Latest Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,633 results
Clear all
CVE-2025-24085
10.0
CRITICAL
KEV
4 PoCs
Analysis
EPSS 0.15
Apple Ipados < 17.7.6 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3, watchOS 11.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
CWE-416
Jan 27, 2025
CVE-2025-0282
9.0
CRITICAL
KEV
RANSOMWARE
14 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Connect Secure <22.7R2.5 - RCE
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
CWE-121
Jan 08, 2025
CVE-2025-40536
8.1
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.69
SolarWinds Web Help Desk unauthenticated RCE
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.
CWE-693
Jan 28, 2026
CVE-2025-38352
7.4
HIGH
KEV
7 PoCs
Analysis
EPSS 0.00
Linux Kernel < 5.4.295 - TOCTOU Race Condition
In the Linux kernel, the following vulnerability has been resolved:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
If an exiting non-autoreaping task has already passed exit_notify() and
calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent
or debugger right after unlock_task_sighand().
If a concurrent posix_cpu_timer_del() runs at that moment, it won't be
able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or
lock_task_sighand() will fail.
Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.
This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because
exit_task_work() is called before exit_notify(). But the check still
makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail
anyway in this case.
CWE-367
Jul 22, 2025
CVE-2025-67733
8.5
HIGH
2 PoCs
Analysis
EPSS 0.00
Valkey <9.0.2/8.1.6/8.0.7/7.2.12 - Info Disclosure
Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.
CWE-74
Feb 23, 2026
CVE-2025-47539
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.28
Themewinter Eventin < 4.0.27 - Incorrect Privilege Assignment
Incorrect Privilege Assignment vulnerability in Arraytics Eventin wp-event-solution allows Privilege Escalation.This issue affects Eventin: from n/a through <= 4.0.26.
CWE-266
May 23, 2025
CVE-2025-54100
7.8
HIGH
5 PoCs
Analysis
EPSS 0.00
Microsoft Windows 10 1607 < 10.0.14393.8688 - Command Injection
Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.
CWE-77
Dec 09, 2025
CVE-2025-22869
7.5
HIGH
1 PoC
Analysis
EPSS 0.01
GO SSH < 0.35.0 - Resource Allocation Without Limits
SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
CWE-770
Feb 26, 2025
CVE-2025-24071
6.5
MEDIUM
EXPLOITED
32 PoCs
Analysis
EPSS 0.74
Microsoft Windows 10 1507 < 10.0.10240.20947 - Information Disclosure
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CWE-200
Mar 11, 2025
CVE-2025-29972
9.9
CRITICAL
3 PoCs
Analysis
EPSS 0.04
Azure Storage Resource Provider - SSRF
Server-side request forgery (ssrf) in Azure Storage Resource Provider allows an authorized attacker to perform spoofing over a network.
CWE-918
May 08, 2025
CVE-2025-32900
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
KDE Connect <2025-04-18 - Info Disclosure
In the KDE Connect information-exchange protocol before 2025-04-18, a packet can be crafted to temporarily change the displayed information about a device, because broadcast UDP is used. This affects KDE Connect before 1.33.0 on Android, KDE Connect before 25.04 on desktop, KDE Connect before 0.5 on iOS, Valent before 1.0.0.alpha.47, and GSConnect before 59.
CWE-348
Dec 05, 2025
CVE-2025-32901
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
KDE Connect <1.33.0 - DoS
In KDE Connect before 1.33.0 on Android, malicious device IDs (sent via broadcast UDP) could cause an application crash.
CWE-1287
Dec 05, 2025
CVE-2025-32899
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
KDE Connect <1.33.0 - DoS
In KDE Connect before 1.33.0 on Android, a packet can be crafted that causes two paired devices to unpair. Specifically, it is an invalid discovery packet sent over broadcast UDP.
CWE-1250
Dec 05, 2025
CVE-2025-32898
4.7
MEDIUM
1 PoC
Analysis
EPSS 0.00
KDE Connect <2025-04-18 - Info Disclosure
The KDE Connect verification-code protocol before 2025-04-18 uses only 8 characters and therefore allows brute-force attacks. This affects KDE Connect before 1.33.0 on Android, KDE Connect before 25.04 on desktop, KDE Connect before 0.5 on iOS, Valent before 1.0.0.alpha.47, and GSConnect before 59.
CWE-331
Dec 05, 2025
CVE-2025-10035
10.0
CRITICAL
KEV
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.52
Fortra Goanywhere Managed File Transfer < 7.6.3 - Command Injection
A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
CWE-502
Sep 18, 2025
CVE-2025-13780
9.1
CRITICAL
6 PoCs
Analysis
EPSS 0.00
Pgadmin 4 < 9.10 - Code Injection
pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
CWE-94
Dec 11, 2025
CVE-2025-14436
7.2
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.00
Brevo for WooCommerce <4.0.49 - XSS
The Brevo for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘user_connection_id’ parameter in all versions up to, and including, 4.0.49 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79
Jan 08, 2026
CVE-2025-11877
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
User Activity Log <2.2 - Info Disclosure
The User Activity Log plugin is vulnerable to a limited options update in versions up to, and including, 2.2. The failed-login handler 'ual_shook_wp_login_failed' lacks a capability check and writes failed usernames directly into update_option() calls. This makes it possible for unauthenticated attackers to push select site options from 0 to a non-zero value, allowing them to reopen registration or corrupt options like 'wp_user_roles', breaking wp-admin access. CVE-2025-13471 appears to be a duplicate of this CVE.
CWE-862
Jan 07, 2026
CVE-2025-4138
7.5
HIGH
6 PoCs
Analysis
EPSS 0.00
Python <3 - Info Disclosure
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.
You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information.
Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected.
Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CWE-22
Jun 03, 2025
CVE-2025-4334
9.8
CRITICAL
5 PoCs
Analysis
NUCLEI
EPSS 0.34
Najeebmedia Simple User Registration - Improper Privilege Management
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.
CWE-269
Jun 26, 2025