Latest Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
53,634 results Clear all
CVE-2025-54574 9.3 CRITICAL 2 PoCs Analysis EPSS 0.04
Squid < 6.4 - Out-of-Bounds Write
Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management. This has been fixed in version 6.4. To work around this issue, disable URN access permissions.
CWE-122 Aug 01, 2025
CVE-2025-65264 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
Cpuid Cpu-z < 2.17 - Improper Input Validation
The kernel driver of CPUID CPU-Z v2.17 and earlier does not validate user-supplied values passed via its IOCTL interface, allowing an attacker to access sensitive information via a crafted request.
CWE-20 Jan 27, 2026
CVE-2025-41243 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.05
Spring Cloud Gateway Server Webflux - Info Disclosure
Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
CWE-917 Sep 16, 2025
CVE-2025-14855 7.2 HIGH 1 PoC Analysis EPSS 0.00
WordPress SureForms <2.2.0 - XSS
The SureForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form field parameters in all versions up to, and including, 2.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79 Dec 21, 2025
CVE-2025-65742 8.2 HIGH 1 PoC Analysis EPSS 0.00
Newgen OmniDocs v11.0 - Info Disclosure
An unauthenticated Broken Function Level Authorization (BFLA) vulnerability in Newgen OmniDocs v11.0 allows attackers to obtain sensitive information and execute a full account takeover via a crafted API request.
CWE-862 Dec 15, 2025
CVE-2025-70368 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Worklenz - XSS
Worklenz version 2.1.5 contains a Stored Cross-Site Scripting (XSS) vulnerability in the Project Updates feature. An attacker can submit a malicious payload in the Updates text field which is then rendered in the reporting view without proper sanitization. Malicious JavaScript may be executed in a victim's browser when they browse to the page containing the vulnerable field.
CWE-79 Jan 26, 2026
CVE-2025-46657 7.2 HIGH 1 PoC Analysis EPSS 0.00
Karaz Karazal - Reflected XSS
Karaz Karazal through 2025-04-14 allows reflected XSS via the lang parameter to the default URI.
CWE-79 Apr 27, 2025
CVE-2025-69612 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Tmsglobalsoft Tms Management Console - Path Traversal
A path traversal vulnerability exists in TMS Management Console (version 6.3.7.27386.20250818) from TMS Global Software. The "Download Template" function in the profile dashboard does not neutralize directory traversal sequences (../) in the filePath parameter, allowing authenticated users to read arbitrary files, such as the server's Web.config.
CWE-22 Jan 22, 2026
CVE-2025-9998 MEDIUM 1 PoC Analysis EPSS 0.00
Networking Server - DoS
The sequence of packets received by a Networking server are not correctly checked. An attacker could exploit this vulnerability to send specially crafted messages to force the application to stop.
CWE-754 Sep 05, 2025
CVE-2025-69821 7.4 HIGH 1 PoC Analysis EPSS 0.00
Beatxp Vega Smartwatch Firmware - Improper Resource Release
An issue in Beat XP VEGA Smartwatch (Firmware Version - RB303ATV006229) allows an attacker to cause a denial of service via the BLE connection
CWE-404 Jan 22, 2026
CVE-2025-69822 7.4 HIGH 1 PoC Analysis EPSS 0.00
Atomberg Erica Smart Fan Firmware - Information Disclosure
An issue in Atomberg Atomberg Erica Smart Fan Firmware Version: V1.0.36 allows an attacker to obtain sensitive information and escalate privileges via a crafted deauth frame
CWE-200 Jan 22, 2026
CVE-2025-67221 7.5 HIGH 1 PoC Analysis EPSS 0.00
IJL Orjson < 3.11.4 - Resource Allocation Without Limits
The orjson.dumps function in orjson thru 3.11.4 does not limit recursion for deeply nested JSON documents.
CWE-770 Jan 22, 2026
CVE-2025-70899 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Phpgurukul Online Course Registration - CSRF
PHPgurukul Online Course Registration v3.1 lacks Cross-Site Request Forgery (CSRF) protection on all administrative forms. An attacker can perform unauthorized actions on behalf of authenticated administrators by tricking them into visiting a malicious webpage.
CWE-352 Jan 22, 2026
CVE-2025-9876 6.4 MEDIUM 1 PoC Analysis EPSS 0.00
Ird Slider <1.0.2 - XSS
The Ird Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'irdslider' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79 Oct 03, 2025
CVE-2025-60021 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Apache Brpc < 1.15.0 - Command Injection
Remote command injection vulnerability in heap profiler builtin service in Apache bRPC ((all versions < 1.15.0)) on all platforms allows attacker to inject remote command. Root Cause: The bRPC heap profiler built-in service (/pprof/heap) does not validate the user-provided extra_options parameter and executes it as a command-line argument. Attackers can execute remote commands using the extra_options parameter.. Affected scenarios: Use the built-in bRPC heap profiler service to perform jemalloc memory profiling. How to Fix: we provide two methods, you can choose one of them: 1. Upgrade bRPC to version 1.15.0. 2. Apply this patch ( https://github.com/apache/brpc/pull/3101 ) manually.
CWE-77 Jan 16, 2026
CVE-2025-38678 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
Linux kernel - Use After Free
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150
Sep 03, 2025
CVE-2025-61686 9.1 CRITICAL 3 PoCs Analysis EPSS 0.00
React Router <7.9.3 - Path Traversal
React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node prior to version 2.17.2, if createFileSessionStorage() is being used from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an unsigned cookie, it is possible for an attacker to cause the session to try to read/write from a location outside the specified session file directory. The success of the attack would depend on the permissions of the web server process to access those files. Read files cannot be returned directly to the attacker. Session file reads would only succeed if the file matched the expected session file format. If the file matched the session file format, the data would be populated into the server side session but not directly returned to the attacker unless the application logic returned specific session information. This issue has been patched in @react-router/node version 7.9.4, @remix-run/deno version 2.17.2, and @remix-run/node version 2.17.2.
CWE-22 Jan 10, 2026
CVE-2025-15158 8.8 HIGH 1 PoC Analysis EPSS 0.00
WP Enable WebP <1.0 - File Upload
The WP Enable WebP plugin for WordPress is vulnerable to arbitrary file uploads due to improper file type validation in the 'wpse_file_and_ext_webp' function in all versions up to, and including, 1.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Jan 07, 2026
CVE-2025-9933 7.3 HIGH 1 PoC Analysis EPSS 0.00
Phpgurukul Beauty Parlour Management System - Injection
A vulnerability has been found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. Such manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Sep 04, 2025
CVE-2025-50154 6.5 MEDIUM 5 PoCs Analysis EPSS 0.16
Windows File Explorer - Info Disclosure
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CWE-200 Aug 12, 2025