Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,635 results
Clear all
CVE-2025-66027
6.5
MEDIUM
1 PoC
1 Writeup
Analysis
EPSS 0.00
Rallly <4.5.6 - Info Disclosure
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.
CWE-284
Nov 29, 2025
CVE-2025-65034
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - IDOR
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-65033
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - Improper Authorization
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the poll management feature allows any authenticated user to pause or resume any poll, regardless of ownership. The system only uses the public pollId to identify polls, and it does not verify whether the user performing the action is the poll owner. As a result, any user can disrupt polls created by others, leading to a loss of integrity and availability across the application. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-65032
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - IDOR
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability allows any authenticated user to change the display names of other participants in polls without being an admin or the poll owner. By manipulating the participantId parameter in a rename request, an attacker can modify another user’s name, violating data integrity and potentially causing confusion or impersonation attacks. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-65031
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - Improper Authorization
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization flaw in the comment creation endpoint allows authenticated users to impersonate any other user by altering the authorName field in the API request. This enables attackers to post comments under arbitrary usernames, including privileged ones such as administrators, potentially misleading other users and enabling phishing or social engineering attacks. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-65030
7.1
HIGH
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - Improper Authorization
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the comment deletion API allows any authenticated user to delete comments belonging to other users, including poll owners and administrators. The endpoint relies solely on the comment ID for deletion and does not validate whether the requesting user owns the comment or has permission to remove it. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-65029
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - Missing Authorization
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to delete arbitrary participants from polls without ownership verification. The endpoint relies solely on a participant ID to authorize deletions, enabling attackers to remove other users (including poll owners) from polls. This impacts the integrity and availability of poll participation data. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-65028
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - Missing Authorization
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to modify other participants’ votes in polls without authorization. The backend relies solely on the participantId parameter to identify which votes to update, without verifying ownership or poll permissions. This allows an attacker to alter poll results in their favor, directly compromising data integrity. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-65021
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - Missing Authorization
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability exists in the poll finalization feature of the application. Any authenticated user can finalize a poll they do not own by manipulating the pollId parameter in the request. This allows unauthorized users to finalize other users’ polls and convert them into events without proper authorization checks, potentially disrupting user workflows and causing data integrity and availability issues. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-65020
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Rallly < 4.5.4 - Missing Authorization
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4.
CWE-639
Nov 19, 2025
CVE-2025-20393
10.0
CRITICAL
KEV
5 PoCs
Analysis
EPSS 0.07
Cisco AsyncOS - RCE
A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges.
This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
CWE-20
Dec 17, 2025
CVE-2025-69581
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Chamillo LMS 1.11.2 - Info Disclosure
An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Using the browser back button restores all personal data, allowing unauthorized users on the same device to view confidential information. This leads to profiling, impersonation, targeted attacks, and significant privacy risks.
CWE-524
Jan 16, 2026
CVE-2025-53783
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Microsoft Teams - Buffer Overflow
Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.
CWE-122
Aug 12, 2025
CVE-2025-66698
8.6
HIGH
1 PoC
Analysis
EPSS 0.00
Semantic machines <5.4.8 - Auth Bypass
An issue in Semantic machines v5.4.8 allows attackers to bypass authentication via sending a crafted HTTP request to various API endpoints.
CWE-287
Jan 13, 2026
CVE-2025-3616
8.8
HIGH
1 PoC
Analysis
EPSS 0.01
Greenshiftwp Greenshift - Animation A... - Unrestricted File Upload
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in versions 11.4 to 11.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The arbitrary file upload was sufficiently patched in 11.4.5, but a capability check was added in 11.4.6 to properly prevent unauthorized limited file uploads.
CWE-434
Apr 22, 2025
CVE-2025-67246
7.3
HIGH
1 PoC
1 Writeup
Analysis
EPSS 0.00
Ludashi Driver < 5.1025 - Improper Privilege Management
A local information disclosure vulnerability exists in the Ludashi driver before 5.1025 due to a lack of access control in the IOCTL handler. This driver exposes a device interface accessible to a normal user and handles attacker-controlled structures containing the lower 4GB of physical addresses. The handler maps arbitrary physical memory via MmMapIoSpace and copies data back to user mode without verifying the caller's privileges or the target address range. This allows unprivileged users to read arbitrary physical memory, potentially exposing kernel data structures, kernel pointers, security tokens, and other sensitive information. This vulnerability can be further exploited to bypass the Kernel Address Space Layout Rules (KASLR) and achieve local privilege escalation.
CWE-269
Jan 15, 2026
CVE-2025-55462
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Eramba Community/Enterprise <3.26.0 - SSRF
A CORS misconfiguration in Eramba Community and Enterprise Editions v3.26.0 allows an attacker-controlled Origin header to be reflected in the Access-Control-Allow-Origin response along with Access-Control-Allow-Credentials: true. This permits malicious third-party websites to perform authenticated cross-origin requests against the Eramba API, including endpoints like /system-api/login and /system-api/user/me. The response includes sensitive user session data (ID, name, email, access groups), which is accessible to the attacker's JavaScript. This flaw enables full session hijack and data exfiltration without user interaction. Eramba versions 3.23.3 and earlier were tested and appear unaffected. The vulnerability is present in default installations, requiring no custom configuration.
CWE-942
Jan 13, 2026
CVE-2025-14502
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
News and Blog Designer Bundle <1.1 - Local File Inclusion
The News and Blog Designer Bundle plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1 via the template parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
CWE-98
Jan 14, 2026
CVE-2025-9501
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.03
W3 Total Cache <2.8.13 - Command Injection
The W3 Total Cache WordPress plugin before 2.8.13 is vulnerable to command injection via the _parse_dynamic_mfunc function, allowing unauthenticated users to execute PHP commands by submitting a comment with a malicious payload to a post.
Nov 17, 2025
CVE-2025-40019
3 PoCs
Analysis
EPSS 0.00
Linux Kernel - Crypto Vuln
In the Linux kernel, the following vulnerability has been resolved:
crypto: essiv - Check ssize for decryption and in-place encryption
Move the ssize check to the start in essiv_aead_crypt so that
it's also checked for decryption and in-place encryption.
Oct 24, 2025