Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,700 results
Clear all
CVE-2025-42957
9.9
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
EPSS 0.00
SAP S/4HANA - Code Injection
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
CWE-94
Aug 12, 2025
CVE-2025-57520
6.1
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Techhub.p-m Decap Cms < 3.8.3 - XSS
A Cross Site Scripting (XSS) vulnerability exists in Decap CMS thru 3.8.3. Input fields such as body, tags, title, and description are not properly sanitized before being rendered in the content preview pane. This enables an attacker to inject arbitrary JavaScript which executes whenever a user views the preview panel. The vulnerability affects multiple input vectors and does not require user interaction beyond viewing the affected content.
CWE-79
Sep 10, 2025
CVE-2025-57392
7.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Benimpos - Incorrect Permission Assignment
BenimPOS Masaustu 3.0.x is affected by insecure file permissions. The application installation directory grants Everyone and BUILTIN\Users groups FILE_ALL_ACCESS, allowing local users to replace or modify .exe and .dll files. This may lead to privilege escalation or arbitrary code execution upon launch by another user or elevated context.
CWE-732
Sep 10, 2025
CVE-2025-5095
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Burk Technology ARC Solo - Auth Bypass
Burk Technology ARC Solo's password change mechanism can be utilized without proper
authentication procedures, allowing an attacker to take over the device.
A password change request can be sent directly to the device's HTTP
endpoint without providing valid credentials. The system does not
enforce proper authentication or session validation, allowing the
password change to proceed without verifying the request's legitimacy.
CWE-306
Aug 08, 2025
CVE-2025-58443
9.1
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.12
FOG <1.5.10.1673 - Auth Bypass
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CWE-287
Sep 06, 2025
CVE-2025-47533
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
Graphina <3.0.4 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in Iqonic Design Graphina graphina-elementor-charts-and-graphs allows PHP Local File Inclusion.This issue affects Graphina: from n/a through <= 3.0.4.
CWE-352
May 07, 2025
CVE-2025-58780
7.2
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
ScienceLogic SL1 <12.1.1 - SQL Injection
index.em7 in ScienceLogic SL1 before 12.1.1 allows SQL Injection via a parameter in a request. NOTE: this is disputed by the Supplier because it "inaccurately describes the vulnerability."
CWE-89
Sep 05, 2025
CVE-2025-2502
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Lenovo Pcmanager < 5.1.110.5082 - Incorrect Default Permissions
An improper default permissions vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges.
CWE-276
May 30, 2025
CVE-2025-22131
6.1
MEDIUM
SSVC PoC
2 PoCs
Analysis
EPSS 0.00
PhpSpreadsheet - XSS
PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.
CWE-79
Jan 20, 2025
CVE-2025-57576
5.4
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Phpgurukul Online Shopping Portal - XSS
PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site Scripting (XSS) in /admin/updateorder.php.
CWE-79
Sep 04, 2025
CVE-2025-32709
7.8
HIGH
KEV
SSVC ACTIVE
1 PoC
Analysis
EPSS 0.01
Microsoft Windows 10 1507 < 10.0.10240.21014 - Use After Free
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CWE-416
May 13, 2025
CVE-2025-8067
8.5
HIGH
1 PoC
Analysis
EPSS 0.00
Udisks daemon - Privilege Escalation
A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.
CWE-125
Aug 28, 2025
CVE-2025-1055
5.6
MEDIUM
1 PoC
Analysis
EPSS 0.00
K7 Security Anti-Malware - Privilege Escalation
A vulnerability in the K7RKScan.sys driver, part of the K7 Security Anti-Malware suite, allows a local low-privilege user to send crafted IOCTL requests to terminate a wide range of processes running with administrative or system-level privileges, with the exception of those inherently protected by the operating system. This flaw stems from missing access control in the driver's IOCTL handler, enabling unprivileged users to perform privileged actions in kernel space. Successful exploitation can lead to denial of service by disrupting critical services or privileged applications.
CWE-862
Jun 11, 2025
CVE-2025-6085
7.2
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.01
Make Connector <1.5.10 - File Upload
The Make Connector plugin for WordPress is vulnerable to arbitrary file uploads due to misconfigured file type validation in the 'upload_media' function in all versions up to, and including, 1.5.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Sep 04, 2025
CVE-2025-52389
8.8
HIGH
SSVC PoC
1 PoC
EPSS 0.00
Envasadora H2O Eireli - Soda Cristal v40.20.4 - Info Disclosure
An Insecure Direct Object Reference (IDOR) in Envasadora H2O Eireli - Soda Cristal v40.20.4 allows authenticated attackers to access sensitive data for other users via a crafted HTTP request.
CWE-639
Sep 08, 2025
CVE-2025-55998
8.1
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Smart Search & Filter Shopify/BigCommerce - XSS
A cross-site scripting (XSS) vulnerability in Smart Search & Filter Shopify and BigCommerce apps allows a remote attacker to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into several filter parameter
CWE-79
Sep 08, 2025
CVE-2025-2082
7.5
HIGH
2 PoCs
Analysis
EPSS 0.00
Tesla Model 3 Firmware < 2024.14 - Integer Overflow
Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the VCSEC module. By manipulating the certificate response sent from the Tire Pressure Monitoring System (TPMS), an attacker can trigger an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the VCSEC module and send arbitrary messages to the vehicle CAN bus. Was ZDI-CAN-23800.
CWE-190
Apr 30, 2025
CVE-2025-5252
7.3
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Phpgurukul News Portal Project - Injection
A vulnerability was found in PHPGurukul News Portal Project 4.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-74
May 27, 2025
CVE-2025-27480
8.1
HIGH
2 PoCs
Analysis
EPSS 0.01
Remote Desktop Gateway Service - Use After Free
Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
CWE-416
Apr 08, 2025
CVE-2025-56608
4.2
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Donbermoy Android Corona Virus Tracke... - Authentication Bypass by Spoofing
The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.
CWE-290
Sep 03, 2025