Latest Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,649 results
Clear all
CVE-2025-21333
7.8
HIGH
KEV
SSVC ACTIVE
5 PoCs
Analysis
EPSS 0.81
Microsoft Windows 10 21h2 < 10.0.19044.5371 - Heap Buffer Overflow
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CWE-122
Jan 14, 2025
CVE-2025-59376
3.7
LOW
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Feisky Mcp-kubernetes-server < 0.1.11 - Command Injection
feiskyer mcp-kubernetes-server through 0.1.11 does not consider chained commands in the implementation of --disable-write and --disable-delete, e.g., it allows a "kubectl version; kubectl delete pod" command because the first word (i.e., "version") is not a write or delete operation.
CWE-77
Sep 15, 2025
CVE-2025-38501
7.5
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Linux Kernel < 6.1.148 - Denial of Service
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: limit repeated connections from clients with the same IP
Repeated connections from clients with the same IP address may exhaust
the max connections and prevent other normal client connections.
This patch limit repeated connections from clients with the same IP.
CWE-400
Aug 16, 2025
CVE-2025-55234
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
SMB Server - Privilege Escalation
SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks.
The SMB Server already supports mechanisms for hardening against relay attacks:
SMB Server signing
SMB Server Extended Protection for Authentication (EPA)
Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks.
If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks:
Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA.
Adopt appropriate SMB Server hardening measures.
CWE-287
Sep 09, 2025
CVE-2025-54914
10.0
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.00
Microsoft Azure Networking - Improper Access Control
Azure Networking Elevation of Privilege Vulnerability
CWE-284
Sep 04, 2025
CVE-2025-57055
6.5
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Wondercms - SSRF
WonderCMS 3.5.0 is vulnerable to Server-Side Request Forgery (SSRF) in the custom module installation functionality. An authenticated administrator can supply a malicious URL via the pluginThemeUrl POST parameter. The server fetches the provided URL using curl_exec() without sufficient validation, allowing the attacker to force internal or external HTTP requests.
CWE-918
Sep 17, 2025
CVE-2025-10377
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
WordPress System Dashboard <2.8.20 - CSRF
The System Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8.20. This is due to missing nonce validation on the sd_toggle_logs() function. This makes it possible for unauthenticated attackers to toggle critical logging settings including Page Access Logs, Error Logs, and Email Delivery Logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CWE-352
Sep 26, 2025
CVE-2025-8571
4.8
MEDIUM
1 PoC
Analysis
EPSS 0.00
Concretecms Concrete Cms < 8.5.21 - XSS
Concrete CMS 9 to 9.4.2 and versions below 8.5.21 are vulnerable to Reflected Cross-Site Scripting (XSS) in the Conversation Messages Dashboard Page. Unsanitized input could cause theft of session cookies or tokens, defacement of web content, redirection to malicious sites, and (if victim is an admin), the execution of unauthorized actions. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Fortbridge https://fortbridge.co.uk/ for performing a penetration test and vulnerability assessment on Concrete CMS and reporting this issue.
CWE-20
Aug 05, 2025
CVE-2025-55996
6.3
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Viber Desktop 25.6.0 - XSS
Viber Desktop 25.6.0 is vulnerable to HTML Injection via the text parameter of the message compose/forward interface
CWE-79
Sep 12, 2025
CVE-2025-55746
9.3
CRITICAL
1 PoC
Analysis
EPSS 0.00
Directus <11.9.3 - File Upload
Directus is a real-time API and App dashboard for managing SQL database content. From 10.8.0 to before 11.9.3, a vulnerability exists in the file update mechanism which allows an unauthenticated actor to modify existing files with arbitrary contents (without changes being applied to the files' database-resident metadata) and / or upload new files, with arbitrary content and extensions, which won't show up in the Directus UI. This vulnerability is fixed in 11.9.3.
CWE-434
Aug 20, 2025
CVE-2025-42957
9.9
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
EPSS 0.00
SAP S/4HANA - Code Injection
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
CWE-94
Aug 12, 2025
CVE-2025-57520
6.1
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Techhub.p-m Decap Cms < 3.8.3 - XSS
A Cross Site Scripting (XSS) vulnerability exists in Decap CMS thru 3.8.3. Input fields such as body, tags, title, and description are not properly sanitized before being rendered in the content preview pane. This enables an attacker to inject arbitrary JavaScript which executes whenever a user views the preview panel. The vulnerability affects multiple input vectors and does not require user interaction beyond viewing the affected content.
CWE-79
Sep 10, 2025
CVE-2025-57392
7.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Benimpos - Incorrect Permission Assignment
BenimPOS Masaustu 3.0.x is affected by insecure file permissions. The application installation directory grants Everyone and BUILTIN\Users groups FILE_ALL_ACCESS, allowing local users to replace or modify .exe and .dll files. This may lead to privilege escalation or arbitrary code execution upon launch by another user or elevated context.
CWE-732
Sep 10, 2025
CVE-2025-5095
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Burk Technology ARC Solo - Auth Bypass
Burk Technology ARC Solo's password change mechanism can be utilized without proper
authentication procedures, allowing an attacker to take over the device.
A password change request can be sent directly to the device's HTTP
endpoint without providing valid credentials. The system does not
enforce proper authentication or session validation, allowing the
password change to proceed without verifying the request's legitimacy.
CWE-306
Aug 08, 2025
CVE-2025-58443
9.1
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.12
FOG <1.5.10.1673 - Auth Bypass
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CWE-287
Sep 06, 2025
CVE-2025-47533
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
Graphina <3.0.4 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in Iqonic Design Graphina graphina-elementor-charts-and-graphs allows PHP Local File Inclusion.This issue affects Graphina: from n/a through <= 3.0.4.
CWE-352
May 07, 2025
CVE-2025-58780
7.2
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
ScienceLogic SL1 <12.1.1 - SQL Injection
index.em7 in ScienceLogic SL1 before 12.1.1 allows SQL Injection via a parameter in a request. NOTE: this is disputed by the Supplier because it "inaccurately describes the vulnerability."
CWE-89
Sep 05, 2025
CVE-2025-2502
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Lenovo Pcmanager < 5.1.110.5082 - Incorrect Default Permissions
An improper default permissions vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges.
CWE-276
May 30, 2025
CVE-2025-22131
6.1
MEDIUM
SSVC PoC
2 PoCs
Analysis
EPSS 0.00
PhpSpreadsheet - XSS
PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.
CWE-79
Jan 20, 2025
CVE-2025-57576
5.4
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Phpgurukul Online Shopping Portal - XSS
PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site Scripting (XSS) in /admin/updateorder.php.
CWE-79
Sep 04, 2025