Latest Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,482 CVEs tracked 53,635 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,335 vendors 43,883 researchers
53,635 results Clear all
CVE-2025-14598 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
BeeS Software Solutions BET Portal - SQL Injection
BeeS Software Solutions BET Portal contains an SQL injection vulnerability in the login functionality of affected sites. The vulnerability enables arbitrary SQL commands to be executed on the backend database.
CWE-89 Jan 09, 2026
CVE-2025-66802 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Sourcecodester Covid-19 Contact Tracing System 1.0 - RCE
Sourcecodester Covid-19 Contact Tracing System 1.0 is vulnerable to RCE (Remote Code Execution). The application receives a reverse shell (php) into imagem of the user enabling RCE.
CWE-434 Jan 12, 2026
CVE-2025-2026 HIGH 1 PoC Analysis EPSS 0.00
NPort 6100-G2/6200-G2 Series - Code Injection
The NPort 6100-G2/6200-G2 Series is affected by a high-severity vulnerability (CVE-2025-2026) that allows remote attackers to execute a null byte injection through the device’s web API. This may lead to an unexpected device reboot and result in a denial-of-service (DoS) condition. An authenticated remote attacker with web read-only privileges can exploit the vulnerable API to inject malicious input. Successful exploitation may cause the device to reboot, disrupting normal operations and causing a temporary denial of service.
CWE-170 Dec 31, 2025
CVE-2025-41068 7.5 HIGH 1 PoC Analysis EPSS 0.00
Open5gs < 2.7.5 - Reachable Assertion
Reachable Assertion vulnerability in Open5GS up to version 2.7.6 allows attackers with connectivity to the NRF to cause a denial of service. This is achieved by sending the creation of an NF with an invalid type via SBI and then requesting its data. The NRF executes a check that crashes the process, leaving the discovery service unresponsive.
CWE-617 Oct 27, 2025
CVE-2025-41067 7.5 HIGH 1 PoC Analysis EPSS 0.00
Open5gs < 2.7.5 - Reachable Assertion
Reachable Assertion vulnerability in Open5GS up to version 2.7.6 allows attackers with connectivity to the NRF to cause a denial of service. An SBI request that deletes the NRF's own registry causes a check that ends up crashing the NRF process and renders the discovery service unavailable.
CWE-617 Oct 27, 2025
CVE-2025-67325 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Webkul Qloapps < 1.7.0 - Unrestricted File Upload
Unrestricted file upload in the hotel review feature in QloApps versions 1.7.0 and earlier allows remote unauthenticated attackers to achieve remote code execution.
CWE-434 Jan 08, 2026
CVE-2025-24252 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Apple Ipados < 17.7.6 - Use After Free
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4. An attacker on the local network may be able to corrupt process memory.
CWE-416 Apr 29, 2025
CVE-2025-65731 6.8 MEDIUM 1 PoC Analysis EPSS 0.00
D-Link Router DIR-605L - Command Injection
An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interface without proper access control.
CWE-306 Jan 08, 2026
CVE-2025-68705 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
RustFS <1.0.0-alpha.79 - Path Traversal
RustFS is a distributed object storage system built in Rust. In versions 1.0.0-alpha.13 to 1.0.0-alpha.78, RustFS contains a path traversal vulnerability in the /rustfs/rpc/read_file_stream endpoint. This issue has been patched in version 1.0.0-alpha.79.
CWE-22 Jan 07, 2026
CVE-2025-52488 8.6 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.24
Dnnsoftware Dotnetnuke < 10.0.1 - Information Disclosure
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted series of malicious interaction to potentially expose NTLM hashes to a third party SMB server. This issue has been patched in version 10.0.1.
CWE-200 Jun 21, 2025
CVE-2025-3464 HIGH 1 PoC Analysis EPSS 0.00
Armoury Crate - Auth Bypass
A race condition vulnerability exists in Armoury Crate. This vulnerability arises from a Time-of-check Time-of-use issue, potentially leading to authentication bypass. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.
CWE-367 Jun 16, 2025
CVE-2025-3243 6.3 MEDIUM 3 PoCs Analysis EPSS 0.00
code-projects Patient Record Management System 1.0 - SQL Injection
A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dental_form.php. The manipulation of the argument itr_no/dental_no leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Apr 04, 2025
CVE-2025-49071 10.0 CRITICAL 1 PoC Analysis EPSS 0.01
NasaTheme Flozen - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in NasaTheme Flozen flozen-theme allows Upload a Web Shell to a Web Server.This issue affects Flozen: from n/a through < 1.5.1.
CWE-434 Jun 17, 2025
CVE-2025-66838 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Aris v10.0.23.0.3587512 - DoS
In Aris v10.0.23.0.3587512 and before, the file upload functionality does not enforce any rate limiting or throttling, allowing users to upload files at an unrestricted rate. An attacker can exploit this behavior to rapidly upload a large volume of files, potentially leading to resource exhaustion such as disk space depletion, increased server load, or degraded performance
CWE-770 Jan 07, 2026
CVE-2025-66837 6.8 MEDIUM 1 PoC Analysis EPSS 0.00
ARIS 10.0.23.0.3587512 - RCE
A file upload vulnerability in ARIS 10.0.23.0.3587512 allows attackers to execute arbitrary code via uploading a crafted PDF file/Malware
CWE-434 Jan 07, 2026
CVE-2025-69194 8.8 HIGH 1 PoC Analysis EPSS 0.00
GNU Wget2 - Path Traversal
A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.
CWE-22 Jan 09, 2026
CVE-2025-65354 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Puneethreddyhc Event Management - SQL Injection
Improper input handling in /Grocery/search_products_itname.php inPuneethReddyHC event-management 1.0 permits SQL injection via the sitem_name POST parameter. Crafted payloads can alter query logic and disclose database contents. Exploitation may result in sensitive data disclosure and backend compromise.
CWE-89 Dec 23, 2025
CVE-2025-67160 7.5 HIGH 1 PoC Analysis EPSS 0.00
Vatilon Pa4 Firmware - Path Traversal
An issue in Vatilon v1.12.37-20240124 allows attackers to access sensitive directories and files via a directory traversal.
CWE-22 Jan 02, 2026
CVE-2025-12030 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
ACF to REST API <3.3.4 - Insecure Direct Object Reference
The ACF to REST API plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.3.4. This is due to insufficient capability checks in the update_item_permissions_check() method, which only verifies that the current user has the edit_posts capability without checking object-specific permissions (e.g., edit_post($id), edit_user($id), manage_options). This makes it possible for authenticated attackers, with Contributor-level access and above, to modify ACF fields on posts they do not own, any user account, comments, taxonomy terms, and even the global options page via the /wp-json/acf/v3/{type}/{id} endpoints, granted they can authenticate to the site.
CWE-639 Jan 07, 2026
CVE-2025-61246 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
indieka900 online-shopping-system-php 1.0 - SQL Injection
indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in master/review_action.php via the proId parameter.
CWE-89 Jan 08, 2026