVE-2026-27211
10.0
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
Cloud Hypervisor 34.0-50.0 - Info Disclosure
Cloud Hypervisor is a Virtual Machine Monitor for Cloud workloads. Versions 34.0 through 50.0 arevulnerable to arbitrary host file exfiltration (constrained by process privileges) when using virtio-block devices backed by raw images. A malicious guest can overwrite its disk header with a crafted QCOW2 structure pointing to a sensitive host path. Upon the next VM boot or disk scan, the image format auto-detection parses this header and serves the host file's contents to the guest. Guest-initiated VM reboots are sufficient to trigger a disk scan and do not cause the Cloud Hypervisor process to exit. Therefore, a single VM can perform this attack without needing interaction from the management stack. Successful exploitation requires the backing image to be either writable by the guest or sourced from an untrusted origin. Deployments utilizing only trusted, read-only images are not affected. This issue has been fixed in version 50.1. To workaround, enable land lock sandboxing and restrict process privileges and access.
CWE-73
Feb 21, 2026
CVE-2026-2329
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.32
Grandstream GXP16xx - Buffer Overflow
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
CWE-121
Feb 18, 2026
CVE-2026-27607
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
RustFS 1.0.0-alpha.56-82 - Auth Bypass
RustFS is a distributed object storage system built in Rust. In versions 1.0.0-alpha.56 through 1.0.0-alpha.82, RustFS does not validate policy conditions in presigned POST uploads (PostObject), allowing attackers to bypass content-length-range, starts-with, and Content-Type constraints. This enables unauthorized file uploads exceeding size limits, uploads to arbitrary object keys, and content-type spoofing, potentially leading to storage exhaustion, unauthorized data access, and security bypasses. Version 1.0.0-alpha.83 fixes the issue.
CWE-863
Feb 25, 2026
CVE-2026-22804
8.0
HIGH
2 PoCs
Analysis
EPSS 0.00
Termix < 1.10.0 - XSS
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. From 1.7.0 to 1.9.0, Stored Cross-Site Scripting (XSS) vulnerability exists in the Termix File Manager component. The application fails to sanitize SVG file content before rendering it. This allows an attacker who has compromised a managed SSH server to plant a malicious file, which, when previewed by the Termix user, executes arbitrary JavaScript in the context of the application. The vulnerability is located in src/ui/desktop/apps/file-manager/components/FileViewer.tsx. This vulnerability is fixed in 1.10.0.
CWE-269
Jan 12, 2026
CVE-2026-22036
5.9
MEDIUM
1 PoC
1 Writeup
Analysis
EPSS 0.00
Nodejs Undici < 6.23.0 - Resource Allocation Without Limits
Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.
CWE-770
Jan 14, 2026
CVE-2026-2848
7.3
HIGH
1 PoC
Analysis
EPSS 0.00
SourceCodester Tourism Website 1.0 - SQL Injection
A flaw has been found in SourceCodester Simple Responsive Tourism Website 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=register of the component Registration. This manipulation of the argument Username causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.
CWE-74
Feb 20, 2026
CVE-2026-1056
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Snow Monkey Forms <12.0.3 - Path Traversal
The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CWE-22
Jan 28, 2026
CVE-2026-25242
9.8
CRITICAL
1 PoC
1 Writeup
EPSS 0.00
Gogs <=0.13.4 - Unauthenticated File Upload
Gogs is an open source self-hosted Git service. Versions 0.13.4 and below expose unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the server via /releases/attachments and /issues/attachments. This enables the instance to be abused as a public file host, potentially leading to disk exhaustion, content hosting, or delivery of malware. CSRF tokens do not mitigate this attack due to same-origin cookie issuance. This issue has been fixed in version 0.14.1.
CWE-862
Feb 19, 2026
CVE-2026-0915
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
GNU Glibc < 2.42 - Use of Uninitialized Resource
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
CWE-908
Jan 15, 2026
CVE-2026-20817
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Windows Error Reporting - Privilege Escalation
Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.
CWE-280
Jan 13, 2026
CVE-2026-21957
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Oracle VM Virtualbox - Improper Privilege Management
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
CWE-269
Jan 20, 2026
CVE-2026-21508
7.0
HIGH
1 PoC
Analysis
EPSS 0.00
Microsoft Windows 10 1607 < 10.0.14393.8868 - Authentication Bypass
Improper authentication in Windows Storage allows an authorized attacker to elevate privileges locally.
CWE-426
Feb 10, 2026
CVE-2026-1529
8.1
HIGH
3 PoCs
Analysis
EPSS 0.00
Org.keycloak Keycloak-services - Signature Verification Bypass
A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.
CWE-347
Feb 09, 2026
CVE-2026-20805
5.5
MEDIUM
KEV
5 PoCs
Analysis
EPSS 0.03
Desktop Windows Manager - Info Disclosure
Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.
CWE-200
Jan 13, 2026
CVE-2026-24423
9.8
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.80
SmarterTools SmarterMail <9511 - RCE
SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
CWE-306
Jan 23, 2026
CVE-2026-24688
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
Pypdf < 6.6.2 - Infinite Loop
pypdf is a free and open-source pure-python PDF library. An attacker who uses an infinite loop vulnerability that is present in versions prior to 6.6.2 can craft a PDF which leads to an infinite loop. This requires accessing the outlines/bookmarks. This has been fixed in pypdf 6.6.2. If projects cannot upgrade yet, consider applying the changes from PR #3610 manually.
CWE-835
Jan 27, 2026