Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,635 results
Clear all
CVE-2025-54795
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Anthropic Claude Code < 1.0.20 - OS Command Injection
Claude Code is an agentic coding tool. In versions below 1.0.20, an error in command parsing makes it possible to bypass the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. This is fixed in version 1.0.20.
CWE-78
Aug 05, 2025
CVE-2025-1910
MEDIUM
1 PoC
Analysis
EPSS 0.00
WatchGuard Mobile VPN <12.11.2 - Privilege Escalation
The WatchGuard Mobile VPN with SSL Client on Windows allows a locally
authenticated non-administrative Windows user to escalate their
privileges to NT AUTHORITY/SYSTEM on the Windows machine where the VPN
Client is installed.This issue affects the Mobile VPN with SSL Client 12.0 up to and including 12.11.2.
CWE-77
Dec 04, 2025
CVE-2025-68428
7.5
HIGH
2 PoCs
Analysis
EPSS 0.00
Parall Jspdf < 4.0.0 - Path Traversal
jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents are included verbatim in the generated PDFs. Other affected methods are `addImage`, `html`, and `addFont`. Only the node.js builds of the library are affected, namely the `dist/jspdf.node.js` and `dist/jspdf.node.min.js` files. The vulnerability has been fixed in [email protected]. This version restricts file system access per default. This semver-major update does not introduce other breaking changes. Some workarounds areavailable. With recent node versions, jsPDF recommends using the `--permission` flag in production. The feature was introduced experimentally in v20.0.0 and is stable since v22.13.0/v23.5.0/v24.0.0. For older node versions, sanitize user-provided paths before passing them to jsPDF.
CWE-22
Jan 05, 2026
CVE-2025-67399
4.6
MEDIUM
1 PoC
Analysis
EPSS 0.00
Airth Smart Home Aqi Monitor Bootloader - Information Disclosure
An issue in AIRTH SMART HOME AQI MONITOR Bootloader v.1.005 allows a physically proximate attacker to obtain sensitive information via the UART port of the BK7231N controller (Wi-Fi and BLE module) on the device is open to access
CWE-200
Jan 14, 2026
CVE-2025-68472
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
Mindsdb < 25.11.1 - Path Traversal
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. The PUT handler in file.py directly joins user-controlled data into a filesystem path when the request body is JSON and source_type is not "url". Only multipart uploads and URL-sourced uploads receive sanitization; JSON uploads lack any call to clear_filename or equivalent checks. This vulnerability is fixed in 25.11.1.
CWE-22
Jan 12, 2026
CVE-2025-53136
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Microsoft Windows 10 1507 < 10.0.10240.21100 - Information Disclosure
Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally.
CWE-200
Aug 12, 2025
CVE-2025-14172
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
WP Page Permalink Extension <1.5.4 - Auth Bypass
The WP Page Permalink Extension plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.5.4. This is due to missing authorization checks on the `cwpp_trigger_flush_rewrite_rules` function hooked to `wp_ajax_cwpp_trigger_flush_rewrite_rules`. This makes it possible for authenticated attackers, with Subscriber-level access and above, to flush the site's rewrite rules via the `action` parameter.
CWE-862
Jan 09, 2026
CVE-2025-59057
7.6
HIGH
1 PoC
Analysis
EPSS 0.00
Shopify React-router < 7.8.2 - XSS
React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. and react-router versions 7.0.0 through 7.8.2, a XSS vulnerability exists in in React Router's meta()/<Meta> APIs in Framework Mode when generating script:ld+json tags which could allow arbitrary JavaScript execution during SSR if untrusted content is used to generate the tag. There is no impact if the application is being used in Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>). This issue has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0.
CWE-79
Jan 10, 2026
CVE-2025-54918
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Microsoft Windows 10 1507 < 10.0.10240.21128 - Authentication Bypass
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.
CWE-287
Sep 09, 2025
CVE-2025-0886
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Elliptic Labs Virtual Lock Sensor - Privilege Escalation
An incorrect permissions vulnerability was reported in Elliptic Labs Virtual Lock Sensor that could allow a local, authenticated user to escalate privileges.
CWE-276
Jul 17, 2025
CVE-2025-58098
8.3
HIGH
1 PoC
Analysis
EPSS 0.00
Apache HTTP Server <2.4.66 - Command Injection
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.
This issue affects Apache HTTP Server before 2.4.66.
Users are recommended to upgrade to version 2.4.66, which fixes the issue.
CWE-201
Dec 05, 2025
CVE-2025-52694
10.0
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.14
Advantech Iot Edge Linux Docker < 2.0.2 - SQL Injection
Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet, potentially affecting data confidentiality, integrity, and availability. Users and administrators of affected product versions are advised to update to the latest versions immediately.
CWE-89
Jan 12, 2026
CVE-2025-53020
7.5
HIGH
1 PoC
Analysis
EPSS 0.01
Apache HTTP Server < 2.4.64 - Memory Leak
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server.
This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63.
Users are recommended to upgrade to version 2.4.64, which fixes the issue.
CWE-401
Jul 10, 2025
CVE-2025-24201
10.0
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.00
Apple Safari < 18.3.1 - Out-of-Bounds Write
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in Safari 18.3.1, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.2 and iPadOS 18.3.2, iPadOS 17.7.6, macOS Sequoia 15.3.2, visionOS 2.3.2, watchOS 11.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).
CWE-787
Mar 11, 2025
CVE-2025-68664
9.3
CRITICAL
2 PoCs
Analysis
EPSS 0.00
LangChain <0.3.81 and 1.2.5 - Code Injection
LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5.
CWE-502
Dec 23, 2025
CVE-2025-63314
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.00
DDSN Interactive Acora CMS <10.7.1 - Code Injection
A static password reset token in the password reset function of DDSN Interactive Acora CMS v10.7.1 allows attackers to arbitrarily reset the user password and execute a full account takeover via a replay attack.
CWE-640
Jan 12, 2026
CVE-2025-14736
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Frontend Admin by DynamiApps <3.28.25 - Privilege Escalation
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.28.29. This is due to insufficient validation of user-supplied role values in the 'validate_value', 'pre_update_value', and 'get_fields_display' functions. This makes it possible for unauthenticated attackers to register as administrators and gain complete control of the site, granted they can access a user registration form containing a Role field.
CWE-269
Jan 09, 2026
CVE-2025-67070
8.2
HIGH
1 PoC
Analysis
EPSS 0.00
Intelbras CFTV IP NVD 9032 R Ftd V2.800.00IB00C.0.T - Auth Bypass
A vulnerability exists in Intelbras CFTV IP NVD 9032 R Ftd V2.800.00IB00C.0.T, which allows an unauthenticated attacker to bypass the multi-factor authentication (MFA) mechanism during the password recovery process. This results in the ability to change the admin password and gain full access to the administrative panel.
CWE-288
Jan 09, 2026
CVE-2025-14124
8.6
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.07
Team WordPress <5.0.11 - SQL Injection
The Team WordPress plugin before 5.0.11 does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
Jan 05, 2026
CVE-2025-53640
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Indico <3.3.7 - Info Disclosure
Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Starting in version 2.2 and prior to version 3.3.7, an endpoint used to display details of users listed in certain fields (such as ACLs) could be misused to dump basic user details (such as name, affiliation and email) in bulk. Version 3.3.7 fixes the issue. Owners of instances that allow everyone to create a user account, who wish to truly restrict access to these user details, should consider restricting user search to managers. As a workaround, it is possible to restrict access to the affected endpoints (e.g. in the webserver config), but doing so would break certain form fields which could no longer show the details of the users listed in those fields, so upgrading instead is highly recommended.
CWE-639
Jul 14, 2025