Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
53,640 results Clear all
CVE-2025-51586 3.7 LOW 1 PoC Analysis NUCLEI EPSS 0.01
PrestaShop <8.2.1 - Info Disclosure
An issue was discoverd in file controllers/admin/AdminLoginController.php in PrestaShop before 8.2.1 allowing attackers to gain sensitive information via the reset password feature.
CWE-359 Sep 08, 2025
CVE-2025-29632 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Free5gc - Buffer Overflow
Buffer Overflow vulnerability in Free5gc v.4.0.0 allows a remote attacker to cause a denial of service via the AMF, NGAP, security.go, handler_generated.go, handleInitialUEMessageMain, DecodePlainNasNoIntegrityCheck, GetSecurityHeaderType components
CWE-120 May 29, 2025
CVE-2025-50168 7.8 HIGH 1 PoC Analysis EPSS 0.00
Windows Win32K - ICOMP - Privilege Escalation
Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
CWE-843 Aug 12, 2025
CVE-2025-55763 7.5 HIGH 1 PoC Analysis EPSS 0.05
CivetWeb <1.17 - Buffer Overflow
Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.
CWE-121 Aug 29, 2025
CVE-2025-11174 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Document Library Lite <1.1.6 - Auth Bypass
The Document Library Lite plugin for WordPress is vulnerable to Improper Authorization in all versions up to, and including, 1.1.6. This is due to the plugin exposing an unauthenticated AJAX action dll_load_posts which returns a JSON table of document data without performing nonce or capability checks. The handler accepts an attacker-controlled args array where the status option explicitly allows draft, pending, future, and any. This makes it possible for unauthenticated attackers to retrieve unpublished document titles and content via the AJAX endpoint.
CWE-285 Nov 01, 2025
CVE-2025-37899 7.8 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.00
Linux kernel - Use After Free
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.
CWE-416 May 20, 2025
CVE-2025-7783 CRITICAL 1 PoC Analysis EPSS 0.00
form-data <2.5.4, 3.0.0-3.0.3, 4.0.0-4.0.3 - HPP
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
CWE-330 Jul 18, 2025
CVE-2025-24990 7.8 HIGH KEV 1 PoC Analysis EPSS 0.03
Agere Modem - Info Disclosure
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.
CWE-822 Oct 14, 2025
CVE-2025-26794 7.5 HIGH 3 PoCs Analysis EPSS 0.75
Exim < 4.98.1 - SQL Injection
Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-limit configurations.)
CWE-89 Feb 21, 2025
CVE-2025-8760 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
INSTAR 2K+/4K <3.11.1.1124 - Buffer Overflow
A vulnerability was identified in INSTAR 2K+ and 4K 3.11.1 Build 1124. This affects the function base64_decode of the component fcgi_server. The manipulation of the argument Authorization leads to buffer overflow. It is possible to initiate the attack remotely.
CWE-119 Aug 13, 2025
CVE-2025-41656 10.0 CRITICAL 1 PoC Analysis EPSS 0.01
Node_RED - RCE
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
CWE-306 Jul 01, 2025
CVE-2025-23320 7.5 HIGH 1 PoC Analysis EPSS 0.00
Nvidia Triton Inference Server < 25.07 - Error Information Exposure
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause the shared memory limit to be exceeded by sending a very large request. A successful exploit of this vulnerability might lead to information disclosure.
CWE-209 Aug 06, 2025
CVE-2025-62727 7.5 HIGH 1 PoC 1 Writeup Analysis EPSS 0.00
Starlette <0.49.1 - DoS
Starlette is a lightweight ASGI framework/toolkit. Starting in version 0.39.0 and prior to version 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion per request, causing denial‑of‑service for endpoints serving files (e.g., StaticFiles or any use of FileResponse). This vulnerability is fixed in 0.49.1.
CWE-407 Oct 28, 2025
CVE-2025-46817 7.0 HIGH 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.13
Redis <8.2.2 - RCE
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
CWE-190 Oct 03, 2025
CVE-2025-9519 7.2 HIGH 1 PoC Analysis EPSS 0.00
Easy Timer <4.2.1 - Authenticated RCE
The Easy Timer plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.1 via the plugin's shortcodes. This is due to insufficient restriction of shortcode attributes. This makes it possible for authenticated attackers, with Editor-level access and above, to execute code on the server.
CWE-94 Sep 04, 2025
CVE-2025-23968 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
WPCenter AiBud WP <1.8.5 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in WebFactory AiBud WP aibuddy-openai-chatgpt allows Upload a Web Shell to a Web Server.This issue affects AiBud WP: from n/a through <= 1.9.
CWE-434 Jul 03, 2025
CVE-2025-53533 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.00
Pi-hole Admin Interface <6.2.1 - XSS
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions 6.2.1 and earlier are vulnerable to reflected cross-site scripting (XSS) via a malformed URL path. The 404 error page includes the requested path in the class attribute of the body tag without proper sanitization or escaping. An attacker can craft a URL containing an onload attribute that will execute arbitrary JavaScript code in the browser when a victim visits the malicious link. If an attacker sends a crafted pi-hole link to a victim and the victim visits it, attacker-controlled JavaScript code is executed in the browser of the victim. This has been patched in version 6.3.
CWE-79 Oct 27, 2025
CVE-2025-0108 9.1 CRITICAL KEV 7 PoCs Analysis NUCLEI EPSS 0.94
Palo Alto Networks PAN-OS - Auth Bypass
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
CWE-306 Feb 12, 2025
CVE-2025-9983 HIGH 1 PoC Analysis EPSS 0.00
GALAYOU G2 - Info Disclosure
GALAYOU G2 cameras stream video output via RTSP streams. By default these streams are protected by randomly generated credentials. However these credentials are not required to access the stream. Changing these values does not change camera's behavior. The vendor did not respond in any way. Only version 11.100001.01.28 was tested, other versions might also be vulnerable.
CWE-306 Sep 22, 2025
CVE-2025-49484 HIGH 2 PoCs Analysis EPSS 0.01
JS Jobs <1.4.1 - SQL Injection
A SQL injection vulnerability in the JS Jobs plugin versions 1.0.0-1.4.1 for Joomla allows low-privilege users to execute arbitrary SQL commands via the 'cvid' parameter in the employee application feature.
CWE-89 Jul 18, 2025