Latest Vulnerabilities with Public Exploits

Updated 11m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
53,633 results Clear all
CVE-2025-27136 MEDIUM 2 PoCs 1 Writeup Analysis EPSS 0.00
LocalS3 <1.21 - XXE Injection
LocalS3 is an Amazon S3 mock service for testing and local development. Prior to version 1.21, the LocalS3 service's bucket creation endpoint is vulnerable to XML External Entity (XXE) injection. When processing the CreateBucketConfiguration XML document during bucket creation, the service's XML parser is configured to resolve external entities. This allows an attacker to declare an external entity that references an internal URL, which the server will then attempt to fetch when parsing the XML. The vulnerability specifically occurs in the location constraint processing, where the XML parser resolves external entities without proper validation or restrictions. When the external entity is resolved, the server makes an HTTP request to the specified URL and includes the response content in the parsed XML document. This vulnerability can be exploited to perform server-side request forgery (SSRF) attacks, allowing an attacker to make requests to internal services or resources that should not be accessible from external networks. The server will include the responses from these internal requests in the resulting bucket configuration, effectively leaking sensitive information. The attacker only needs to be able to send HTTP requests to the LocalS3 service to exploit this vulnerability.
CWE-611 Mar 10, 2025
CVE-2025-69219 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Apache Airflow - Code Injection
A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. You should upgrade to version 6.0.0 of the provider to avoid even that risk.
CWE-913 Mar 09, 2026
CVE-2025-13465 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
NPM Lodash < 4.17.23 - Prototype Pollution
Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties but does not allow overwriting their original behavior. This issue is patched on 4.17.23
CWE-1321 Jan 21, 2026
CVE-2025-60739 9.6 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
Ilevia EVE X1 Server <4.7.18.0.eden-2025_07_21 - CSRF
Cross Site Request Forgery (CSRF) vulnerability in Ilevia EVE X1 Server Firmware Version v4.7.18.0.eden and before, Logic Version v6.00 - 2025_07_21 allows a remote attacker to execute arbitrary code via the /bh_web_backend component
CWE-352 Nov 25, 2025
CVE-2025-1040 8.8 HIGH 1 PoC 1 Writeup Analysis EPSS 0.02
AutoGPT <0.3.4 - SSTI/RCE
AutoGPT versions 0.3.4 and earlier are vulnerable to a Server-Side Template Injection (SSTI) that could lead to Remote Code Execution (RCE). The vulnerability arises from the improper handling of user-supplied format strings in the `AgentOutputBlock` implementation, where malicious input is passed to the Jinja2 templating engine without adequate security measures. Attackers can exploit this flaw to execute arbitrary commands on the host system. The issue is fixed in version 0.4.0.
CWE-1336 Mar 20, 2025
CVE-2025-64459 9.1 CRITICAL 10 PoCs Analysis EPSS 0.00
Django < 4.2.26 - SQL Injection
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
CWE-89 Nov 05, 2025
CVE-2025-8266 6.3 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.01
Chancms < 3.1.3 - Insecure Deserialization
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.1.2 and classified as critical. Affected by this vulnerability is the function getArticle of the file app/modules/cms/controller/collect.js. The manipulation of the argument targetUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.
CWE-502 Jul 28, 2025
CVE-2025-71243 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.85
SPIP Saisies 5.4.0-5.11.0 - RCE
The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.
CWE-94 Feb 19, 2026
CVE-2025-56399 8.8 HIGH 2 PoCs Analysis EPSS 0.00
alexusmai laravel-file-manager <3.3.1 - Authenticated RCE
alexusmai laravel-file-manager 3.3.1 and before allows an authenticated attacker to achieve Remote Code Execution (RCE) through a crafted file upload. A file with a '.png` extension containing PHP code can be uploaded via the file manager interface. Although the upload appears to fail client-side validation, the file is still saved on the server. The attacker can then use the rename API to change the file extension to `.php`, and upon accessing it via a public URL, the server executes the embedded code.
CWE-94 Oct 28, 2025
CVE-2025-53779 7.2 HIGH 2 PoCs Analysis EPSS 0.00
Windows Kerberos - Privilege Escalation
Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network.
CWE-23 Aug 12, 2025
CVE-2025-59287 9.8 CRITICAL KEV RANSOMWARE 25 PoCs Analysis NUCLEI EPSS 0.69
Microsoft Windows Server 2012 - Insecure Deserialization
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
CWE-502 Oct 14, 2025
CVE-2025-31651 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
Apache Tomcat <11.0.5 - SSRF
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
CWE-116 Apr 28, 2025
CVE-2025-3194 7.5 HIGH 1 PoC Analysis EPSS 0.00
NPM Bigint-buffer - Buffer Overflow
Versions of the package bigint-buffer from 0.0.0 are vulnerable to Buffer Overflow in the toBigIntLE() function. Attackers can exploit this to crash the application.
CWE-120 Apr 04, 2025
CVE-2025-64111 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Gogs < 0.13.4 - OS Command Injection
Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
CWE-78 Feb 06, 2026
CVE-2025-32432 10.0 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.88
CraftCMS - Remote Code Execution
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
CWE-94 Apr 25, 2025
CVE-2025-32434 9.8 CRITICAL 4 PoCs Analysis EPSS 0.01
Linuxfoundation Pytorch < 2.6.0 - Insecure Deserialization
PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0.
CWE-502 Apr 18, 2025
CVE-2025-69985 9.8 CRITICAL EXPLOITED 3 PoCs 1 Writeup Analysis EPSS 0.01
FUXA <=1.2.8 - Auth Bypass to RCE
FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.
CWE-288 Feb 24, 2026
CVE-2025-68670 9.1 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
xrdp <0.10.5 - Buffer Overflow
xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system. The vulnerability allows an attacker to overwrite the stack buffer and the return address, which could theoretically be used to redirect the execution flow. The impact of this vulnerability is lessened if a compiler flag has been used to build the xrdp executable with stack canary protection. If this is the case, a second vulnerability would need to be used to leak the stack canary value. Upgrade to version 0.10.5 to receive a patch. Additionally, do not rely on stack canary protection on production systems.
CWE-121 Jan 27, 2026
CVE-2025-65320 7.5 HIGH 2 PoCs Analysis EPSS 0.00
Abacre Restaurant Point OF Sale < 15.0.0.1656 - Cleartext Storage
Abacre Restaurant Point of Sale (POS) up to 15.0.0.1656 are vulnerable to Cleartext Storage of Sensitive Information in Memory. The application leaves valid device-bound license keys in process memory during an activation attempt.
CWE-312 Dec 03, 2025
CVE-2025-32462 2.8 LOW 13 PoCs Analysis EPSS 0.22
Sudo < 1.9.17 - Incorrect Authorization
Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
CWE-863 Jun 30, 2025