Latest Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
53,700 results Clear all
CVE-2025-9090 6.3 MEDIUM SSVC PoC 2 PoCs Analysis EPSS 0.03
Tenda AC20 16.03.08.12 - Command Injection
A vulnerability was identified in Tenda AC20 16.03.08.12. Affected is the function websFormDefine of the file /goform/telnet of the component Telnet Service. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Aug 17, 2025
CVE-2025-7766 8.0 HIGH 2 PoCs Analysis EPSS 0.00
Lantronix Provisioning Manager - RCE
Lantronix Provisioning Manager is vulnerable to XML external entity attacks in configuration files supplied by network devices, leading to unauthenticated remote code execution on hosts with Provisioning Manager installed.
CWE-611 Jul 22, 2025
CVE-2025-25256 9.8 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.48
Fortinet FortiSIEM - OS Command Injection
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
CWE-78 Aug 12, 2025
CVE-2025-8971 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Mayurik Online Tour & Travel Management System - Injection
A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1.0. This vulnerability affects unknown code of the file /admin/operations/travellers.php. The manipulation of the argument val-username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Aug 14, 2025
CVE-2025-50461 6.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Volcengine verl 3.0.0 - Code Injection
A deserialization vulnerability exists in Volcengine's verl 3.0.0, specifically in the scripts/model_merger.py script when using the "fsdp" backend. The script calls torch.load() with weights_only=False on user-supplied .pt files, allowing attackers to execute arbitrary code if a maliciously crafted model file is loaded. An attacker can exploit this by convincing a victim to download and place a malicious model file in a local directory with a specific filename pattern. This vulnerability may lead to arbitrary code execution with the privileges of the user running the script.
CWE-77 Aug 19, 2025
CVE-2025-50460 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.04
ms-swift 3.3.0 - RCE
A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.
CWE-502 Aug 01, 2025
CVE-2025-29775 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.00
NPM Xml-crypto < 6.0.1 - Signature Verification Bypass
xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks. For example, it could be used to alter critical identity or access control attributes, enabling an attacker to escalate privileges or impersonate another user. Users of versions 6.0.0 and prior should upgrade to version 6.0.1 to receive a fix. Those who are still using v2.x or v3.x should upgrade to patched versions 2.1.6 or 3.2.1, respectively.
CWE-347 Mar 14, 2025
CVE-2025-25291 9.8 CRITICAL SSVC PoC 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.21
ruby-saml <1.12.4,1.18.0 - Auth Bypass
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.
CWE-436 Mar 12, 2025
CVE-2025-50428 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.02
RaspAP raspap-webgui <3.3.2 - Command Injection
In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter.
CWE-77 Aug 27, 2025
CVE-2025-54887 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
jwe <1.1.0 - Confidentiality Disclosure
jwe is a Ruby implementation of the RFC 7516 JSON Web Encryption (JWE) standard. In versions 1.1.0 and below, authentication tags of encrypted JWEs can be brute forced, which may result in loss of confidentiality for those JWEs and provide ways to craft arbitrary JWEs. This puts users at risk because JWEs can be modified to decrypt to an arbitrary value, decrypted by observing parsing differences and the GCM internal GHASH key can be recovered. Users are affected by this vulnerability even if they do not use an AES-GCM encryption algorithm for their JWEs. As the GHASH key may have been leaked, users must rotate the encryption keys after upgrading. This issue is fixed in version 1.1.1.
CWE-354 Aug 08, 2025
CVE-2025-55668 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Apache Tomcat <11.0.7, <10.1.41, <9.0.105 - Session Fixation
Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
CWE-384 Aug 13, 2025
CVE-2025-50361 5.1 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
SmallBASIC <v12_28 - Buffer Overflow
Buffer Overflow was found in SmallBASIC community SmallBASIC with SDL Before v12_28, and commit sha:298a1d495355959db36451e90a0ac74bcc5593fe in the function main.cpp, which can lead to potential information leakage and crash.
CWE-120 Dec 03, 2025
CVE-2025-50360 8.4 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Pepper language 0.1.1 - Buffer Overflow
A heap buffer overflow in compiler.c and compiler.h in Pepper language 0.1.1commit 961a5d9988c5986d563310275adad3fd181b2bb7. Malicious execution of a pepper source file(.pr) could lead to arbitrary code execution or Denial of Service.
CWE-122 Dec 03, 2025
CVE-2025-20124 9.9 CRITICAL 3 PoCs Analysis EPSS 0.08
Cisco ISE - Code Injection
A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device. This vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object to an affected API. A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges. Note:&nbsp;To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time.
CWE-502 Feb 05, 2025
CVE-2025-51529 5.3 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Followmedarling Cookies And Content S... - Improper Access Control
Incorrect Access Control in the AJAX endpoint functionality in jonkastonka Cookies and Content Security Policy plugin through version 2.29 allows remote attackers to cause a denial of service (database server resource exhaustion) via unlimited database write operations to the wp_ajax_nopriv_cacsp_insert_consent_data endpoint.
CWE-284 Aug 19, 2025
CVE-2025-52385 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.01
Studio 3T <2025.1.0 - RCE
An issue in Studio 3T v.2025.1.0 and before allows a remote attacker to execute arbitrary code via a crafted payload to the child_process module
CWE-94 Aug 13, 2025
CVE-2025-4404 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
FreeIPA - Privilege Escalation
A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
CWE-1220 Jun 17, 2025
CVE-2025-8730 9.8 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.30
Belkin F9K1009/F9K1010 <2.00.04/2.09 - Hard-coded Credentials
A vulnerability was found in Belkin F9K1009 and F9K1010 2.00.04/2.00.09 and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to hard-coded credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Aug 08, 2025
CVE-2025-7769 HIGH 2 PoCs Analysis EPSS 0.04
Tigo Energy's CCA - Command Injection
Tigo Energy's CCA is vulnerable to a command injection vulnerability in the /cgi-bin/mobile_api endpoint when the DEVICE_PING command is called, allowing remote code execution due to improper handling of user input. When used with default credentials, this enables attackers to execute arbitrary commands on the device that could cause potential unauthorized access, service disruption, and data exposure.
CWE-77 Aug 06, 2025
CVE-2025-8471 7.3 HIGH SSVC PoC 2 PoCs Analysis EPSS 0.00
Projectworlds Online Admission System - Injection
A vulnerability, which was classified as critical, has been found in projectworlds Online Admission System 1.0. This issue affects some unknown processing of the file /adminlogin.php. The manipulation of the argument a_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Aug 02, 2025