Latest Vulnerabilities with Public Exploits

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,482 CVEs tracked 53,635 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,335 vendors 43,883 researchers
53,639 results Clear all
CVE-2025-63665 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
GT Edge AI CE <v2.0.12 - RCE
An issue in GT Edge AI Community Edition Versions before v2.0.12 allows attackers to execute arbitrary code via injecting a crafted JSON payload into the Prompt window.
CWE-94 Dec 19, 2025
CVE-2025-65817 8.8 HIGH 1 PoC Analysis EPSS 0.00
LSC Smart Connect Indoor IP Camera <1.4.13 - RCE
LSC Smart Connect Indoor IP Camera 1.4.13 contains a RCE vulnerability in start_app.sh.
CWE-94 Dec 22, 2025
CVE-2025-63666 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Tenda AC15 v15.03.05.18_multi - Info Disclosure
Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.
CWE-284 Nov 12, 2025
CVE-2025-65099 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Anthropic Claude Code < 1.0.39 - Code Injection
Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust dialog. Exploiting this would have required a user to start Claude Code in an untrusted directory and to be using Yarn 3.0 or above. This issue has been patched in version 1.0.39.
CWE-94 Nov 19, 2025
CVE-2025-54988 8.4 HIGH 2 PoCs Analysis EPSS 0.00
Apache Tika < 3.2.2 - XXE
Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard. Users are recommended to upgrade to version 3.2.2, which fixes this issue.
CWE-611 Aug 20, 2025
CVE-2025-14440 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
JAY Login & Register <2.4.01 - Auth Bypass
The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
CWE-565 Dec 13, 2025
CVE-2025-14156 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Fox LMS - WordPress LMS Plugin <1.0.5.1 - Privilege Escalation
The Fox LMS – WordPress LMS Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.0.5.1. This is due to the plugin not properly validating the 'role' parameter when creating new users via the `/fox-lms/v1/payments/create-order` REST API endpoint. This makes it possible for unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, leading to complete site compromise.
CWE-20 Dec 15, 2025
CVE-2025-40602 6.6 MEDIUM KEV RANSOMWARE 2 PoCs Analysis EPSS 0.00
Sonicwall Sma6200 Firmware < 12.4.3-03245 - Privilege Escalation
A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).
CWE-862 Dec 18, 2025
CVE-2025-68434 8.8 HIGH 1 PoC Analysis EPSS 0.00
Opensourcepos Open Source Point OF Sale < 3.4.2 - CSRF
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
CWE-352 Dec 17, 2025
CVE-2025-62470 7.8 HIGH 1 PoC Analysis EPSS 0.00
Microsoft Windows 10 1607 < 10.0.14393.8688 - Heap Buffer Overflow
Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CWE-122 Dec 09, 2025
CVE-2025-62454 7.8 HIGH 1 PoC Analysis EPSS 0.00
Microsoft Windows 10 1809 < 10.0.17763.8146 - Heap Buffer Overflow
Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
CWE-122 Dec 09, 2025
CVE-2025-21628 9.1 CRITICAL 1 PoC EPSS 0.00
Chatwoot < 3.16.0 - SQL Injection
Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.
CWE-89 Jan 09, 2025
CVE-2025-68116 8.9 HIGH 1 PoC Analysis EPSS 0.00
Filerise < 2.7.1 - XSS
FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 2.7.1 are vulnerable to Stored Cross-Site Scripting (XSS) due to unsafe handling of browser-renderable user uploads when served through the sharing and download endpoints. An attacker who can get a crafted SVG (primary) or HTML (secondary) file stored in a FileRise instance can cause JavaScript execution when a victim opens a generated share link (and in some cases via the direct download endpoint). This impacts share links (`/api/file/share.php`) and direct file access / download path (`/api/file/download.php`), depending on browser/content-type behavior. Version 2.7.1 fixes the issue.
CWE-79 Dec 16, 2025
CVE-2025-66224 8.8 HIGH 1 PoC Analysis EPSS 0.00
OrangeHRM <5.7 - Code Injection
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application contains an input-neutralization flaw in its mail configuration and delivery workflow that allows user-controlled values to flow directly into the system’s sendmail command. Because these values are not sanitized or constrained before being incorporated into the command execution path, certain sendmail behaviors can be unintentionally invoked during email processing. This makes it possible for the application to write files on the server as part of the mail-handling routine, and in deployments where those files end up in web-accessible locations, the behavior can be leveraged to achieve execution of attacker-controlled content. The issue stems entirely from constructing OS-level command strings using unsanitized input within the mail-sending logic. This issue has been patched in version 5.8.
CWE-94 Nov 29, 2025
CVE-2025-23339 3.3 LOW 1 PoC Analysis EPSS 0.00
Nvidia Cuda Toolkit < 13.0.0 - Stack Buffer Overflow
NVIDIA CUDA Toolkit for all platforms contains a vulnerability in cuobjdump where an attacker may cause a stack-based buffer overflow by getting the user to run cuobjdump on a malicious ELF file. A successful exploit of this vulnerability may lead to arbitrary code execution at the privilege level of the user running cuobjdump.
CWE-121 Sep 24, 2025
CVE-2025-31702 6.8 MEDIUM 1 PoC Analysis EPSS 0.00
Dahua embedded products - Privilege Escalation
A vulnerability exists in certain Dahua embedded products. Third-party malicious attacker with obtained normal user credentials could exploit the vulnerability to access certain data which are restricted to admin privileges, such as system-sensitive files through specific HTTP request. This may cause tampering with admin password, leading to privilege escalation. Systems with only admin account are not affected.
CWE-732 Oct 15, 2025
CVE-2025-65855 6.6 MEDIUM 1 PoC Analysis EPSS 0.00
Netun Solutions HelpFlash IoT v18_178_221102_ASCII_PRO_1R5_50 - RCE
The OTA firmware update mechanism in Netun Solutions HelpFlash IoT (firmware v18_178_221102_ASCII_PRO_1R5_50) uses hard-coded WiFi credentials identical across all devices and does not authenticate update servers or validate firmware signatures. An attacker with brief physical access can activate OTA mode (8-second button press), create a malicious WiFi AP using the known credentials, and serve malicious firmware via unauthenticated HTTP to achieve arbitrary code execution on this safety-critical emergency signaling device.
CWE-319 Dec 17, 2025
CVE-2025-65518 7.5 HIGH 1 PoC Analysis EPSS 0.00
Webpros Plesk Obsidian < 18.0.73 - Denial of Service
Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. The vulnerability exists in the get_password.php endpoint, where a crafted request containing a malicious payload can cause the affected web interface to continuously reload, rendering the service unavailable to legitimate users. An attacker can exploit this issue remotely without authentication, resulting in a persistent availability impact on the affected Plesk Obsidian instance.
CWE-400 Jan 08, 2026
CVE-2025-67780 4.2 MEDIUM 1 PoC Analysis EPSS 0.00
SpaceX Starlink Dish - Unauthenticated RCE
SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.
CWE-306 Dec 11, 2025
CVE-2025-48952 9.4 CRITICAL 1 PoC Analysis EPSS 0.00
NetAlertX <25.6.7 - Auth Bypass
NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.
CWE-697 Jul 04, 2025