Latest Vulnerabilities with Public Exploits

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
53,649 results Clear all
CVE-2025-8081 4.9 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Elementor Website Builder < 3.30.3 - Path Traversal
The Elementor plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.30.2 via the Import_Images::import() function due to insufficient controls on the filename specified. This makes it possible for authenticated attackers, with administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-22 Aug 12, 2025
CVE-2025-52136 3.0 LOW 1 PoC 1 Writeup Analysis EPSS 0.00
EMQX <5.8.6 - Privilege Escalation
In EMQX before 5.8.6, administrators can install arbitrary novel plugins via the Dashboard web interface. NOTE: the Supplier's position is that this is the intended behavior; however, 5.8.6 adds a defense-in-depth feature in which a plugin's acceptability (for later Dashboard installation) is set by the "emqx ctl plugins allow" CLI command.
CWE-754 Aug 10, 2025
CVE-2025-59214 6.5 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Microsoft Windows 10 1507 < 10.0.10240.21161 - Information Disclosure
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CWE-200 Oct 14, 2025
CVE-2025-10184 HIGH 3 PoCs Analysis EPSS 0.00
Device - Info Disclosure
The vulnerability allows any application installed on the device to read SMS/MMS data and metadata from the system-provided Telephony provider without permission, user interaction, or consent. The user is also not notified that SMS data is being accessed. This could lead to sensitive information disclosure and could effectively break the security provided by SMS-based Multi-Factor Authentication (MFA) checks. The root cause is a combination of missing permissions for write operations in several content providers (com.android.providers.telephony.PushMessageProvider, com.android.providers.telephony.PushShopProvider, com.android.providers.telephony.ServiceNumberProvider), and a blind SQL injection in the update method of those providers.
CWE-862 Sep 23, 2025
CVE-2025-26199 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Vishalmathur Cloudclassroom-php Project - Cleartext Transmission
CloudClassroom-PHP-Project v1.0 is affected by an insecure credential transmission vulnerability. The application transmits passwords over unencrypted HTTP during the login process, exposing sensitive credentials to potential interception by network-based attackers. A remote attacker with access to the same network (e.g., public Wi-Fi or compromised router) can capture login credentials via Man-in-the-Middle (MitM) techniques. If the attacker subsequently uses the credentials to log in and exploit administrative functions (e.g., file upload), this may lead to remote code execution depending on the environment.
CWE-319 Jun 18, 2025
CVE-2025-0994 8.8 HIGH KEV 1 PoC Analysis EPSS 0.75
Trimble Cityworks < 15.8.9 - Insecure Deserialization
Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer’s Microsoft Internet Information Services (IIS) web server.
CWE-502 Feb 06, 2025
CVE-2025-26465 6.8 MEDIUM 2 PoCs Analysis EPSS 0.74
OpenSSH - Info Disclosure
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
CWE-390 Feb 18, 2025
CVE-2025-52914 8.8 HIGH 1 PoC Analysis EPSS 0.00
Mitel Micollab < 9.8.3.103 - SQL Injection
A vulnerability in the Suite Applications Services component of Mitel MiCollab 10.0 through SP1 FP1 (10.0.1.101) could allow an authenticated attacker to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary SQL database commands.
CWE-89 Aug 08, 2025
CVE-2025-8875 7.8 HIGH KEV 1 PoC Analysis EPSS 0.03
N-able N-central < 2025.3.1 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1.
CWE-502 Aug 14, 2025
CVE-2025-7775 9.8 CRITICAL KEV 4 PoCs Analysis EPSS 0.07
NetScaler ADC/Gateway - RCE/DoS
Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX
CWE-119 Aug 26, 2025
CVE-2025-42944 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
SAP NetWeaver - Deserialization
Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application's confidentiality, integrity, and availability.
CWE-502 Sep 09, 2025
CVE-2025-26399 9.8 CRITICAL KEV 1 PoC Analysis EPSS 0.27
Solarwinds Web Help Desk < 12.8.6 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
CWE-502 Sep 23, 2025
CVE-2025-10909 2.4 LOW 1 PoC Analysis EPSS 0.00
Novosga - Code Injection
A security flaw has been discovered in Mangati NovoSGA up to 2.2.9. The impacted element is an unknown function of the file /admin of the component SVG File Handler. Performing manipulation of the argument logoNavbar/logoLogin results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
CWE-79 Sep 24, 2025
CVE-2025-10846 6.3 MEDIUM 1 PoC Analysis EPSS 0.00
Portabilis I-educar < 2.10.0 - Injection
A vulnerability was determined in Portabilis i-Educar up to 2.10. This vulnerability affects unknown code of the file /module/ComponenteCurricular/edit. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
CWE-74 Sep 23, 2025
CVE-2025-10845 6.3 MEDIUM 1 PoC Analysis EPSS 0.00
Portabilis I-educar < 2.10.0 - Injection
A vulnerability was found in Portabilis i-Educar up to 2.10. This affects an unknown part of the file /module/ComponenteCurricular/view. The manipulation of the argument ID results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used.
CWE-74 Sep 23, 2025
CVE-2025-10844 6.3 MEDIUM 1 PoC Analysis EPSS 0.00
Portabilis I-educar < 2.10.0 - Injection
A vulnerability has been found in Portabilis i-Educar up to 2.10. Affected by this issue is some unknown functionality of the file /module/Cadastro/aluno. The manipulation of the argument is leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
CWE-74 Sep 23, 2025
CVE-2025-10584 3.5 LOW 1 PoC Analysis EPSS 0.00
Portabilis I-educar < 2.10.0 - Code Injection
A vulnerability was identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_calendario_anotacao_cad.php. Such manipulation of the argument nm_anotacao/descricao leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
CWE-94 Sep 17, 2025
CVE-2025-10373 3.5 LOW 1 PoC Analysis EPSS 0.00
Portabilis I-educar < 2.10.0 - Code Injection
A security vulnerability has been detected in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /intranet/educar_turma_tipo_cad.php. Such manipulation of the argument nm_tipo leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
CWE-94 Sep 13, 2025
CVE-2025-10372 3.5 LOW 1 PoC Analysis EPSS 0.00
Portabilis I-educar < 2.10.0 - Code Injection
A weakness has been identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_modulo_cad.php. This manipulation of the argument nm_tipo/descricao causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
CWE-94 Sep 13, 2025
CVE-2025-9738 3.5 LOW 1 PoC Analysis EPSS 0.00
Portabilis i-Educar <2.10 - XSS
A flaw has been found in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_tipo_ensino_cad.php. Executing manipulation of the argument nm_tipo can lead to cross site scripting. The attack can be executed remotely. The exploit has been published and may be used.
CWE-94 Aug 31, 2025