Latest Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
53,700 results Clear all
CVE-2025-38676 7.8 HIGH 1 PoC Analysis EPSS 0.00
Linux Kernel < 5.5 - Out-of-Bounds Write
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length.
CWE-787 Aug 26, 2025
CVE-2025-34030 CRITICAL EXPLOITED SSVC PoC 2 PoCs Analysis EPSS 0.04
sar2html <3.2.2 - Command Injection
An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.
CWE-78 Jun 20, 2025
CVE-2025-9140 6.3 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
51mis Lingdang Crm < 8.6.5.4 - Injection
A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+."
CWE-74 Aug 19, 2025
CVE-2025-6082 5.3 MEDIUM 2 PoCs Analysis EPSS 0.04
Birth Chart Compatibility <2.0 - Info Disclosure
The Birth Chart Compatibility plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.0. This is due to insufficient protection against directly accessing the plugin's index.php file, which causes an error exposing the full path. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
CWE-200 Jul 22, 2025
CVE-2025-26263 5.1 MEDIUM SSVC PoC 2 PoCs Analysis EPSS 0.00
GeoVision ASManager <6.2.0 - Info Disclosure
GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less (fixed in 6.2.0), is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process.
CWE-200 Feb 28, 2025
CVE-2025-26264 8.8 HIGH SSVC PoC 2 PoCs Analysis EPSS 0.30
GeoVision GV-ASWeb <6.2.0 - RCE
GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.
CWE-94 Feb 27, 2025
CVE-2025-55575 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.00
SMM Panel 3.1 - SQL Injection
SQL Injection vulnerability in SMM Panel 3.1 allowing remote attackers to gain sensitive information via a crafted HTTP request with action=service_detail.
CWE-89 Aug 25, 2025
CVE-2025-6713 7.7 HIGH 1 PoC Analysis EPSS 0.00
Mongodb < 6.0.22 - Improper Authorization
An unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.19 and MongoDB Server v6.0 versions prior to 6.0.22
CWE-285 Jul 07, 2025
CVE-2025-49667 7.8 HIGH 1 PoC Analysis EPSS 0.00
Microsoft Windows 10 1507 < 10.0.10240.21073 - Double Free
Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
CWE-415 Jul 08, 2025
CVE-2025-53632 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Chall-Manager - Path Traversal
Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.
CWE-22 Jul 10, 2025
CVE-2025-27519 CRITICAL 1 PoC Analysis EPSS 0.03
Cognita - Path Traversal
Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243.
CWE-22 Mar 07, 2025
CVE-2025-9345 4.9 MEDIUM 1 PoC Analysis EPSS 0.00
Managefy plugin <1.4.8 - Path Traversal
The File Manager, Code Editor, and Backup by Managefy plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.4.8 via the ajax_downloadfile() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory.
CWE-22 Aug 28, 2025
CVE-2025-55287 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Genealogy <4.4.0 - XSS
Genealogy is a family tree PHP application. Prior to 4.4.0, Authenticated Stored Cross-Site Scripting (XSS) vulnerability was identified in the Genealogy application. Authenticated attackers could run arbitrary JavaScript in another user’s session, leading to session hijacking, data theft, and UI manipulation. This vulnerability is fixed in 4.4.0.
CWE-79 Aug 18, 2025
CVE-2025-22235 7.3 HIGH 1 PoC Analysis EPSS 0.00
Spring Security - Info Disclosure
EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed. Your application may be affected by this if all the following conditions are met: * You use Spring Security * EndpointRequest.to() has been used in a Spring Security chain configuration * The endpoint which EndpointRequest references is disabled or not exposed via web * Your application handles requests to /null and this path needs protection You are not affected if any of the following is true: * You don't use Spring Security * You don't use EndpointRequest.to() * The endpoint which EndpointRequest.to() refers to is enabled and is exposed * Your application does not handle requests to /null or this path does not need protection
CWE-20 Apr 28, 2025
CVE-2025-52392 5.4 MEDIUM SSVC PoC 2 PoCs Analysis EPSS 0.02
Soosyze - Brute Force
Soosyze CMS 2.0 allows brute-force login attacks via the /user/login endpoint due to missing rate-limiting and lockout mechanisms. An attacker can repeatedly submit login attempts without restrictions, potentially gaining unauthorized administrative access. This vulnerability corresponds to CWE-307: Improper Restriction of Excessive Authentication Attempts.
CWE-307 Aug 13, 2025
CVE-2025-32094 4.0 MEDIUM 1 PoC Analysis EPSS 0.00
Akamai Ghost <2025-03-26 - SSRF
An issue was discovered in Akamai Ghost, as used for the Akamai CDN platform before 2025-03-26. Under certain circumstances, a client making an HTTP/1.x OPTIONS request with an "Expect: 100-continue" header, and using obsolete line folding, can lead to a discrepancy in how two in-path Akamai servers interpret the request, allowing an attacker to smuggle a second request in the original request body.
CWE-444 Aug 07, 2025
CVE-2025-8889 3.8 LOW SSVC PoC 1 PoC Analysis EPSS 0.00
Eliehanna Compress And Upload Plugin - Unrestricted File Upload
The Compress & Upload WordPress plugin before 1.0.5 does not properly validate uploaded files, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)
CWE-434 Sep 09, 2025
CVE-2025-34036 9.8 CRITICAL EXPLOITED SSVC PoC 2 PoCs Analysis EPSS 0.19
TVT White-Labeled DVR - Command Injection
An OS command injection vulnerability exists in white-labeled DVRs manufactured by TVT, affecting a custom HTTP service called "Cross Web Server" that listens on TCP ports 81 and 82. The web interface fails to sanitize input in the URI path passed to the language extraction functionality. When the server processes a request to /language/[lang]/index.html, it uses the [lang] input unsafely in a tar extraction command without proper escaping. This allows an unauthenticated remote attacker to inject shell commands and achieve arbitrary command execution as root. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
CWE-78 Jun 24, 2025
CVE-2025-9215 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
StoreEngine <1.5.0 - Path Traversal
The StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.0 via the file_download() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-22 Sep 17, 2025
CVE-2025-9216 8.8 HIGH SSVC PoC 1 PoC Analysis EPSS 0.01
StoreEngine <1.5.0 - File Upload
The StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the import() function in all versions up to, and including, 1.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Sep 17, 2025