Latest Vulnerabilities with Public Exploits

Updated 18m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
53,700 results Clear all
CVE-2025-0133 LOW 6 PoCs Analysis NUCLEI EPSS 0.02
Palo Alto Networks PAN-OS - XSS
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal. For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.
CWE-79 May 14, 2025
CVE-2025-3639 LOW 1 PoC Analysis EPSS 0.00
Liferay Portal/DXP - Auth Bypass
Liferay Portal 7.3.0 through 7.4.3.132, and Liferay DXP 2025.Q1 through 2025.Q1.6, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92 and 7.3 GA through update 36 allows unauthenticated users with valid credentials to bypass the login process by changing the POST method to GET, once the site has MFA enabled.
CWE-288 Aug 18, 2025
CVE-2025-51005 7.5 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
tcpreplay-4.5.1 - Buffer Overflow
A heap-buffer-overflow vulnerability exists in the tcpliveplay utility of the tcpreplay-4.5.1. When a crafted pcap file is processed, the program incorrectly handles memory in the checksum calculation logic at do_checksum_math_liveplay in tcpliveplay.c, leading to a possible denial of service.
CWE-122 Sep 23, 2025
CVE-2025-51006 7.8 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
tcpreplay - DoS
Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the dlt_linuxsll2_cleanup() function in plugins/dlt_linuxsll2/linuxsll2.c. This vulnerability is triggered when tcpedit_dlt_cleanup() indirectly invokes the cleanup routine multiple times on the same memory region. By supplying a specifically crafted pcap file to the tcprewrite binary, a local attacker can exploit this flaw to cause a Denial of Service (DoS) via memory corruption.
CWE-415 Sep 22, 2025
CVE-2025-56311 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Shenzhen C-Data Technology Co. FD602GW-DX-R410 v2.2.14 - CSRF
In Shenzhen C-Data Technology Co. FD602GW-DX-R410 (firmware v2.2.14), the web management interface contains an authenticated CSRF vulnerability on the reboot endpoint (/boaform/admin/formReboot). An attacker can craft a malicious webpage that, when visited by an authenticated administrator, causes the router to reboot without explicit user consent. This lack of CSRF protection on a sensitive administrative function can lead to denial of service by disrupting network availability.
CWE-352 Sep 23, 2025
CVE-2025-8550 2.4 LOW SSVC PoC 2 PoCs Analysis EPSS 0.00
Pybbs < 6.0.0 - Code Injection
A vulnerability was found in atjiu pybbs up to 6.0.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/topic/list. The manipulation of the argument Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named 2fe4a51afbce0068c291bc1818bbc8f7f3b01a22. It is recommended to apply a patch to fix this issue.
CWE-94 Aug 05, 2025
CVE-2025-59424 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Linkace < 2.3.1 - XSS
LinkAce is a self-hosted archive to collect website links. Prior to 2.3.1, a Stored Cross-Site Scripting (XSS) vulnerability has been identified on the /system/audit page. The application fails to properly sanitize the username field before it is rendered in the audit log. An authenticated attacker can set a malicious JavaScript payload as their username. When an action performed by this user is recorded (e.g., generate or revoke an API token), the payload is stored in the database. The script is then executed in the browser of any user, particularly administrators, who views the /system/audit page. This vulnerability is fixed in 2.3.1.
CWE-79 Sep 18, 2025
CVE-2025-34157 9.0 CRITICAL 1 PoC Analysis EPSS 0.00
Coollabs Coolify < 4.0.0 - XSS
Coolify versions prior to v4.0.0-beta.420.6 are vulnerable to a stored cross-site scripting (XSS) attack in the project creation workflow. An authenticated user with low privileges can create a project with a maliciously crafted name containing embedded JavaScript. When an administrator attempts to delete the project or its associated resource, the payload executes in the admin’s browser context. This results in full compromise of the Coolify instance, including theft of API tokens, session cookies, and access to WebSocket-based terminal sessions on managed servers.
CWE-20 Aug 27, 2025
CVE-2025-26788 8.4 HIGH 1 PoC Analysis EPSS 0.00
StrongKey FIDO Server <4.15.1 - RCE
StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction.
CWE-639 Feb 14, 2025
CVE-2025-55885 6.3 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
ARD Gec EN Ligne < 2025-04-23 - SQL Injection
SQL Injection vulnerability in Alpes Recherche et Developpement ARD GEC en Lign before v.2025-04-23 allows a remote attacker to escalate privileges via the GET parameters in index.php
CWE-89 Sep 22, 2025
CVE-2025-55888 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
ARD - XSS
Cross-Site Scripting (XSS) vulnerability was discovered in the Ajax transaction manager endpoint of ARD. An attacker can intercept the Ajax response and inject malicious JavaScript into the accountName field. This input is not properly sanitized or encoded when rendered, allowing script execution in the context of users browsers. This flaw could lead to session hijacking, cookie theft, and other malicious actions.
CWE-79 Sep 22, 2025
CVE-2025-55886 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
ARD - IDOR
An Insecure Direct Object Reference (IDOR) vulnerability was discovered in ARD. The flaw exists in the `fe_uid` parameter of the payment history API endpoint. An authenticated attacker can manipulate this parameter to access the payment history of other users without authorization.
CWE-693 Sep 22, 2025
CVE-2025-55887 6.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
ARD - XSS
Cross-Site Scripting (XSS) vulnerability was discovered in the meal reservation service ARD. The vulnerability exists in the transactionID GET parameter on the transaction confirmation page. Due to improper input validation and output encoding, an attacker can inject malicious JavaScript code that is executed in the context of a user s browser. This can lead to session hijacking, theft of cookies, and other malicious actions performed on behalf of the victim.
CWE-79 Sep 22, 2025
CVE-2025-20265 10.0 CRITICAL 3 PoCs Analysis EPSS 0.00
Cisco Secure Firewall Management Center - Command Injection
A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.&nbsp; This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high&nbsp;privilege level. Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.
CWE-74 Aug 14, 2025
CVE-2025-57515 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.00
Uniclare Student Portal <v2 - SQL Injection
A SQL injection vulnerability has been identified in Uniclare Student Portal v2. This flaw allows remote attackers to inject arbitrary SQL commands via vulnerable input fields, enabling the execution of time-delay functions to infer database responses.
CWE-89 Oct 06, 2025
CVE-2025-10585 9.8 CRITICAL KEV SSVC ACTIVE 1 PoC Analysis EPSS 0.01
Google Chrome < 140.0.7339.185 - Type Confusion
Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Sep 24, 2025
CVE-2025-56762 6.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Paracrawl Keops - XSS
Paracrawl KeOPs v2 is vulnerable to Cross Site Scripting (XSS) in error.php.
CWE-79 Sep 19, 2025
CVE-2025-25967 8.8 HIGH 1 PoC Analysis EPSS 0.00
Ddsn Acora Cms - CSRF
Acora CMS version 10.1.1 is vulnerable to Cross-Site Request Forgery (CSRF). This flaw enables attackers to trick authenticated users into performing unauthorized actions, such as account deletion or user creation, by embedding malicious requests in external content. The lack of CSRF protections allows exploitation via crafted requests.
CWE-352 Mar 03, 2025
CVE-2025-25968 6.0 MEDIUM 1 PoC Analysis EPSS 0.01
Ddsn Cm3 Acora Content Management System - Improper Access Control
DDSN Interactive cm3 Acora CMS version 10.1.1 contains an improper access control vulnerability. An editor-privileged user can access sensitive information, such as system administrator credentials, by force browsing the endpoint and exploiting the 'file' parameter. By referencing specific files (e.g., cm3.xml), attackers can bypass access controls, leading to account takeover and potential privilege escalation.
CWE-284 Feb 20, 2025
CVE-2025-22964 8.1 HIGH 1 PoC Analysis EPSS 0.13
Ddsn Cm3 Acora Content Management System - SQL Injection
DDSN Interactive cm3 Acora CMS version 10.1.1 has an unauthenticated time-based blind SQL Injection vulnerability caused by insufficient input sanitization and validation in the "table" parameter. This flaw allows attackers to inject malicious SQL queries by directly incorporating user-supplied input into database queries without proper escaping or validation. Exploiting this issue enables unauthorized access, manipulation of data, or exposure of sensitive information, posing significant risks to the integrity and confidentiality of the application.
CWE-89 Jan 15, 2025