Latest Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,534 CVEs tracked 53,639 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,342 vendors 43,887 researchers
53,640 results Clear all
CVE-2025-48952 9.4 CRITICAL 1 PoC Analysis EPSS 0.00
NetAlertX <25.6.7 - Auth Bypass
NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.
CWE-697 Jul 04, 2025
CVE-2025-22252 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Fortinet Fortiproxy < 7.4.7 - Missing Authentication
A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.
CWE-306 May 28, 2025
CVE-2025-31644 8.7 HIGH 2 PoCs Analysis EPSS 0.01
BIG-IP TMOS Shell - Command Injection
When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-77 May 07, 2025
CVE-2025-2005 9.8 CRITICAL 5 PoCs Analysis EPSS 0.01
Etoilewebdesign Front End Users < 3.2.32 - Unrestricted File Upload
The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Apr 02, 2025
CVE-2025-20029 8.8 HIGH 3 PoCs Analysis EPSS 0.66
BIG-IP - Command Injection
Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-78 Feb 05, 2025
CVE-2025-54352 3.7 LOW 4 PoCs Analysis EPSS 0.00
WordPress <6.8.2 - Info Disclosure
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.
CWE-669 Jul 21, 2025
CVE-2025-66039 9.8 CRITICAL 2 PoCs Analysis EPSS 0.35
FreePBX firmware file upload
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.
CWE-287 Dec 09, 2025
CVE-2025-65427 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Dbitnet Dbit N300 T1 Pro Firmware - Brute Force
An issue was discovered in Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router on firmware version V1.0.0 does not implement rate limiting to /api/login allowing attackers to brute force password enumerations.
CWE-307 Dec 16, 2025
CVE-2025-40677 HIGH 2 PoCs Analysis EPSS 0.00
Summar Software's Portal del Empleado - SQL Injection
SQL injection vulnerability in Summar Software´s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter “ctl00$ContentPlaceHolder1$filtroNombre” in “/MemberPages/quienesquien.aspx”.
CWE-89 Sep 18, 2025
CVE-2025-59342 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.06
esm.sh <136 - Path Traversal
esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a path-traversal flaw in the handling of the X-Zone-Id HTTP header allows an attacker to cause the application to write files outside the intended storage location. The header value is used to build a filesystem path but is not properly canonicalized or restricted to the application’s storage base directory. As a result, supplying ../ sequences in X-Zone-Id causes files to be written to arbitrary directories. Version 136.1 contains a patch.
CWE-24 Sep 17, 2025
CVE-2025-65318 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Canary Mail <5.1.40 - Info Disclosure
When using the attachment interaction functionality, Canary Mail 5.1.40 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software.
CWE-693 Dec 16, 2025
CVE-2025-45805 7.6 HIGH 1 PoC Analysis EPSS 0.00
Phpgurukul Doctor Appointment Management System - XSS
In phpgurukul Doctor Appointment Management System 1.0, an authenticated doctor user can inject arbitrary JavaScript code into their profile name. This payload is subsequently rendered without proper sanitization, when a user visits the website and selects the doctor to book an appointment.
CWE-79 Sep 03, 2025
CVE-2025-20384 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Splunk <10.0.1-9.2.10 - Info Disclosure
In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125, an unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This may allow them to poison, forge, or obfuscate sensitive log data through specially crafted HTTP requests, potentially impacting log integrity and detection capabilities.
CWE-117 Dec 03, 2025
CVE-2025-56450 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Log2Space Subscriber Management Software 1.1 - SQL Injection
Log2Space Subscriber Management Software 1.1 is vulnerable to unauthenticated SQL injection via the `lead_id` parameter in the `/l2s/api/selfcareLeadHistory` endpoint. A remote attacker can exploit this by sending a specially crafted POST request, resulting in the execution of arbitrary SQL queries. The backend fails to sanitize the user input, allowing enumeration of database schemas, table names, and potentially leading to full database compromise.
CWE-89 Oct 21, 2025
CVE-2025-6218 7.8 HIGH KEV 6 PoCs Analysis EPSS 0.06
RARLAB WinRAR - RCE
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
CWE-22 Jun 21, 2025
CVE-2025-60719 7.0 HIGH 1 PoC Analysis EPSS 0.00
Windows Ancillary Function Driver - Privilege Escalation
Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CWE-822 Nov 11, 2025
CVE-2025-64720 7.1 HIGH 1 PoC Analysis EPSS 0.00
Libpng < 1.6.51 - Out-of-Bounds Read
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
CWE-125 Nov 25, 2025
CVE-2025-49666 7.2 HIGH 1 PoC Analysis EPSS 0.01
Microsoft Windows Server 2016 < 10.0.14393.8246 - Heap Buffer Overflow
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to execute code over a network.
CWE-122 Jul 08, 2025
CVE-2025-14221 3.5 LOW 1 PoC Analysis EPSS 0.00
SourceCodester Online Banking System 1.0 - XSS
A vulnerability was detected in SourceCodester Online Banking System 1.0. This impacts an unknown function of the file /?page=user. The manipulation of the argument First Name/Last Name results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.
CWE-94 Dec 08, 2025
CVE-2025-1461 5.6 MEDIUM 1 PoC Analysis EPSS 0.00
Vuetify >=2.0.0 < - XSS
Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .
CWE-79 May 28, 2025