Latest Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
53,640 results Clear all
CVE-2025-64513 CRITICAL 1 PoC Analysis EPSS 0.00
Milvus < 2.4.24 - Authentication Bypass
Milvus is an open-source vector database built for generative AI applications. An unauthenticated attacker can exploit a vulnerability in versions prior to 2.4.24, 2.5.21, and 2.6.5 to bypass all authentication mechanisms in the Milvus Proxy component, gaining full administrative access to the Milvus cluster. This grants the attacker the ability to read, modify, or delete data, and to perform privileged administrative operations such as database or collection management. This issue has been fixed in Milvus 2.4.24, 2.5.21, and 2.6.5. If immediate upgrade is not possible, a temporary mitigation can be applied by removing the sourceID header from all incoming requests at the gateway, API gateway, or load balancer level before they reach the Milvus Proxy. This prevents attackers from exploiting the authentication bypass behavior.
CWE-287 Nov 10, 2025
CVE-2025-48932 2 PoCs Analysis
Invision Community 4.7.20 - (calendar/view.php) SQL Injection
CVE-2025-63602 7.3 HIGH 1 PoC Analysis EPSS 0.00
Awesome Miner <11.2.4 - Local Privilege Escalation
A vulnerability was discovered in Awesome Miner thru 11.2.4 that allows arbitrary read and write to kernel memory and MSRs (such as LSTAR) as an unprivileged user. This is due to the implementation of an insecure version of WinRing0 (1.2.0.5, renamed to IntelliBreeze.Maintenance.Service.sys) that lacks a properly secured DACL, allowing unprivileged users to interact with the driver and, as a result, the kernel. This can result in local privilege escalation, information disclosure, denial of service, and other unspecified impacts.
CWE-126 Nov 18, 2025
CVE-2025-52881 7.5 HIGH 1 PoC Analysis EPSS 0.00
runc <1.4.0-rc.2 - Privilege Escalation
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
CWE-61 Nov 06, 2025
CVE-2025-48507 HIGH 1 PoC Analysis EPSS 0.00
Trusted Firmware - Info Disclosure
The security state of the calling processor into Trusted Firmware (TF-A) is not used and could potentially allow non-secure processors access to secure memories, access to crypto operations, and the ability to turn on and off subsystems within the SOC.
CWE-1284 Nov 23, 2025
CVE-2025-26686 7.5 HIGH 2 PoCs Analysis EPSS 0.00
Windows TCP/IP < - Memory Corruption
Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
CWE-591 Apr 08, 2025
CVE-2025-63667 7.5 HIGH 1 PoC Analysis EPSS 0.00
Simicam IP Camera Firmware - Improper Access Control
Incorrect access control in SIMICAM v1.16.41-20250725, KEVIEW v1.14.92-20241120, ASECAM v1.14.10-20240725 allows attackers to access sensitive API endpoints without authentication.
CWE-284 Nov 12, 2025
CVE-2025-39964 3.3 LOW 1 PoC Analysis EPSS 0.00
Linux Kernel - Buffer Overflow
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg Issuing two writes to the same af_alg socket is bogus as the data will be interleaved in an unpredictable fashion. Furthermore, concurrent writes may create inconsistencies in the internal socket state. Disallow this by adding a new ctx->write field that indiciates exclusive ownership for writing.
Oct 13, 2025
CVE-2025-63892 6.8 MEDIUM 1 PoC Analysis EPSS 0.00
SourceCodester Student Grades Management System 1.0 - XSS
A vulnerability was determined in SourceCodester Student Grades Management System 1.0. Affected is the function create_classroom of the file /classroom.php of the component My Classrooms Management Page. This manipulation of the argument name/description causes stored cross site scripting.
CWE-79 Nov 18, 2025
CVE-2025-9816 7.2 HIGH 1 PoC Analysis EPSS 0.00
WP Statistics - WordPress <14.5.4 - XSS
The WP Statistics – The Most Popular Privacy-Friendly Analytics Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent Header in all versions up to, and including, 14.5.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79 Sep 27, 2025
CVE-2025-11492 9.6 CRITICAL 1 PoC Analysis EPSS 0.00
Connectwise Automate < 2025.9 - Cleartext Transmission
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
CWE-319 Oct 16, 2025
CVE-2025-20260 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
ClamAV - Buffer Overflow
A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.
CWE-122 Jun 18, 2025
CVE-2025-63830 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
CKFinder 1.4.3 - XSS
CKFinder 1.4.3 is vulnerable to Cross Site Scripting (XSS) in the File Upload function. An attacker can upload a crafted SVG containing active content.
CWE-79 Nov 14, 2025
CVE-2025-56503 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Sublime Text 4 4200 - Privilege Escalation
An issue in Sublime HQ Pty Ltd Sublime Text 4 4200 allows authenticated attackers with low-level privileges to escalate privileges to Administrator via replacing the uninstall file with a crafted binary in the installation folder. NOTE: this is disputed by the Supplier because replacing the uninstall file requires administrator permissions, i.e., there is no privilege escalation.
CWE-266 Nov 10, 2025
CVE-2025-41244 7.8 HIGH KEV 3 PoCs Analysis EPSS 0.01
Vmware Aria Operations < 8.18.5 - Privilege Escalation
VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.
CWE-267 Sep 29, 2025
CVE-2025-9223 8.8 HIGH 1 PoC Analysis EPSS 0.01
Zohocorp ManageEngine Applications Manager <178100 - Command Injection
Zohocorp ManageEngine Applications Manager versions 178100 and below are vulnerable to authenticated command injection vulnerability due to the improper configuration in the execute program action feature.
CWE-77 Nov 11, 2025
CVE-2025-58179 7.2 HIGH 1 PoC Analysis NUCLEI EPSS 0.00
@astrojs/cloudflare < 12.6.6 - SSRF
Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin. This issue is fixed in version 12.6.6.
CWE-918 Sep 05, 2025
CVE-2025-55188 3.6 LOW 2 PoCs Analysis EPSS 0.00
7-Zip <25.01 - Info Disclosure
7-Zip before 25.01 does not always properly handle symbolic links during extraction.
CWE-59 Aug 08, 2025
CVE-2025-8941 7.8 HIGH 1 PoC Analysis EPSS 0.00
Linux-PAM - Privilege Escalation
A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
CWE-22 Aug 13, 2025
CVE-2025-12973 7.2 HIGH 1 PoC Analysis EPSS 0.00
S2B AI Assistant for WordPress - Arbitrary File Upload
The S2B AI Assistant – ChatBot, ChatGPT, OpenAI, Content & Image Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the storeFile() function in all versions up to, and including, 1.7.8. This makes it possible for authenticated attackers, with Editor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Nov 21, 2025