Latest Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,634 results
Clear all
CVE-2025-29943
MEDIUM
1 PoC
Analysis
EPSS 0.00
AMD CPUs - Privilege Escalation
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
CWE-123
Jan 16, 2026
CVE-2025-7545
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
GNU Binutils <2.45 - Heap-based Buffer Overflow
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
CWE-119
Jul 13, 2025
CVE-2025-68120
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Visual Studio Code Go - RCE
To prevent unexpected untrusted code execution, the Visual Studio Code Go extension is now disabled in Restricted Mode.
Dec 30, 2025
CVE-2025-26198
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Vishalmathur Cloudclassroom-php Project - SQL Injection
CloudClassroom-PHP-Project v1.0 contains a critical SQL Injection vulnerability in the loginlinkadmin.php component. The application fails to sanitize user-supplied input in the admin login form before directly including it in SQL queries. This allows unauthenticated attackers to inject arbitrary SQL payloads and bypass authentication, gaining unauthorized administrative access. The vulnerability is triggered when an attacker supplies specially crafted input in the username field, such as ' OR '1'='1, leading to complete compromise of the login mechanism and potential exposure of sensitive backend data.
CWE-89
Jun 18, 2025
CVE-2025-12420
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
ServiceNow AI Platform - Privilege Escalation
A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform.
ServiceNow has addressed this vulnerability by deploying a relevant security update to hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.
CWE-250
Jan 12, 2026
CVE-2025-31133
7.8
HIGH
4 PoCs
Analysis
EPSS 0.00
Linuxfoundation Runc < 1.2.8 - Denial of Service
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
CWE-61
Nov 06, 2025
CVE-2025-31201
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.02
Apple Macos < 15.4.1 - Denial of Service
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.
CWE-1220
Apr 16, 2025
CVE-2025-31200
9.8
CRITICAL
KEV
4 PoCs
Analysis
EPSS 0.02
Apple Macos < 15.4.1 - Out-of-Bounds Write
A memory corruption issue was addressed with improved bounds checking. This issue is fixed in iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1, watchOS 11.5. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS released before iOS 18.4.1.
CWE-119
Apr 16, 2025
CVE-2025-11380
5.9
MEDIUM
1 PoC
Analysis
EPSS 0.00
Everest Backup - WordPress Cloud Backup, Migration, Restore & Cloni...
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'everest_process_status' AJAX action in all versions up to, and including, 2.3.5. This makes it possible for unauthenticated attackers to retrieve back-up file locations that can be subsequently accessed and downloaded. This does require a back-up to be running in order for an attacker to retrieve the back-up location.
CWE-862
Oct 11, 2025
CVE-2025-62221
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.03
Microsoft Windows 10 1809 < 10.0.17763.8146 - Use After Free
Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
CWE-416
Dec 09, 2025
CVE-2025-30397
7.5
HIGH
KEV
4 PoCs
Analysis
EPSS 0.21
Microsoft Scripting Engine - RCE
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
CWE-843
May 13, 2025
CVE-2025-2857
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.00
Mozilla Firefox < 136.0.4 - Exposure to Wrong Actor
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.
The original vulnerability was being exploited in the wild.
*This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.
CWE-668
Mar 27, 2025
CVE-2025-67263
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
Abacre Retail Point OF Sale - XSS
Abacre Retail Point of Sale 14.0.0.396 is affected by a stored cross-site scripting (XSS) vulnerability in the Clients module. The application fails to properly sanitize user-supplied input stored in the Name and Surname fields. An attacker can insert malicious HTML or script content into these fields, which, persisted in the database.
CWE-79
Jan 20, 2026
CVE-2025-67261
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Abacre Retail Point OF Sale - SQL Injection
Abacre Retail Point of Sale 14.0.0.396 is vulnerable to content-based blind SQL injection. The vulnerability exists in the Search function of the Orders page.
CWE-89
Jan 20, 2026
CVE-2025-65753
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Guardian Gryphon v01.06.0006.22 - Command Injection
An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.
CWE-295
Feb 17, 2026
CVE-2025-60188
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.02
Atarim - Info Disclosure
Insertion of Sensitive Information Into Sent Data vulnerability in Vito Peleg Atarim atarim-visual-collaboration allows Retrieve Embedded Sensitive Data.This issue affects Atarim: from n/a through <= 4.2.1.
CWE-201
Nov 06, 2025
CVE-2025-57176
6.5
MEDIUM
2 PoCs
Analysis
EPSS 0.00
Ceragon Networks EtherHaul - Unauthenticated File Upload
On Ceragon Networks / Siklu Communication EtherHaul and MultiHaul Series microwave antennas before 2026-03-10, the rfpiped service on TCP port 555 allows unauthenticated file uploads to any writable location on the device. File upload packets use weak encryption (metadata only) with file contents transmitted in cleartext. No authentication or path validation is performed.
CWE-434
Sep 15, 2025
CVE-2025-57174
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.02
Siklu Communications Etherhaul - RCE
An issue was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices, Firmware 7.4.0 through 10.7.3 and possibly other previous versions. The rfpiped service listening on TCP port 555 which uses static AES encryption keys hardcoded in the binary. These keys are identical across all devices, allowing attackers to craft encrypted packets that execute arbitrary commands without authentication. This is a failed patch for CVE-2017-7318. This issue may affect other Etherhaul series devices with shared firmware.
CWE-321
Sep 15, 2025
CVE-2025-10327
6.3
MEDIUM
1 PoC
Analysis
EPSS 0.02
Sourcefabric Rpi-jukebox-rfid < 2.8.0 - Command Injection
A weakness has been identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this vulnerability is an unknown functionality of the file /htdocs/api/playlist/shuffle.php. Executing manipulation of the argument playlist can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-78
Sep 12, 2025
CVE-2025-66027
6.5
MEDIUM
1 PoC
1 Writeup
Analysis
EPSS 0.00
Rallly <4.5.6 - Info Disclosure
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.
CWE-284
Nov 29, 2025