Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
53,649 results Clear all
CVE-2025-21333 7.8 HIGH KEV SSVC ACTIVE 5 PoCs Analysis EPSS 0.81
Microsoft Windows 10 21h2 < 10.0.19044.5371 - Heap Buffer Overflow
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CWE-122 Jan 14, 2025
CVE-2025-59376 3.7 LOW SSVC PoC 1 PoC Analysis EPSS 0.00
Feisky Mcp-kubernetes-server < 0.1.11 - Command Injection
feiskyer mcp-kubernetes-server through 0.1.11 does not consider chained commands in the implementation of --disable-write and --disable-delete, e.g., it allows a "kubectl version; kubectl delete pod" command because the first word (i.e., "version") is not a write or delete operation.
CWE-77 Sep 15, 2025
CVE-2025-38501 7.5 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Linux Kernel < 6.1.148 - Denial of Service
In the Linux kernel, the following vulnerability has been resolved: ksmbd: limit repeated connections from clients with the same IP Repeated connections from clients with the same IP address may exhaust the max connections and prevent other normal client connections. This patch limit repeated connections from clients with the same IP.
CWE-400 Aug 16, 2025
CVE-2025-55234 8.8 HIGH 2 PoCs Analysis EPSS 0.00
SMB Server - Privilege Escalation
SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protection for Authentication (EPA) Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks: Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing &amp; SMB Server EPA. Adopt appropriate SMB Server hardening measures.
CWE-287 Sep 09, 2025
CVE-2025-54914 10.0 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.00
Microsoft Azure Networking - Improper Access Control
Azure Networking Elevation of Privilege Vulnerability
CWE-284 Sep 04, 2025
CVE-2025-57055 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Wondercms - SSRF
WonderCMS 3.5.0 is vulnerable to Server-Side Request Forgery (SSRF) in the custom module installation functionality. An authenticated administrator can supply a malicious URL via the pluginThemeUrl POST parameter. The server fetches the provided URL using curl_exec() without sufficient validation, allowing the attacker to force internal or external HTTP requests.
CWE-918 Sep 17, 2025
CVE-2025-10377 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
WordPress System Dashboard <2.8.20 - CSRF
The System Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8.20. This is due to missing nonce validation on the sd_toggle_logs() function. This makes it possible for unauthenticated attackers to toggle critical logging settings including Page Access Logs, Error Logs, and Email Delivery Logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CWE-352 Sep 26, 2025
CVE-2025-8571 4.8 MEDIUM 1 PoC Analysis EPSS 0.00
Concretecms Concrete Cms < 8.5.21 - XSS
Concrete CMS 9 to 9.4.2 and versions below 8.5.21 are vulnerable to Reflected Cross-Site Scripting (XSS) in the Conversation Messages Dashboard Page. Unsanitized input could cause theft of session cookies or tokens, defacement of web content, redirection to malicious sites, and (if victim is an admin), the execution of unauthorized actions. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Fortbridge https://fortbridge.co.uk/  for performing a penetration test and vulnerability assessment on Concrete CMS and reporting this issue.
CWE-20 Aug 05, 2025
CVE-2025-55996 6.3 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Viber Desktop 25.6.0 - XSS
Viber Desktop 25.6.0 is vulnerable to HTML Injection via the text parameter of the message compose/forward interface
CWE-79 Sep 12, 2025
CVE-2025-55746 9.3 CRITICAL 1 PoC Analysis EPSS 0.00
Directus <11.9.3 - File Upload
Directus is a real-time API and App dashboard for managing SQL database content. From 10.8.0 to before 11.9.3, a vulnerability exists in the file update mechanism which allows an unauthenticated actor to modify existing files with arbitrary contents (without changes being applied to the files' database-resident metadata) and / or upload new files, with arbitrary content and extensions, which won't show up in the Directus UI. This vulnerability is fixed in 11.9.3.
CWE-434 Aug 20, 2025
CVE-2025-42957 9.9 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis EPSS 0.00
SAP S/4HANA - Code Injection
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
CWE-94 Aug 12, 2025
CVE-2025-57520 6.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Techhub.p-m Decap Cms < 3.8.3 - XSS
A Cross Site Scripting (XSS) vulnerability exists in Decap CMS thru 3.8.3. Input fields such as body, tags, title, and description are not properly sanitized before being rendered in the content preview pane. This enables an attacker to inject arbitrary JavaScript which executes whenever a user views the preview panel. The vulnerability affects multiple input vectors and does not require user interaction beyond viewing the affected content.
CWE-79 Sep 10, 2025
CVE-2025-57392 7.8 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Benimpos - Incorrect Permission Assignment
BenimPOS Masaustu 3.0.x is affected by insecure file permissions. The application installation directory grants Everyone and BUILTIN\Users groups FILE_ALL_ACCESS, allowing local users to replace or modify .exe and .dll files. This may lead to privilege escalation or arbitrary code execution upon launch by another user or elevated context.
CWE-732 Sep 10, 2025
CVE-2025-5095 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Burk Technology ARC Solo - Auth Bypass
Burk Technology ARC Solo's password change mechanism can be utilized without proper authentication procedures, allowing an attacker to take over the device. A password change request can be sent directly to the device's HTTP endpoint without providing valid credentials. The system does not enforce proper authentication or session validation, allowing the password change to proceed without verifying the request's legitimacy.
CWE-306 Aug 08, 2025
CVE-2025-58443 9.1 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.12
FOG <1.5.10.1673 - Auth Bypass
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CWE-287 Sep 06, 2025
CVE-2025-47533 8.1 HIGH 1 PoC Analysis EPSS 0.00
Graphina <3.0.4 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in Iqonic Design Graphina graphina-elementor-charts-and-graphs allows PHP Local File Inclusion.This issue affects Graphina: from n/a through <= 3.0.4.
CWE-352 May 07, 2025
CVE-2025-58780 7.2 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
ScienceLogic SL1 <12.1.1 - SQL Injection
index.em7 in ScienceLogic SL1 before 12.1.1 allows SQL Injection via a parameter in a request. NOTE: this is disputed by the Supplier because it "inaccurately describes the vulnerability."
CWE-89 Sep 05, 2025
CVE-2025-2502 7.8 HIGH 1 PoC Analysis EPSS 0.00
Lenovo Pcmanager < 5.1.110.5082 - Incorrect Default Permissions
An improper default permissions vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges.
CWE-276 May 30, 2025
CVE-2025-22131 6.1 MEDIUM SSVC PoC 2 PoCs Analysis EPSS 0.00
PhpSpreadsheet - XSS
PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.
CWE-79 Jan 20, 2025
CVE-2025-57576 5.4 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Phpgurukul Online Shopping Portal - XSS
PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site Scripting (XSS) in /admin/updateorder.php.
CWE-79 Sep 04, 2025