Latest Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,629 results
Clear all
CVE-2025-43407
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Apple - Sandbox Escape
This issue was addressed with improved entitlements. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1. An app may be able to break out of its sandbox.
CWE-284
Nov 04, 2025
CVE-2025-32957
8.7
HIGH
1 PoC
EPSS 0.00
baserCMS: unsafe File Upload Leading to Remote Code Execution (RCE)
baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is included. This issue has been patched in version 5.2.3.
CWE-434
Mar 31, 2026
CVE-2025-27237
HIGH
2 PoCs
Analysis
EPSS 0.00
Zabbix Agent/Agent 2 <Windows> - Privilege Escalation
In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
CWE-427
Oct 03, 2025
CVE-2025-23970
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
aonetheme Service Finder Booking <6.0 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in aonetheme Service Finder Booking sf-booking allows Privilege Escalation.This issue affects Service Finder Booking: from n/a through <= 6.1.
CWE-266
Jul 04, 2025
CVE-2025-59059
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Apache Ranger <=2.7.0 - RCE
Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions <= 2.7.0.
Users are recommended to upgrade to version 2.8.0, which fixes this issue.
CWE-94
Mar 03, 2026
CVE-2025-43990
7.3
HIGH
1 PoC
Analysis
EPSS 0.00
Dell Command Monitor <10.12.3.28 - Privilege Escalation
Dell Command Monitor (DCM), versions prior to 10.12.3.28, contains an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
CWE-250
Nov 05, 2025
CVE-2025-71257
7.3
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.08
BMC FootPrints ITSM 20.20.02 <= 20.24.01.001 Authentication Bypass
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
CWE-306
Mar 19, 2026
CVE-2025-24999
8.8
HIGH
1 PoC
Analysis
EPSS 0.00
SQL Server - Privilege Escalation
Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.
CWE-284
Aug 12, 2025
CVE-2025-26466
5.9
MEDIUM
4 PoCs
Analysis
EPSS 0.63
Openbsd Openssh - Resource Allocation Without Limits
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
CWE-770
Feb 28, 2025
CVE-2025-24054
6.5
MEDIUM
KEV
16 PoCs
Analysis
EPSS 0.08
Windows NTLM - Path Traversal
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
CWE-73
Mar 11, 2025
CVE-2025-53770
9.8
CRITICAL
KEV
RANSOMWARE
53 PoCs
Analysis
NUCLEI
EPSS 0.90
Microsoft SharePoint Server - Code Injection
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network.
Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild.
Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
CWE-502
Jul 20, 2025
CVE-2025-12543
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.00
WildFly/JBoss EAP - SSRF
A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
CWE-20
Jan 07, 2026
CVE-2025-2783
8.3
HIGH
KEV
5 PoCs
Analysis
EPSS 0.39
Mojo in Google Chrome <134.0.6998.177 - RCE
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
Mar 26, 2025
CVE-2025-50286
8.1
HIGH
4 PoCs
Analysis
EPSS 0.67
Grav CMS <1.7.48 - RCE
A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.
CWE-434
Aug 06, 2025
CVE-2025-62429
7.2
HIGH
1 PoC
1 Writeup
Analysis
EPSS 0.00
Oxygenz Clipbucket < 5.5.2-147 - Code Injection
ClipBucket v5 is an open source video sharing platform. Prior to version 5.5.2 #147, ClipBucket v5 is vulnerable to arbitrary PHP code execution. In /upload/admin_area/actions/update_launch.php, the "type" parameter from a POST request is embedded into PHP tags and executed. Proper sanitization is not performed, and by injecting malicious code an attacker can execute arbitrary PHP code. This allows an attacker to achieve RCE. This issue has been resolved in version 5.5.2 #147.
CWE-94
Oct 20, 2025
CVE-2025-33073
8.8
HIGH
KEV
15 PoCs
Analysis
EPSS 0.49
Windows SMB - Privilege Escalation
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
CWE-284
Jun 10, 2025
CVE-2025-6514
9.6
CRITICAL
2 PoCs
Analysis
EPSS 0.02
mcp-remote - Command Injection
mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL
CWE-78
Jul 09, 2025
CVE-2025-54123
9.8
CRITICAL
EXPLOITED
5 PoCs
1 Writeup
Analysis
NUCLEI
EPSS 0.58
Hoverfly < 1.12.0 - OS Command Injection
Hoverfly is an open source API simulation tool. In versions 1.11.3 and prior, the middleware functionality in Hoverfly is vulnerable to command injection vulnerability at `/api/v2/hoverfly/middleware` endpoint due to insufficient validation and sanitization in user input. The vulnerability exists in the middleware management API endpoint `/api/v2/hoverfly/middleware`. This issue is born due to combination of three code level flaws: Insufficient Input Validation in middleware.go line 94-96; Unsafe Command Execution in local_middleware.go line 14-19; and Immediate Execution During Testing in hoverfly_service.go line 173. This allows an attacker to gain remote code execution (RCE) on any system running the vulnerable Hoverfly service. Since the input is directly passed to system commands without proper checks, an attacker can upload a malicious payload or directly execute arbitrary commands (including reverse shells) on the host server with the privileges of the Hoverfly process. Commit 17e60a9bc78826deb4b782dca1c1abd3dbe60d40 in version 1.12.0 disables the set middleware API by default, and subsequent changes to documentation make users aware of the security changes of exposing the set middleware API.
CWE-78
Sep 10, 2025
CVE-2025-67303
7.5
HIGH
6 PoCs
Analysis
NUCLEI
EPSS 0.02
ComfyUI-Manager <3.38 - Info Disclosure
An issue in ComfyUI-Manager prior to version 3.38 allowed remote attackers to potentially manipulate its configuration and critical data. This was due to the application storing its files in an insufficiently protected location that was accessible via the web interface
CWE-420
Jan 05, 2026
CVE-2025-39946
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Linux kernel - Info Disclosure
In the Linux kernel, the following vulnerability has been resolved:
tls: make sure to abort the stream if headers are bogus
Normally we wait for the socket to buffer up the whole record
before we service it. If the socket has a tiny buffer, however,
we read out the data sooner, to prevent connection stalls.
Make sure that we abort the connection when we find out late
that the record is actually invalid. Retrying the parsing is
fine in itself but since we copy some more data each time
before we parse we can overflow the allocated skb space.
Constructing a scenario in which we're under pressure without
enough data in the socket to parse the length upfront is quite
hard. syzbot figured out a way to do this by serving us the header
in small OOB sends, and then filling in the recvbuf with a large
normal send.
Make sure that tls_rx_msg_size() aborts strp, if we reach
an invalid record there's really no way to recover.
Oct 04, 2025