Latest Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,640 results
Clear all
CVE-2025-64495
8.7
HIGH
1 PoC
Analysis
EPSS 0.00
Openwebui Open Webui < 0.6.35 - XSS
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. In versions 0.6.34 and below, the functionality that inserts custom prompts into the chat window is vulnerable to DOM XSS when 'Insert Prompt as Rich Text' is enabled, since the prompt body is assigned to the DOM sink .innerHtml without sanitisation. Any user with permissions to create prompts can abuse this to plant a payload that could be triggered by other users if they run the corresponding / command to insert the prompt. This issue is fixed in version 0.6.35.
CWE-79
Nov 08, 2025
CVE-2025-41090
HIGH
1 PoC
Analysis
EPSS 0.00
microCLAUDIA <3.2.0 - Privilege Escalation
microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability.
This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually.
This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.
CWE-306
Oct 28, 2025
CVE-2025-63296
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Keruistore Kerui K259 Firmware - Command Injection
KERUI K259 5MP Wi-Fi / Tuya Smart Security Camera firmware v33.53.87 contains a code execution vulnerability in its boot/update logic: during startup /usr/sbin/anyka_service.sh scans mounted TF/SD cards and, if /mnt/update.nor.sh is present, copies it to /tmp/net.sh and executes it as root.
CWE-77
Nov 10, 2025
CVE-2025-12917
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
TOZED ZLT T10 T10PLUS_3.04.15 - DoS
A vulnerability was identified in TOZED ZLT T10 T10PLUS_3.04.15. The affected element is an unknown function of the file /reqproc/proc_post of the component Reboot Handler. Such manipulation leads to denial of service. Access to the local network is required for this attack to succeed. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-404
Nov 09, 2025
CVE-2025-63588
7.1
HIGH
1 PoC
Analysis
EPSS 0.00
CMSimpleXH - XSS
An unauthenticated reflected cross-site scripting vulnerability in the query handling of CMSimpleXH allows remote attackers to inject and execute arbitrary JavaScript in a victim's browser via a crafted request (e.g., a maliciously crafted POST login). Successful exploitation may lead to theft of session cookies, credential disclosure, or other client-side impacts.
CWE-79
Nov 06, 2025
CVE-2025-20343
8.6
HIGH
1 PoC
Analysis
EPSS 0.01
Cisco ISE - DoS
A vulnerability in the RADIUS setting Reject RADIUS requests from clients with repeated failures on Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause Cisco ISE to restart unexpectedly.
This vulnerability is due to a logic error when processing a RADIUS access request for a MAC address that is already a rejected endpoint. An attacker could exploit this vulnerability by sending a specific sequence of multiple crafted RADIUS access request messages to Cisco ISE. A successful exploit could allow the attacker to cause a denial of service (DoS) condition when Cisco ISE restarts.
CWE-697
Nov 05, 2025
CVE-2025-60574
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
tQuadra CMS 4.2.1117 - LFI
A Local File Inclusion (LFI) vulnerability has been identified in tQuadra CMS 4.2.1117. The issue exists in the "/styles/" path, which fails to properly sanitize user-supplied input. An attacker can exploit this by sending a crafted GET request to retrieve arbitrary files from the underlying system.
CWE-22
Nov 07, 2025
CVE-2025-9491
7.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.00
Microsoft Windows - RCE
Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.
CWE-451
Aug 26, 2025
CVE-2025-12748
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
libvirt - DoS
A flaw was discovered in libvirt in the XML file processing. More specifically, the parsing of user provided XML files was performed before the ACL checks. A malicious user with limited permissions could exploit this flaw by submitting a specially crafted XML file, causing libvirt to allocate too much memory on the host. The excessive memory consumption could lead to a libvirt process crash on the host, resulting in a denial-of-service condition.
CWE-770
Nov 11, 2025
CVE-2025-63589
7.1
HIGH
1 PoC
Analysis
EPSS 0.00
CMSimple_XH 1.8 - XSS
A reflected XSS vulnerability exists in CMSimple_XH 1.8's index.php router when attacker-controlled path segments are not sanitized or encoded before being inserted into the generated HTML (navigation links, breadcrumbs, search form action, footer links). An attacker-controlled string placed in the URL path is reflected into multiple HTML elements, allowing execution of arbitrary JavaScript in victims' browsers visiting a crafted URL.
CWE-79
Nov 06, 2025
CVE-2025-63441
7.3
HIGH
1 PoC
Analysis
EPSS 0.00
OSSN 8.6 - XSS
Open Source Social Network (OSSN) 8.6 is vulnerable to Cross Site Scripting (XSS) via the parameter param` at endpoint u/administrator/friends.
CWE-79
Nov 03, 2025
CVE-2025-63585
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
OSSN 8.6 - SQL Injection
OSSN (Open Source Social Network) 8.6 is vulnerable to SQL Injection in /action/rtcomments/status via the timestamp parameter.
CWE-89
Nov 05, 2025
CVE-2025-56643
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Requarks Wiki.js - Insufficient Session Expiration
Requarks Wiki.js 2.5.307 does not properly revoke or invalidate active JWT tokens when a user logs out. As a result, previously issued tokens remain valid and can be reused to access the system, even after logout. This behavior affects session integrity and may allow unauthorized access if a token is compromised. The issue is present in the authentication resolver logic and affects both the GraphQL endpoint and the logout mechanism.
CWE-613
Nov 18, 2025
CVE-2025-11002
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
7-Zip - Path Traversal
7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26743.
CWE-22
Jan 23, 2026
CVE-2025-64458
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Python <5.1.14-5.2.8 - DoS
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.
NFKC normalization in Python is slow on Windows. As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect` were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.
CWE-407
Nov 05, 2025
CVE-2025-53690
9.0
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.09
Sitecore XM/X <9.0 - Code Injection
Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0.
CWE-502
Sep 03, 2025
CVE-2025-34161
8.8
HIGH
1 PoC
Analysis
EPSS 0.01
Coollabs Coolify < 4.0.0 - OS Command Injection
Coolify versions prior to v4.0.0-beta.420.7 are vulnerable to a remote code execution vulnerability in the project deployment workflow. The platform allows authenticated users, with low-level member privileges, to inject arbitrary shell commands via the Git Repository field during project creation. By submitting a crafted repository string containing command injection syntax, an attacker can execute arbitrary commands on the underlying host system, resulting in full server compromise.
CWE-78
Aug 27, 2025
CVE-2025-53964
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.00
GoldenDict <1.5.2 - Info Disclosure
GoldenDict 1.5.0 and 1.5.1 has an exposed dangerous method that allows reading and modifying files when a user adds a crafted dictionary and then searches for any term included in that dictionary.
CWE-749
Jul 17, 2025
CVE-2025-10576
HIGH
1 PoC
Analysis
EPSS 0.00
HP PC - Privilege Escalation
Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. HP is releasing updated audio packages to mitigate the potential vulnerabilities.
CWE-266
Oct 15, 2025
CVE-2025-12428
8.8
HIGH
1 PoC
Analysis
EPSS 0.00
Google Chrome < 142.0.7444.59 - Type Confusion
Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CWE-843
Nov 10, 2025