Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
53,663 results Clear all
CVE-2025-60425 8.6 HIGH 2 PoCs Analysis EPSS 0.02
Nagios Fusion <2024R2 - Session Hijacking
Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session tokens when the two-factor authentication mechanism is enabled, allowing attackers to perform a session hijacking attack.
CWE-491 Oct 27, 2025
CVE-2025-60424 7.6 HIGH 2 PoCs Analysis EPSS 0.00
Nagios Fusion <2024R2 - Auth Bypass
A lack of rate limiting in the OTP verification component of Nagios Fusion v2024R1.2 and v2024R2 allows attackers to bypass authentication via a bruteforce attack.
CWE-287 Oct 27, 2025
CVE-2025-60852 6.5 MEDIUM 2 PoCs Analysis EPSS 0.00
Instant Developer Foundation <25.0.9600 - Code Injection
A CSV Injection vulnerability existed in Instant Developer Foundation versions prior to 25.0.9600. Applications built with affected versions of the framework did not properly sanitize user-controlled input before including it in CSV exports. This issue could lead to code execution on the system where the exported CSV file is opened.
CWE-1236 Oct 23, 2025
CVE-2025-56802 5.1 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Reolink desktop app - Info Disclosure
The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.
CWE-321 Oct 21, 2025
CVE-2025-56801 5.1 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Reolink Desktop App 8.18.12 - Info Disclosure
The Reolink Desktop Application 8.18.12 contains hardcoded credentials as the Initialization Vector (IV) in its AES-CFB encryption implementation allowing attackers with access to the application environment to reliably decrypt encrypted configuration data. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.
CWE-321 Oct 21, 2025
CVE-2025-56800 5.1 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Reolink - Authentication Bypass by Spoofing
Reolink desktop application 8.18.12 contains a vulnerability in its local authentication mechanism. The application implements lock screen password logic entirely on the client side using JavaScript within an Electron resource file. Because the password is stored and returned via a modifiable JavaScript property(a.settingsManager.lockScreenPassword), an attacker can patch the return value to bypass authentication. NOTE: this is disputed by the Supplier because the lock-screen bypass would only occur if the local user modified his own instance of the application.
CWE-290 Oct 21, 2025
CVE-2025-56799 6.5 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.03
Reolink - Command Injection
Reolink desktop application 8.18.12 contains a command injection vulnerability in its scheduled cache-clearing mechanism via a crafted folder name. NOTE: this is disputed by the Supplier because a crafted folder name would arise only if the local user were attacking himself.
CWE-77 Oct 21, 2025
CVE-2025-62518 8.1 HIGH 3 PoCs Analysis EPSS 0.00
Crates.io Astral-tokio-tar < 0.5.6 - Type Confusion
astral-tokio-tar is a tar archive reading/writing library for async Rust. Versions of astral-tokio-tar prior to 0.5.6 contain a boundary parsing vulnerability that allows attackers to smuggle additional archive entries by exploiting inconsistent PAX/ustar header handling. When processing archives with PAX-extended headers containing size overrides, the parser incorrectly advances stream position based on ustar header size (often zero) instead of the PAX-specified size, causing it to interpret file content as legitimate tar headers. This issue has been patched in version 0.5.6. There are no workarounds.
CWE-843 Oct 21, 2025
CVE-2025-60751 7.5 HIGH 1 PoC 1 Writeup Analysis EPSS 0.00
GeographicLib 2.5 - Buffer Overflow
GeographicLib 2.5 is vulnerable to Buffer Overflow in GeoConvert DMS::InternalDecode.
CWE-121 Oct 21, 2025
CVE-2025-61303 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Hatching Triage Sandbox - DoS
Hatching Triage Sandbox Windows 10 build 2004 (2025-08-14) and Windows 10 LTSC 2021(2025-08-14) contains a vulnerability in its Windows behavioral analysis engine that allows a submitted malware sample to evade detection and cause denial-of-analysis. The vulnerability is triggered when a sample recursively spawns a large number of child processes, generating high log volume and exhausting system resources. As a result, key malicious behavior, including PowerShell execution and reverse shell activity, may not be recorded or reported, misleading analysts and compromising the integrity and availability of sandboxed analysis results.
CWE-400 Oct 20, 2025
CVE-2025-61301 7.5 HIGH 2 PoCs Analysis EPSS 0.00
CAPEv2 - DoS
Denial-of-analysis in reporting/mongodb.py and reporting/jsondump.py in CAPEv2 (commit 52e4b43, on 2025-05-17) allows attackers who can submit samples to cause incomplete or missing behavioral analysis reports by generating deeply nested or oversized behavior data that trigger MongoDB BSON limits or orjson recursion errors when the sample executes in the sandbox.
CWE-400 Oct 20, 2025
CVE-2025-62168 10.0 CRITICAL 4 PoCs Analysis EPSS 0.00
Squid < 7.2 - Error Information Exposure
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
CWE-550 Oct 17, 2025
CVE-2025-62506 8.1 HIGH 2 PoCs 1 Writeup Analysis EPSS 0.00
Minio - Incorrect Authorization
MinIO is a high-performance object storage system. In all versions prior to RELEASE.2025-10-15T17-29-55Z, a privilege escalation vulnerability allows service accounts and STS (Security Token Service) accounts with restricted session policies to bypass their inline policy restrictions when performing operations on their own account, specifically when creating new service accounts for the same user. The vulnerability exists in the IAM policy validation logic where the code incorrectly relied on the DenyOnly argument when validating session policies for restricted accounts. When a session policy is present, the system should validate that the action is allowed by the session policy, not just that it is not denied. An attacker with valid credentials for a restricted service or STS account can create a new service account for itself without policy restrictions, resulting in a new service account with full parent privileges instead of being restricted by the inline policy. This allows the attacker to access buckets and objects beyond their intended restrictions and modify, delete, or create objects outside their authorized scope. The vulnerability is fixed in version RELEASE.2025-10-15T17-29-55Z.
CWE-863 Oct 16, 2025
CVE-2025-25252 4.8 MEDIUM 1 PoC Analysis EPSS 0.00
FortiOS SSL VPN <7.6.2, 7.4.6, 7.2.10, 7.0.16, 6.4 - Info Disclosure
An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.
CWE-613 Oct 14, 2025
CVE-2025-10492 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
Cloud Jasperreports IO < 4.0.0 - Insecure Deserialization
A Java deserialisation vulnerability has been discovered in Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library
CWE-502 Sep 16, 2025
CVE-2025-48543 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.00
Chrome - Use After Free
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-416 Sep 04, 2025
CVE-2025-48148 10.0 CRITICAL 3 PoCs Analysis EPSS 0.00
StoreKeeper <14.4.4 - Unrestricted Upload
Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce storekeeper-for-woocommerce allows Using Malicious Files.This issue affects StoreKeeper for WooCommerce: from n/a through <= 14.4.4.
CWE-434 Aug 20, 2025
CVE-2025-6758 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
Imithemes Real Spaces - WordPress Properties Directory Theme <= 3.6 - Privilege Escalation
The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'imic_agent_register' function in all versions up to, and including, 3.6. This is due to a lack of restriction in the registration role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during user registration.
CWE-269 Aug 19, 2025
CVE-2025-8671 7.5 HIGH 5 PoCs Analysis EPSS 0.01
HTTP/2 - DoS
A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.
CWE-404 Aug 13, 2025
CVE-2025-54136 7.2 HIGH 2 PoCs Analysis EPSS 0.00
Anysphere Cursor < 1.3 - OS Command Injection
Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file locally on the target's machine. Once a collaborator accepts a harmless MCP, the attacker can silently swap it for a malicious command (e.g., calc.exe) without triggering any warning or re-prompt. If an attacker has write permissions on a user's active branches of a source repository that contains existing MCP servers the user has previously approved, or allows an attacker has arbitrary file-write locally, the attacker can achieve arbitrary code execution. This is fixed in version 1.3.
CWE-78 Aug 02, 2025