Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,482 CVEs tracked 53,635 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,335 vendors 43,883 researchers
53,635 results Clear all
CVE-2025-52692 8.8 HIGH 1 PoC Analysis EPSS 0.00
Linksys E9450-sg Firmware - Missing Authentication
Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials.
CWE-306 Dec 19, 2025
CVE-2025-68615 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
net-snmp <5.9.5-5.10.pre2 - Buffer Overflow
net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.
CWE-119 Dec 23, 2025
CVE-2025-15177 7.2 HIGH 1 PoC Analysis EPSS 0.00
Tenda Wh450 Firmware - Memory Corruption
A vulnerability has been found in Tenda WH450 1.0.0.18. This vulnerability affects unknown code of the file /goform/SetIpBind of the component HTTP Request Handler. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-121 Dec 29, 2025
CVE-2025-14611 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.59
Gladinet CentreStack & Triofox <16.12.10420.56791 - Code Injection
Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with previous vulnerabilities to gain a full system compromise.
CWE-798 Dec 12, 2025
CVE-2025-65442 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Xxyopen Novel - XSS
DOM-based Cross-Site Scripting (XSS) vulnerability in 201206030 novel V3.5.0 allows remote attackers to execute arbitrary JavaScript code or disclose sensitive information (e.g., user session cookies) via a crafted "wvstest" parameter in the URL or malicious script injection into window.localStorage. The vulnerability arises from insufficient validation and encoding of user-controllable data in the book comment module: unfiltered user input is stored in the backend database (book_comment table, commentContent field) and returned via API, then rendered directly into the page DOM via Vue 3's v-html directive without sanitization. Even if modern browsers' built-in XSS filters block pop-up alerts, attackers can use concealed payloads to bypass interception and achieve actual harm.
CWE-79 Dec 29, 2025
CVE-2025-65790 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
FuguHub 8.1 - XSS
A reflected cross-site scripting (XSS) vulnerability exists in FuguHub 8.1 when serving SVG files through the /fs/ file manager interface. FuguHub does not sanitize or restrict script execution inside SVG content. When a victim opens a crafted SVG containing an inline <script> element, the browser executes the attacker-controlled JavaScript.
CWE-79 Dec 22, 2025
CVE-2025-56513 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Nicehash Quickminer - Download Without Integrity Check
NiceHash QuickMiner 6.12.0 perform software updates over HTTP without validating digital signatures or hash checks. An attacker capable of intercepting or redirecting traffic to the update url and can hijack the update process and deliver arbitrary executables that are automatically executed, resulting in full remote code execution. This constitutes a critical supply chain attack vector.
CWE-494 Sep 30, 2025
CVE-2025-1913 7.2 HIGH 1 PoC Analysis EPSS 0.02
Product Import Export for WooCommerce - Code Injection
The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE-502 Mar 26, 2025
CVE-2025-57462 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Machsol Machpanel - XSS
Stored cross-site scripting (xss) in machsol machpanel 8.0.32 allows attackers to execute arbitrary web scripts or HTML via a crafted PDF file.
CWE-79 Dec 29, 2025
CVE-2025-57460 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Machsol Machpanel - Unrestricted File Upload
File upload vulnerability in machsol machpanel 8.0.32 allows attacker to gain a webshell.
CWE-434 Dec 29, 2025
CVE-2025-59719 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.00
Fortinet Fortiweb < 7.4.9 - Signature Verification Bypass
An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
CWE-347 Dec 09, 2025
CVE-2025-66947 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Krishanmurariji Student Management System - SQL Injection
SQL injection vulnerability in krishanmuraiji SMS v.1.0, within the /studentms/admin/edit-class-detail.php via the editid GET parameter. An attacker can trigger controlled delays using SQL SLEEP() to infer database contents. Successful exploitation may lead to full database compromise, especially within an administrative module.
CWE-89 Dec 26, 2025
CVE-2025-66516 8.4 HIGH 4 PoCs Analysis NUCLEI EPSS 0.01
Apache Tika <3.2.1 - XXE
Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.
CWE-611 Dec 04, 2025
CVE-2025-9435 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
Zohocorp ManageEngine ADManager Plus <7230 - Path Traversal
Zohocorp ManageEngine ADManager Plus versions below 7230 are vulnerable to Path Traversal in the User Management module
CWE-22 Jan 13, 2026
CVE-2025-14766 8.8 HIGH 1 PoC Analysis EPSS 0.00
Google Chrome < 143.0.7499.146 - Out-of-Bounds Write
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-125 Dec 16, 2025
CVE-2025-14765 8.8 HIGH 1 PoC Analysis EPSS 0.00
Google Chrome < 143.0.7499.146 - Use After Free
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 Dec 16, 2025
CVE-2025-59532 HIGH 1 PoC Analysis EPSS 0.00
Openai Codex < 0.39.0 - Improper Input Validation
Codex CLI is a coding agent from OpenAI that runs locally. In versions 0.2.0 to 0.38.0, due to a bug in the sandbox configuration logic, Codex CLI could treat a model-generated cwd as the sandbox’s writable root, including paths outside of the folder where the user started their session. This logic bypassed the intended workspace boundary and enables arbitrary file writes and command execution where the Codex process has permissions - this did not impact the network-disabled sandbox restriction. This issue has been patched in Codex CLI 0.39.0 that canonicalizes and validates that the boundary used for sandbox policy is based on where the user started the session, and not the one generated by the model. Users running 0.38.0 or earlier should update immediately via their package manager or by reinstalling the latest Codex CLI to ensure sandbox boundaries are enforced. If using the Codex IDE extension, users should immediately update to 0.4.12 for a fix of the sandbox issue.
CWE-20 Sep 22, 2025
CVE-2025-15474 MEDIUM 1 PoC Analysis EPSS 0.00
AuntyFey Smart Combination Lock - DoS
AuntyFey Smart Combination Lock firmware versions as of 2025-12-24 contain a vulnerability that allows an unauthenticated attacker within Bluetooth Low Energy (BLE) range to cause a denial of service by repeatedly initiating BLE connections. Sustained connection attempts interrupt keypad authentication input and repeatedly force the device into lockout states, preventing legitimate users from unlocking the device.
CWE-770 Jan 07, 2026
CVE-2025-10493 5.3 MEDIUM 1 PoC Analysis EPSS 0.03
Chained Quiz <1.3.4 - Insecure Direct Object Reference
The Chained Quiz plugin for WordPress is vulnerable to Insecure Direct Object Reference in version 1.3.4 and below via the quiz submission and completion mechanisms due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to hijack and modify other users' quiz attempts by manipulating the chained_completion_id cookie value, allowing them to alter quiz answers, scores, and results of any user. The vulnerability was partially patched in versions 1.3.4 and 1.3.5.
CWE-639 Sep 18, 2025
CVE-2025-68461 7.2 HIGH KEV 2 PoCs Analysis EPSS 0.09
Roundcube Webmail < 1.5.12 - XSS
Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.
CWE-79 Dec 18, 2025