Latest Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
53,649 results Clear all
CVE-2025-7558 6.3 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Voting System 1.0 - SQL Injection
A vulnerability was found in code-projects Voting System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/positions_add.php. The manipulation of the argument description leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Jul 14, 2025
CVE-2025-56807 6.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Fairsketch Rise Ultimate Project Manager - XSS
A cross-site scripting (XSS) vulnerability in FairSketch RISE Ultimate Project Manager & CRM 3.9.4 allows an administrator to store a JavaScript payload using the file explorer in the admin dashboard when creating new folders.
CWE-79 Sep 29, 2025
CVE-2025-6384 9.1 CRITICAL 2 PoCs Analysis EPSS 0.00
Craftercms < 4.3.0 - Remote Code Execution
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of CrafterCMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass Sandbox restrictions and obtain RCE (Remote Code Execution). This issue affects CrafterCMS: from 4.0.0 through 4.2.2.
CWE-913 Jun 19, 2025
CVE-2025-59713 6.8 MEDIUM 1 PoC Analysis EPSS 0.00
Snipeitapp Snipe-it < 8.1.18 - Insecure Deserialization
Snipe-IT before 8.1.18 allows unsafe deserialization.
CWE-502 Sep 19, 2025
CVE-2025-59712 6.4 MEDIUM 1 PoC Analysis EPSS 0.00
Snipeitapp Snipe-it < 8.1.18 - XSS
Snipe-IT before 8.1.18 allows XSS.
CWE-79 Sep 19, 2025
CVE-2025-9242 9.8 CRITICAL KEV SSVC ACTIVE 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.69
WatchGuard Fireware OS <12.11.3 - RCE
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and 2025.1.
CWE-787 Sep 17, 2025
CVE-2025-56795 9.0 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.00
Mealie < 3.0.1 - XSS
Mealie 3.0.1 and earlier is vulnerable to Stored Cross-Site Scripting (XSS) in the recipe creation functionality. Unsanitized user input in the "note" and "text" fields of the "/api/recipes/{recipe_name}" endpoint is rendered in the frontend without proper escaping leading to persistent XSS.
CWE-79 Sep 29, 2025
CVE-2025-56515 8.8 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Suisuijiang Fiora - XSS
File upload vulnerability in Fiora chat application 1.0.0 through user avatar upload functionality. The application fails to validate SVG file content, allowing malicious SVG files with embedded foreignObject elements containing iframe tags and JavaScript event handlers (onmouseover) to be uploaded and stored. When rendered, these SVG files execute arbitrary JavaScript, enabling attackers to steal user sessions, cookies, and perform unauthorized actions in the context of users viewing affected profiles.
CWE-434 Oct 01, 2025
CVE-2025-55780 7.5 HIGH 1 PoC Analysis EPSS 0.00
MuPDF 1.26.4 - Memory Corruption
A null pointer dereference occurs in the function break_word_for_overflow_wrap() in MuPDF 1.26.4 when rendering a malformed EPUB document. Specifically, the function calls fz_html_split_flow() to split a FLOW_WORD node, but does not check if node->next is valid before accessing node->next->overflow_wrap, resulting in a crash if the split fails or returns a partial node chain.
CWE-476 Sep 23, 2025
CVE-2025-56514 5.4 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Suisuijiang Fiora - XSS
Cross Site Scripting (XSS) vulnerability in Fiora chat application 1.0.0 allows executes arbitrary JavaScript when malicious SVG files are rendered by other users.
CWE-79 Oct 01, 2025
CVE-2025-57389 5.4 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Luci OpenWRT <v19.07.0 - XSS
A reflected cross-site scripting (XSS) vulnerability in the /admin/system/packages endpoint of Luci OpenWRT v18.06.2 allows attackers to execute arbitrary Javascript in the context of a user's browser via a crafted payload. This vulnerability was fixed in OpenWRT v19.07.0.
CWE-79 Oct 01, 2025
CVE-2025-56764 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Trivision NC-227WF <5.80 - Info Disclosure
Trivision NC-227WF firmware 5.80 (build 20141010) login mechanism reveals whether a username exists or not by returning different error messages ("Unknown user" vs. "Wrong password"), allowing an attacker to enumerate valid usernames.
CWE-204 Sep 29, 2025
CVE-2025-36604 7.3 HIGH EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.13
Dell Unity Operating Environment < 5.5.1.0 - OS Command Injection
Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution.
CWE-78 Aug 04, 2025
CVE-2025-11077 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Campcodes Online Learning Management System 1.0 - SQL Injection
A vulnerability was determined in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /admin/add_content.php. Executing manipulation of the argument Title can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
CWE-74 Sep 27, 2025
CVE-2025-9267 HIGH 1 PoC Analysis EPSS 0.00
Seagate Toolkit <2.35.0.6 - RCE
In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the current working directory without validating their origin or integrity. This behavior can be exploited by placing a malicious DLL in the same directory as the installer executable, leading to arbitrary code execution with the privileges of the user running the installer. The issue stems from the use of insecure DLL loading practices, such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries.
CWE-426 Sep 26, 2025
CVE-2025-56019 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Agasta Easytouch+ 9.3.97 - Privilege Escalation
An insecure permission vulnerability exists in the Agasta Easytouch+ version 9.3.97 The device allows unauthorized mobile applications to connect via Bluetooth Low Energy (BLE) without authentication. Once an unauthorized connection is established, legitimate applications are unable to connect, causing a denial of service. The attack requires proximity to the device, making it exploitable from an adjacent network location.
CWE-277 Oct 02, 2025
CVE-2025-59843 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Flag Forge <2.3.2 - Info Disclosure
Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.2, the public endpoint /api/user/[username] returns user email addresses in its JSON response. The fix, intended for release in 2.3.1 but only available starting in version 2.3.2, removes email addresses from public API responses while keeping the endpoint publicly accessible. Users should upgrade to version 2.3.2 or later to eliminate exposure. There are no workarounds for this vulnerability.
CWE-359 Sep 26, 2025
CVE-2025-39866 7.8 HIGH 1 PoC Analysis EPSS 0.00
Linux kernel - Use After Free
In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1 ...... pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __mark_inode_dirty+0x124/0x418 lr : __mark_inode_dirty+0x118/0x418 sp : ffffffc08c9dbbc0 ........ Call trace: __mark_inode_dirty+0x124/0x418 generic_update_time+0x4c/0x60 file_modified+0xcc/0xd0 ext4_buffered_write_iter+0x58/0x124 ext4_file_write_iter+0x54/0x704 vfs_write+0x1c0/0x308 ksys_write+0x74/0x10c __arm64_sys_write+0x1c/0x28 invoke_syscall+0x48/0x114 el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x40/0xe4 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x194/0x198 Root cause is: systemd-random-seed kworker ---------------------------------------------------------------------- ___mark_inode_dirty inode_switch_wbs_work_fn spin_lock(&inode->i_lock); inode_attach_wb locked_inode_to_wb_and_lock_list get inode->i_wb spin_unlock(&inode->i_lock); spin_lock(&wb->list_lock) spin_lock(&inode->i_lock) inode_io_list_move_locked spin_unlock(&wb->list_lock) spin_unlock(&inode->i_lock) spin_lock(&old_wb->list_lock) inode_do_switch_wbs spin_lock(&inode->i_lock) inode->i_wb = new_wb spin_unlock(&inode->i_lock) spin_unlock(&old_wb->list_lock) wb_put_many(old_wb, nr_switched) cgwb_release old wb released wb_wakeup_delayed() accesses wb, then trigger the use-after-free issue Fix this race condition by holding inode spinlock until wb_wakeup_delayed() finished.
CWE-416 Sep 19, 2025
CVE-2025-57483 8.1 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
tawk.to chatbox widget <4 - XSS
A reflected cross-site scripting (XSS) vulnerability in tawk.to chatbox widget v4 allows attackers to execute arbitrary Javascript in the context of the user's browser via injecting a crafted payload into the vulnerable parameter.
CWE-79 Sep 29, 2025
CVE-2025-8422 7.5 HIGH 1 PoC Analysis EPSS 0.00
Propovoice: All-in-One Client Management System <=1.7.6.7 - Arbitrary File Read
The Propovoice: All-in-One Client Management System plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.7.6.7 via the send_email() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-73 Sep 11, 2025