Latest Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,640 results
Clear all
CVE-2025-51586
3.7
LOW
1 PoC
Analysis
NUCLEI
EPSS 0.01
PrestaShop <8.2.1 - Info Disclosure
An issue was discoverd in file controllers/admin/AdminLoginController.php in PrestaShop before 8.2.1 allowing attackers to gain sensitive information via the reset password feature.
CWE-359
Sep 08, 2025
CVE-2025-29632
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Free5gc - Buffer Overflow
Buffer Overflow vulnerability in Free5gc v.4.0.0 allows a remote attacker to cause a denial of service via the AMF, NGAP, security.go, handler_generated.go, handleInitialUEMessageMain, DecodePlainNasNoIntegrityCheck, GetSecurityHeaderType components
CWE-120
May 29, 2025
CVE-2025-50168
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Windows Win32K - ICOMP - Privilege Escalation
Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
CWE-843
Aug 12, 2025
CVE-2025-55763
7.5
HIGH
1 PoC
Analysis
EPSS 0.05
CivetWeb <1.17 - Buffer Overflow
Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.
CWE-121
Aug 29, 2025
CVE-2025-11174
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
Document Library Lite <1.1.6 - Auth Bypass
The Document Library Lite plugin for WordPress is vulnerable to Improper Authorization in all versions up to, and including, 1.1.6. This is due to the plugin exposing an unauthenticated AJAX action dll_load_posts which returns a JSON table of document data without performing nonce or capability checks. The handler accepts an attacker-controlled args array where the status option explicitly allows draft, pending, future, and any. This makes it possible for unauthenticated attackers to retrieve unpublished document titles and content via the AJAX endpoint.
CWE-285
Nov 01, 2025
CVE-2025-37899
7.8
HIGH
EXPLOITED
3 PoCs
Analysis
EPSS 0.00
Linux kernel - Use After Free
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in session logoff
The sess->user object can currently be in use by another thread, for
example if another connection has sent a session setup request to
bind to the session being free'd. The handler for that connection could
be in the smb2_sess_setup function which makes use of sess->user.
CWE-416
May 20, 2025
CVE-2025-7783
CRITICAL
1 PoC
Analysis
EPSS 0.00
form-data <2.5.4, 3.0.0-3.0.3, 4.0.0-4.0.3 - HPP
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js.
This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
CWE-330
Jul 18, 2025
CVE-2025-24990
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.03
Agere Modem - Info Disclosure
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.
Fax modem hardware dependent on this specific driver will no longer work on Windows.
Microsoft recommends removing any existing dependencies on this hardware.
CWE-822
Oct 14, 2025
CVE-2025-26794
7.5
HIGH
3 PoCs
Analysis
EPSS 0.75
Exim < 4.98.1 - SQL Injection
Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-limit configurations.)
CWE-89
Feb 21, 2025
CVE-2025-8760
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
INSTAR 2K+/4K <3.11.1.1124 - Buffer Overflow
A vulnerability was identified in INSTAR 2K+ and 4K 3.11.1 Build 1124. This affects the function base64_decode of the component fcgi_server. The manipulation of the argument Authorization leads to buffer overflow. It is possible to initiate the attack remotely.
CWE-119
Aug 13, 2025
CVE-2025-41656
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.01
Node_RED - RCE
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
CWE-306
Jul 01, 2025
CVE-2025-23320
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Nvidia Triton Inference Server < 25.07 - Error Information Exposure
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause the shared memory limit to be exceeded by sending a very large request. A successful exploit of this vulnerability might lead to information disclosure.
CWE-209
Aug 06, 2025
CVE-2025-62727
7.5
HIGH
1 PoC
1 Writeup
Analysis
EPSS 0.00
Starlette <0.49.1 - DoS
Starlette is a lightweight ASGI framework/toolkit. Starting in version 0.39.0 and prior to version 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion per request, causing denial‑of‑service for endpoints serving files (e.g., StaticFiles or any use of FileResponse). This vulnerability is fixed in 0.49.1.
CWE-407
Oct 28, 2025
CVE-2025-46817
7.0
HIGH
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.13
Redis <8.2.2 - RCE
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
CWE-190
Oct 03, 2025
CVE-2025-9519
7.2
HIGH
1 PoC
Analysis
EPSS 0.00
Easy Timer <4.2.1 - Authenticated RCE
The Easy Timer plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.1 via the plugin's shortcodes. This is due to insufficient restriction of shortcode attributes. This makes it possible for authenticated attackers, with Editor-level access and above, to execute code on the server.
CWE-94
Sep 04, 2025
CVE-2025-23968
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
WPCenter AiBud WP <1.8.5 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in WebFactory AiBud WP aibuddy-openai-chatgpt allows Upload a Web Shell to a Web Server.This issue affects AiBud WP: from n/a through <= 1.9.
CWE-434
Jul 03, 2025
CVE-2025-53533
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.00
Pi-hole Admin Interface <6.2.1 - XSS
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions 6.2.1 and earlier are vulnerable to reflected cross-site scripting (XSS) via a malformed URL path. The 404 error page includes the requested path in the class attribute of the body tag without proper sanitization or escaping. An attacker can craft a URL containing an onload attribute that will execute arbitrary JavaScript code in the browser when a victim visits the malicious link. If an attacker sends a crafted pi-hole link to a victim and the victim visits it, attacker-controlled JavaScript code is executed in the browser of the victim. This has been patched in version 6.3.
CWE-79
Oct 27, 2025
CVE-2025-0108
9.1
CRITICAL
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Palo Alto Networks PAN-OS - Auth Bypass
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.
You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue does not affect Cloud NGFW or Prisma Access software.
CWE-306
Feb 12, 2025
CVE-2025-9983
HIGH
1 PoC
Analysis
EPSS 0.00
GALAYOU G2 - Info Disclosure
GALAYOU G2 cameras stream video output via RTSP streams. By default these streams are protected by randomly generated credentials. However these credentials are not required to access the stream. Changing these values does not change camera's behavior.
The vendor did not respond in any way. Only version 11.100001.01.28 was tested, other versions might also be vulnerable.
CWE-306
Sep 22, 2025
CVE-2025-49484
HIGH
2 PoCs
Analysis
EPSS 0.01
JS Jobs <1.4.1 - SQL Injection
A SQL injection vulnerability in the JS Jobs plugin versions 1.0.0-1.4.1 for Joomla allows low-privilege users to execute arbitrary SQL commands via the 'cvid' parameter in the employee application feature.
CWE-89
Jul 18, 2025