Latest Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,649 results
Clear all
CVE-2025-56383
8.4
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Notepad++ v8.8.3 - Code Injection
Notepad++ v8.8.3 has a DLL hijacking vulnerability, which can replace the original DLL file to execute malicious code. NOTE: this is disputed by multiple parties because the behavior only occurs when a user installs the product into a directory tree that allows write access by arbitrary unprivileged users.
CWE-427
Sep 26, 2025
CVE-2025-20352
7.7
HIGH
KEV
SSVC ACTIVE
1 PoC
Analysis
EPSS 0.03
Cisco IOS - DoS
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following:
An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software. To cause the DoS, the attacker must have the SNMPv2c or earlier read-only community string or valid SNMPv3 user credentials.
An authenticated, remote attacker with high privileges could execute code as the root user on an affected device that is running Cisco IOS XE Software. To execute code as the root user, the attacker must have the SNMPv1 or v2c read-only community string or valid SNMPv3 user credentials and administrative or privilege 15 credentials on the affected device.
An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks.
This vulnerability is due to a stack overflow condition in the SNMP subsystem of the affected software. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.
Note: This vulnerability affects all versions of SNMP.
CWE-121
Sep 24, 2025
CVE-2025-22294
7.1
HIGH
1 PoC
Analysis
EPSS 0.00
Gravity Master Custom Field For WP Job Manager <1.3 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in theme funda Custom Field For WP Job Manager custom-field-for-wp-job-manager allows Reflected XSS.This issue affects Custom Field For WP Job Manager: from n/a through <= 1.3.
CWE-79
Jan 07, 2025
CVE-2025-54726
9.3
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.01
Miguel Useche JS Archive List - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows SQL Injection.This issue affects JS Archive List: from n/a through < 6.1.6.
CWE-89
Aug 20, 2025
CVE-2025-51495
7.5
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Mongoose <7.18 - Buffer Overflow
An integer overflow vulnerability exists in the WebSocket component of Mongoose 7.5 thru 7.17. By sending a specially crafted WebSocket request, an attacker can cause the application to crash. If downstream vendors integrate this component improperly, the issue may lead to a buffer overflow.
CWE-190
Sep 29, 2025
CVE-2025-46408
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
AVTECH EagleEyes <2.0.0 - Info Disclosure
An issue was discovered in the methods push.lite.avtech.com.AvtechLib.GetHttpsResponse and push.lite.avtech.com.Push_HttpService.getNewHttpClient in AVTECH EagleEyes 2.0.0. The methods set ALLOW_ALL_HOSTNAME_VERIFIER, bypassing domain validation.
CWE-297
Sep 15, 2025
CVE-2025-50110
8.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
AVTECH EagleEyes Lite <2.0.0 - Info Disclosure
An issue was discovered in the method push.lite.avtech.com.AvtechLib.GetHttpsResponse in AVTECH EagleEyes Lite 2.0.0, the GetHttpsResponse method transmits sensitive information - including internal server URLs, account IDs, passwords, and device tokens - as plaintext query parameters over HTTPS
CWE-319
Sep 15, 2025
CVE-2025-50944
8.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
AVTECH EagleEyes 2.0.0 - Info Disclosure
An issue was discovered in the method push.lite.avtech.com.MySSLSocketFactoryNew.checkServerTrusted in AVTECH EagleEyes 2.0.0. The custom X509TrustManager used in checkServerTrusted only checks the certificate's expiration date, skipping proper TLS chain validation.
CWE-295
Sep 15, 2025
CVE-2025-56819
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.10
Running-elephant Datart - OS Command Injection
An issue in Datart v.1.0.0-rc.3 allows a remote attacker to execute arbitrary code via the INIT connection parameter.
CWE-78
Sep 24, 2025
CVE-2025-56815
7.1
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Running-elephant Datart - Path Traversal
Datart 1.0.0-rc.3 is vulnerable to Directory Traversal in the POST /viz/image interface, since the server directly uses MultipartFile.transferTo() to save the uploaded file to a path controllable by the user, and lacks strict verification of the file name.
CWE-22
Sep 24, 2025
CVE-2025-0133
LOW
6 PoCs
Analysis
NUCLEI
EPSS 0.02
Palo Alto Networks PAN-OS - XSS
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN.
There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal.
For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.
CWE-79
May 14, 2025
CVE-2025-3639
LOW
1 PoC
Analysis
EPSS 0.00
Liferay Portal/DXP - Auth Bypass
Liferay Portal 7.3.0 through 7.4.3.132, and Liferay DXP 2025.Q1 through 2025.Q1.6, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92 and 7.3 GA through update 36 allows unauthenticated users with valid credentials to bypass the login process by changing the POST method to GET, once the site has MFA enabled.
CWE-288
Aug 18, 2025
CVE-2025-51005
7.5
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
tcpreplay-4.5.1 - Buffer Overflow
A heap-buffer-overflow vulnerability exists in the tcpliveplay utility of the tcpreplay-4.5.1. When a crafted pcap file is processed, the program incorrectly handles memory in the checksum calculation logic at do_checksum_math_liveplay in tcpliveplay.c, leading to a possible denial of service.
CWE-122
Sep 23, 2025
CVE-2025-51006
7.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
tcpreplay - DoS
Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the dlt_linuxsll2_cleanup() function in plugins/dlt_linuxsll2/linuxsll2.c. This vulnerability is triggered when tcpedit_dlt_cleanup() indirectly invokes the cleanup routine multiple times on the same memory region. By supplying a specifically crafted pcap file to the tcprewrite binary, a local attacker can exploit this flaw to cause a Denial of Service (DoS) via memory corruption.
CWE-415
Sep 22, 2025
CVE-2025-56311
6.5
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Shenzhen C-Data Technology Co. FD602GW-DX-R410 v2.2.14 - CSRF
In Shenzhen C-Data Technology Co. FD602GW-DX-R410 (firmware v2.2.14), the web management interface contains an authenticated CSRF vulnerability on the reboot endpoint (/boaform/admin/formReboot). An attacker can craft a malicious webpage that, when visited by an authenticated administrator, causes the router to reboot without explicit user consent. This lack of CSRF protection on a sensitive administrative function can lead to denial of service by disrupting network availability.
CWE-352
Sep 23, 2025
CVE-2025-8550
2.4
LOW
SSVC PoC
2 PoCs
Analysis
EPSS 0.00
Pybbs < 6.0.0 - Code Injection
A vulnerability was found in atjiu pybbs up to 6.0.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/topic/list. The manipulation of the argument Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named 2fe4a51afbce0068c291bc1818bbc8f7f3b01a22. It is recommended to apply a patch to fix this issue.
CWE-94
Aug 05, 2025
CVE-2025-59424
7.3
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Linkace < 2.3.1 - XSS
LinkAce is a self-hosted archive to collect website links. Prior to 2.3.1, a Stored Cross-Site Scripting (XSS) vulnerability has been identified on the /system/audit page. The application fails to properly sanitize the username field before it is rendered in the audit log. An authenticated attacker can set a malicious JavaScript payload as their username. When an action performed by this user is recorded (e.g., generate or revoke an API token), the payload is stored in the database. The script is then executed in the browser of any user, particularly administrators, who views the /system/audit page. This vulnerability is fixed in 2.3.1.
CWE-79
Sep 18, 2025
CVE-2025-34157
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.00
Coollabs Coolify < 4.0.0 - XSS
Coolify versions prior to v4.0.0-beta.420.6 are vulnerable to a stored cross-site scripting (XSS) attack in the project creation workflow. An authenticated user with low privileges can create a project with a maliciously crafted name containing embedded JavaScript. When an administrator attempts to delete the project or its associated resource, the payload executes in the admin’s browser context. This results in full compromise of the Coolify instance, including theft of API tokens, session cookies, and access to WebSocket-based terminal sessions on managed servers.
CWE-20
Aug 27, 2025
CVE-2025-26788
8.4
HIGH
1 PoC
Analysis
EPSS 0.00
StrongKey FIDO Server <4.15.1 - RCE
StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction.
CWE-639
Feb 14, 2025
CVE-2025-55885
6.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
ARD Gec EN Ligne < 2025-04-23 - SQL Injection
SQL Injection vulnerability in Alpes Recherche et Developpement ARD GEC en Lign before v.2025-04-23 allows a remote attacker to escalate privileges via the GET parameters in index.php
CWE-89
Sep 22, 2025