Latest Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,663 results
Clear all
CVE-2025-49706
6.5
MEDIUM
KEV
RANSOMWARE
3 PoCs
Analysis
NUCLEI
EPSS 0.72
Microsoft Sharepoint Enterprise Server - Authentication Bypass
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
CWE-287
Jul 08, 2025
CVE-2025-34511
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.86
Sitecore XP CVE-2025-34511 Post-Authentication File Upload
Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) and Experience Platform (XP), through version 7.0 is vulnerable to an unrestricted file upload issue. A remote, authenticated attacker can upload arbitrary files to the server using crafted HTTP requests, resulting in remote code execution.
CWE-434
Jun 17, 2025
CVE-2025-27218
5.3
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.76
Sitecore Experience Manager (XM)/Experience Platform (XP) 10.4 - Insecure Deserialization
Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization.
CWE-94
Feb 20, 2025
CVE-2025-34128
HIGH
3 PoCs
Analysis
EPSS 0.52
X360 VideoPlayer <2.6 - Buffer Overflow
A buffer overflow vulnerability exists in the X360 VideoPlayer ActiveX control (VideoPlayer.ocx) version 2.6 when handling overly long arguments to the ConvertFile() method. An attacker can exploit this vulnerability by supplying crafted input to cause memory corruption and execute arbitrary code within the context of the current process.
CWE-120
Jul 16, 2025
CVE-2025-34109
HIGH
2 PoCs
Analysis
EPSS 0.03
Panda Security Products <16.1.2 - Code Injection
PSEvents.exe in multiple Panda Security products runs hourly with SYSTEM privileges and loads DLL files from a user-writable directory without proper validation. An attacker with low-privileged access who can write DLL files to the monitored directory can achieve arbitrary code execution with SYSTEM privileges. Affected products include Panda Global Protection 2016, Panda Antivirus Pro 2016, Panda Small Business Protection, and Panda Internet Security 2016 (all versions up to 16.1.2).
CWE-427
Jul 15, 2025
CVE-2025-34079
7.8
HIGH
2 PoCs
Analysis
EPSS 0.56
NSClient++ <0.5.2.35 - Authenticated RCE
An authenticated remote code execution vulnerability exists in NSClient++ version 0.5.2.35 when the web interface and ExternalScripts module are enabled. A remote attacker with the administrator password can authenticate to the web interface (default port 8443), inject arbitrary commands as external scripts via the /settings/query.json API, save the configuration, and trigger the script via the /query/{name} endpoint. The injected commands are executed with SYSTEM privileges, enabling full remote compromise.
This capability is an intended feature, but the lack of safeguards or privilege separation makes it risky when exposed to untrusted actors.
CWE-306
Jul 02, 2025
CVE-2025-34078
7.8
HIGH
3 PoCs
Analysis
EPSS 0.03
NSClient++ <0.5.2.35 - Privilege Escalation
A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API.
This behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions.
CWE-522
Jul 02, 2025
CVE-2025-34509
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.18
Sitecore Experience Commerce < 10.4 - Hard-coded Credentials
Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP.
CWE-798
Jun 17, 2025
CVE-2025-21293
8.8
HIGH
2 PoCs
Analysis
EPSS 0.76
Microsoft Windows 10 1507 < 10.0.10240.20890 - Improper Access Control
Active Directory Domain Services Elevation of Privilege Vulnerability
CWE-284
Jan 14, 2025
CVE-2025-52367
5.4
MEDIUM
2 PoCs
Analysis
EPSS 0.70
Pivotx - XSS
Cross Site Scripting vulnerability in PivotX CMS v.3.0.0 RC 3 allows a remote attacker to execute arbitrary code via the subtitle field.
CWE-79
Sep 22, 2025
CVE-2025-34124
HIGH
2 PoCs
Analysis
EPSS 0.13
Heroes of Might and Magic III - Buffer Overflow
A buffer overflow vulnerability exists in Heroes of Might and Magic III Complete 4.0.0.0, HD Mod 3.808 build 9, and Demo 1.0.0.0 via malicious .h3m map files that exploit object sprite name parsing logic. The vulnerability occurs during in-game map loading when a crafted object name causes a buffer overflow, potentially allowing arbitrary code execution. Exploitation requires the victim to open a malicious map file within the game.
CWE-121
Jul 16, 2025
CVE-2025-34123
HIGH
2 PoCs
Analysis
EPSS 0.09
VideoCharge Studio 2.12.3.685 - Buffer Overflow
A stack-based buffer overflow vulnerability exists in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC configuration file. The issue occurs due to improper handling of user-supplied data in the XML 'Name' attribute, leading to an SEH overwrite condition. An attacker can exploit this vulnerability by convincing a user to open a malicious .VSC file, resulting in arbitrary code execution under the context of the user.
CWE-121
Jul 16, 2025
CVE-2025-34117
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.50
Netcore/Netis <Aug 2014 - RCE
A remote code execution vulnerability exists in multiple Netcore and Netis routers models with firmware released prior to August 2014 due to the presence of an undocumented backdoor listener on UDP port 53413. Exact version boundaries remain undocumented. An unauthenticated remote attacker can send specially crafted UDP packets to execute arbitrary commands on the affected device. This backdoor uses a hardcoded authentication mechanism and accepts shell commands post-authentication. Some device models include a non-standard implementation of the `echo` command, which may affect exploitability.
CWE-306
Jul 16, 2025
CVE-2025-34112
CRITICAL
2 PoCs
Analysis
EPSS 0.50
Riverbed SteelCentral NetProfiler & NetExpress <10.8.7 - RCE
An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.
CWE-266
Jul 15, 2025
CVE-2025-34107
HIGH
2 PoCs
Analysis
EPSS 0.57
WinaXe FTP Client <7.7 - Buffer Overflow
A buffer overflow vulnerability exists in the WinaXe FTP Client version 7.7 within the FTP banner parsing functionality, WCMDPA10.dll. When the client connects to a remote FTP server and receives an overly long '220 Server Ready' response, the vulnerable component responsible for parsing the banner overflows a stack buffer, leading to arbitrary code execution under the context of the user.
CWE-121
Jul 15, 2025
CVE-2025-34106
HIGH
2 PoCs
Analysis
EPSS 0.10
PDF Shaper <3.6 - Buffer Overflow
A buffer overflow vulnerability exists in PDF Shaper versions 3.5 and 3.6 when converting a crafted PDF file to an image using the 'Convert PDF to Image' functionality. An attacker can exploit this vulnerability by tricking a user into opening a maliciously crafted PDF file, leading to arbitrary code execution under the context of the user. This vulnerability has been verified on Windows XP, 7, 8, and 10 platforms using the PDFTools.exe component.
CWE-119
Jul 15, 2025
CVE-2025-34082
CRITICAL
1 PoC
Analysis
EPSS 0.50
IGEL OS <11.04.270 - Command Injection
A command injection vulnerability exists in IGEL OS versions prior to 11.04.270 within the Secure Terminal and Secure Shadow services. The flaw arises due to improper input sanitization in the handling of specially crafted PROXYCMD commands on TCP ports 30022 and 5900. An unauthenticated attacker with network access to a vulnerable device can inject arbitrary commands, leading to remote code execution with elevated privileges.
NOTE: IGEL OS v10.x has reached end-of-life (EOL) status.
CWE-78
Jul 03, 2025
CVE-2025-33053
8.8
HIGH
KEV
6 PoCs
Analysis
EPSS 0.50
CVE-2025-33053 Exploit via Malicious .URL File and WebDAV
External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.
CWE-73
Jun 10, 2025
CVE-2025-49619
8.5
HIGH
EXPLOITED
4 PoCs
Analysis
EPSS 0.74
Skyvern SSTI Remote Code Execution
Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).
CWE-1336
Jun 07, 2025
CVE-2025-27520
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.81
BentoML v1.4.2 - RCE
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3.
CWE-502
Apr 04, 2025