Latest Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
53,640 results Clear all
CVE-2025-4679 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Synology Active Backup for Microsoft 365 - Info Disclosure
A vulnerability in Synology Active Backup for Microsoft 365 allows remote authenticated attackers to obtain sensitive information via unspecified vectors.
CWE-522 May 16, 2025
CVE-2025-53367 HIGH 2 PoCs Analysis EPSS 0.00
DjVuLibre <3.5.29 - Buffer Overflow
DjVuLibre is a GPL implementation of DjVu, a web-centric format for distributing documents and images. Prior to version 3.5.29, the MMRDecoder::scanruns method is affected by an OOB-write vulnerability, because it does not check that the xr pointer stays within the bounds of the allocated buffer. This can lead to writes beyond the allocated memory, resulting in a heap corruption condition. An out-of-bounds read with pr is also possible for the same reason. This issue has been patched in version 3.5.29.
CWE-125 Jul 03, 2025
CVE-2025-56803 8.4 HIGH 1 PoC Analysis EPSS 0.00
Figma Desktop - OS Command Injection
Figma Desktop for Windows version 125.6.5 contains a command injection vulnerability in the local plugin loader. An attacker can execute arbitrary OS commands by setting a crafted build field in the plugin's manifest.json. This field is passed to child_process.exec without validation, leading to possible RCE. NOTE: this is disputed by the Supplier because the behavior only allows a local user to attack himself via a local plugin. The local build procedure, which is essential to the attack, is not executed for plugins shared to the Figma Community.
CWE-78 Sep 03, 2025
CVE-2025-57202 6.1 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Avtech Dgm1104 Firmware - XSS
A stored cross-site scripting (XSS) vulnerability in the PwdGrp.cgi endpoint of AVTECH SECURITY Corporation DGM1104 FullImg-1015-1004-1006-1003 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the username field.
CWE-79 Dec 03, 2025
CVE-2025-57201 8.8 HIGH 1 PoC 1 Writeup Analysis EPSS 0.01
Avtech Dgm1104 Firmware - Command Injection
AVTECH SECURITY Corporation DGM1104 FullImg-1015-1004-1006-1003 was discovered to contain an authenticated command injection vulnerability in the SMB server function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.
CWE-77 Dec 03, 2025
CVE-2025-57199 8.8 HIGH 1 PoC Analysis EPSS 0.01
Avtech Dgm1104 Firmware - Command Injection
AVTECH SECURITY Corporation DGM1104 FullImg-1015-1004-1006-1003 was discovered to contain an authenticated command injection vulnerability in the NetFailDetectD binary. This vulnerability allows attackers to execute arbitrary commands via a crafted input.
CWE-77 Dec 03, 2025
CVE-2025-57200 6.5 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.03
Avtech Dgm1104 Firmware - Command Injection
AVTECH SECURITY Corporation DGM1104 FullImg-1015-1004-1006-1003 was discovered to contain an authenticated command injection vulnerability in the test_mail function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.
CWE-77 Dec 03, 2025
CVE-2025-57203 4.8 MEDIUM 1 PoC Analysis EPSS 0.00
Liquidlabs Magicai - XSS
MagicProject AI version 9.1 is affected by a Cross-Site Scripting (XSS) vulnerability within the chatbot generation feature available to authenticated admin users. The vulnerability resides in the prompt parameter submitted to the /dashboard/user/generator/generate-stream endpoint via a multipart/form-data POST request. Due to insufficient input sanitization, attackers can inject HTML-based JavaScript payloads. This payload is stored and rendered unsanitized in subsequent views, leading to execution in other users' browsers when they access affected content. This issue allows an authenticated attacker to execute arbitrary JavaScript in the context of another user, potentially leading to session hijacking, privilege escalation, data exfiltration, or administrative account takeover. The application does not implement a Content Security Policy (CSP) or adequate input filtering to prevent such attacks. A fix should include proper sanitization, output encoding, and strong CSP enforcement to mitigate exploitation.
CWE-79 Sep 22, 2025
CVE-2025-57833 7.1 HIGH 5 PoCs Analysis EPSS 0.00
Django < 4.2.24 - SQL Injection
An issue was discovered in Django 4.2 before 4.2.24, 5.1 before 5.1.12, and 5.2 before 5.2.6. FilteredRelation is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed QuerySet.annotate() or QuerySet.alias().
CWE-89 Sep 03, 2025
CVE-2025-43504 4.9 MEDIUM 1 PoC Analysis EPSS 0.00
Xcode <26.1 - Buffer Overflow
A buffer overflow was addressed with improved bounds checking. This issue is fixed in Xcode 26.1. A user in a privileged network position may be able to cause a denial-of-service.
CWE-119 Nov 04, 2025
CVE-2025-12101 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.02
NetScaler ADC/NetScaler Gateway - XSS
Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
CWE-79 Nov 11, 2025
CVE-2025-21202 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Microsoft Windows 10 1507 < 10.0.10240.20890 - Improper Access Control
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
CWE-284 Jan 14, 2025
CVE-2025-63419 6.1 MEDIUM 2 PoCs Analysis EPSS 0.00
CrushFTP 11.3.6_48 - XSS
Cross Site Scripting (XSS) vulnerability in CrushFTP 11.3.6_48. The Web-Based Server has a feature where users can share files, the feature reflects the filename to an emailbody field with no sanitations leading to HTML Injection.
CWE-79 Nov 12, 2025
CVE-2025-66022 9.6 CRITICAL 1 PoC EPSS 0.01
FACTION <1.7.1 - RCE
FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension framework permits untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, resulting in remote code execution (RCE) on the host running Faction. Due to a missing authentication check on the /portal/AppStoreDashboard endpoint, an attacker can access the extension management UI and upload a malicious extension without any authentication, making this vulnerability exploitable by unauthenticated users. This issue has been patched in version 1.7.1.
CWE-862 Nov 26, 2025
CVE-2025-65881 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Sourcecodester Zoo Management System v1.0 - XSS
Sourcecodester Zoo Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in /classes/Login.php.
CWE-79 Dec 02, 2025
CVE-2025-39401 10.0 CRITICAL 1 PoC Analysis EPSS 0.01
Mojoomla WPAMS <44.0 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS apartment-management allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through <= 44.0 (17-08-2023).
CWE-434 May 19, 2025
CVE-2025-12735 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
expr-eval - RCE
The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEMBER of the context object into the evaluate() function and trigger arbitrary code execution.
CWE-94 Nov 05, 2025
CVE-2025-50433 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
imonnit.com - Privilege Escalation
An issue was discovered in imonnit.com (2025-04-24) allowing malicious actors to gain escalated privileges via crafted password reset to take over arbitrary user accounts.
CWE-640 Nov 26, 2025
CVE-2025-63420 4.1 MEDIUM 2 PoCs Analysis EPSS 0.00
CrushFTP11 <11.3.7_57 - XSS
CrushFTP11 before 11.3.7_57 is vulnerable to stored HTML injection in the CrushFTP Admin Panel (Reports / "Who Created Folder"), enabling persistent HTML execution in admin sessions.
CWE-79 Nov 07, 2025
CVE-2025-57310 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Salmen Simple Faucet Script - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability in Salmen2/Simple-Faucet-Script v1.07 via crafted POST request to admin.php?p=ads&c=1 allowing attackers to execute arbitrary code.
CWE-352 Nov 12, 2025