Latest Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,544 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,344 vendors 43,890 researchers
53,640 results Clear all
CVE-2025-66470 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
NiceGUI <3.3.1 - XSS
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are subject to a XSS vulnerability through the ui.interactive_image component of NiceGUI. The component renders SVG content using Vue's v-html directive without any sanitization. This allows attackers to inject malicious HTML or JavaScript via the SVG <foreignObject> tag whenever the image component is rendered or updated. This is particularly dangerous for dashboards or multi-user applications displaying user-generated content or annotations. This issue is fixed in version 3.4.0.
CWE-79 Dec 09, 2025
CVE-2025-53558 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.12
ZTE Japan K.K. - Auth Bypass
ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common credential for all installations. With the knowledge of the credential, an attacker may log in to the affected devices.
CWE-1391 Jul 31, 2025
CVE-2025-12758 7.5 HIGH 1 PoC Analysis EPSS 0.00
Package Validator <13.15.22 - Incomplete Filtering
Versions of the package validator before 13.15.22 are vulnerable to Incomplete Filtering of One or More Instances of Special Elements in the isLength() function that does not take into account Unicode variation selectors (\uFE0F, \uFE0E) appearing in a sequence which lead to improper string length calculation. This can lead to an application using isLength for input validation accepting strings significantly longer than intended, resulting in issues like data truncation in databases, buffer overflows in other system components, or denial-of-service.
CWE-172 Nov 27, 2025
CVE-2025-60013 4.6 MEDIUM 2 PoCs Analysis EPSS 0.00
F5os-a < 1.5.4 - OS Command Injection
When a highly-privileged, authenticated attacker attempts to initialize the rSeries FIPS module using a password with special shell metacharacters, arbitrary system commands may be executed, and the FIPS hardware security module (HSM) may fail to initialize. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-78 Oct 15, 2025
CVE-2025-61229 7.8 HIGH 1 PoC Analysis EPSS 0.00
Shirt Pocket's SuperDuper! <3.10 - Privilege Escalation
An issue in Shirt Pocket's SuperDuper! 3.10 and earlier allow a local attacker to modify the default task template to execute an arbitrary preflight script with root privileges and Full Disk Access, thus bypassing macOS privacy controls.
CWE-284 Dec 01, 2025
CVE-2025-53772 8.8 HIGH EXPLOITED 4 PoCs Analysis EPSS 0.02
Web Deploy - Code Injection
Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network.
CWE-502 Aug 12, 2025
CVE-2025-67494 9.3 CRITICAL 1 PoC Analysis EPSS 0.00
Zitadel < 4.7.1 - SSRF
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.
CWE-918 Dec 09, 2025
CVE-2025-65754 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Algernon v1.17.4 - XSS
Cross Site Scripting vulnerability in Algernon v1.17.4 allows attackers to execute arbitrary code via injecting a crafted payload into a filename.
CWE-79 Dec 10, 2025
CVE-2025-65271 8.8 HIGH 1 PoC Analysis EPSS 0.00
Azuriom < 1.2.7 - Code Injection
Client-side template injection (CSTI) in Azuriom CMS admin dashboard allows a low-privilege user to execute arbitrary template code in the context of an administrator's session. This can occur via plugins or dashboard components that render untrusted user input, potentially enabling privilege escalation to an administrative account. Fixed in Azuriom 1.2.7.
CWE-94 Dec 08, 2025
CVE-2025-25063 4.4 MEDIUM 1 PoC Analysis EPSS 0.01
Backdrop CMS <1.28.5-1.29.3 - XSS
An XSS issue was discovered in Backdrop CMS 1.28.x before 1.28.5 and 1.29.x before 1.29.3. It does not sufficiently validate uploaded SVG images to ensure they do not contain potentially dangerous SVG tags. SVG images can contain clickable links and executable scripting, and using a crafted SVG, it is possible to execute scripting in the browser when an SVG image is viewed. This issue is mitigated by the attacker needing to be able to upload SVG images, and that Backdrop embeds all uploaded SVG images within &lt;img&gt; tags, which prevents scripting from executing. The SVG must be viewed directly by its URL in order to run any embedded scripting.
CWE-79 Feb 03, 2025
CVE-2025-60854 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
D-Link R15 (AX1500) <1.20.01 - Command Injection
A vulnerability has been found in D-Link R15 (AX1500) 1.20.01 and below. By manipulating the model name parameter during a password change request in the web administrator page, it is possible to trigger a command injection in httpd.
CWE-77 Dec 02, 2025
CVE-2025-67906 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Misp < 2.5.28 - XSS
In MISP before 2.5.28, app/View/Elements/Workflows/executionPath.ctp allows XSS in the workflow execution path.
CWE-79 Dec 15, 2025
CVE-2025-63895 7.5 HIGH 1 PoC Analysis EPSS 0.00
JXL 9 Inch Car Android Double Din Player Android <12.0 - DoS
An issue in the Bluetooth firmware of JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted Link Manager Protocol (LMP) packet.
CWE-404 Dec 10, 2025
CVE-2025-65018 7.1 HIGH 2 PoCs Analysis EPSS 0.00
Libpng < 1.6.51 - Out-of-Bounds Write
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.
CWE-122 Nov 25, 2025
CVE-2025-65300 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Coohom - XSS
A stored Cross-Site Scripting (XSS) vulnerability exists in the Coohom SaaS Platform feVersion=1760060603897 (2025-10-28) in the Account Settings module, where unsanitized user input in Address fields (City, State, Country/Region) is rendered back to the page. Attackers can inject arbitrary JavaScript code, which executes when the affected profile page is viewed. This can lead to session hijacking, cookie theft, or arbitrary script execution in the victim's browser.
CWE-79 Dec 09, 2025
CVE-2025-8924 7.3 HIGH 1 PoC Analysis EPSS 0.00
Campcodes Online Water Billing System - Injection
A vulnerability was identified in Campcodes Online Water Billing System 1.0. This issue affects some unknown processing of the file /viewbill.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Aug 13, 2025
CVE-2025-50165 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Microsoft Graphics Component - RCE
Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
CWE-822 Aug 12, 2025
CVE-2025-25231 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.04
Omnissa Workspace ONE UEM - Path Traversal
Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints.
CWE-22 Aug 11, 2025
CVE-2025-55226 6.7 MEDIUM 1 PoC Analysis EPSS 0.00
Graphics Kernel - Local Code Execution
Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to execute code locally.
CWE-362 Sep 09, 2025
CVE-2025-61228 7.8 HIGH 1 PoC Analysis EPSS 0.00
Shirt Pocket SuperDuper! <3.10 - RCE
An issue in Shirt Pocket SuperDuper! V.3.10 and before allows a local attacker to execute arbitrary code via the software update mechanism
CWE-494 Dec 01, 2025