Remote Code Execution

61 CVEs technique

Monthly

CVE-2026-4234 MEDIUM POC This Month

SQL injection in SSCMS 7.4.0 via the tableHandWrite parameter in SitesAddController.Submit.cs allows authenticated remote attackers to execute arbitrary SQL commands. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early disclosure notification.

SQLi Remote Code Execution Sscms
NVD VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-68553 CRITICAL Act Now

Unrestricted file upload in Lendiz (lendiz) WordPress theme allows uploading web shells for remote code execution.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.0%
CVE-2026-27577 CRITICAL PATCH Act Now

Additional expression evaluation exploits in n8n before 2.10.1/2.9.3/1.123.22. Fourth distinct code execution path through the expression engine. Patch available.

RCE Remote Code Execution Code Injection Command Injection Node.js +1
NVD GitHub
CVSS 3.1
9.9
EPSS
0.2%
CVE-2025-68549 CRITICAL Act Now

Unrestricted file upload in Wiguard (wiguard) WordPress theme allows uploading web shells for remote code execution.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.0%
CVE-2026-22769 CRITICAL KEV PATCH THREAT Act Now

Dell RecoverPoint for Virtual Machines prior to 6.0.3.1 HF1 contains hardcoded credentials (CVE-2026-22769, CVSS 10.0) that allow unauthenticated remote attackers with knowledge of the credentials to gain root-level access to the underlying operating system. KEV-listed, this vulnerability exposes disaster recovery infrastructure to complete compromise, potentially affecting the integrity of backup and replication data.

Dell Authentication Bypass Privilege Escalation RCE Remote Code Execution +1
NVD
CVSS 3.1
10.0
EPSS
34.2%
Threat
4.5
CVE-2026-25053 CRITICAL PATCH Act Now

n8n has a command injection vulnerability (CVSS 9.9) allowing authenticated users to execute arbitrary OS commands through workflow definitions.

RCE Remote Code Execution Command Injection Information Disclosure Node.js +2
NVD GitHub
CVSS 3.1
9.9
EPSS
0.0%
CVE-2026-25049 CRITICAL PATCH Act Now

n8n workflow automation platform has an authenticated code execution vulnerability (CVSS 9.9) through improper runtime behavior modification, enabling server takeover.

RCE Remote Code Execution Command Injection Code Injection Node.js +2
NVD GitHub
CVSS 3.1
9.9
EPSS
0.0%
CVE-2025-68986 CRITICAL Act Now

Miion WordPress theme by zozothemes has an unrestricted file upload vulnerability allowing unauthenticated web shell deployment and server compromise.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.1%
CVE-2025-68910 CRITICAL Act Now

Blogzee WordPress theme by blazethemes has an unrestricted file upload vulnerability — the fourth blazethemes product affected by the same shared vulnerable upload component.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.1%
CVE-2025-68909 CRITICAL Act Now

Blogistic WordPress theme by blazethemes has an unrestricted file upload vulnerability enabling attackers to deploy web shells for persistent server access.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.1%
CVE-2025-67968 CRITICAL Act Now

Real Homes CRM WordPress plugin has an unrestricted file upload allowing web shell deployment for persistent remote code execution.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.1%
CVE-2025-62056 CRITICAL Act Now

News Event WordPress theme by blazethemes has an unrestricted file upload allowing web shell deployment and remote code execution.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.0%
CVE-2025-62050 CRITICAL Act Now

Blogmatic WordPress theme by blazethemes has an unrestricted file upload vulnerability allowing attackers to upload web shells for persistent server access.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.0%
CVE-2025-64090 CRITICAL Act Now

Command injection via the hostname field allowing authenticated code execution with maximum CVSS 10.0 and scope change.

Command Injection RCE Remote Code Execution IoT Tcis 3 Firmware
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-21877 CRITICAL PATCH Act Now

n8n workflow automation (through 1.121.2) allows authenticated users to execute arbitrary code via the n8n service, with scope change enabling full compromise of both self-hosted and cloud instances. EPSS 12.5% indicates high exploitation activity. Patch available.

RCE Remote Code Execution Code Injection Node.js N8n
NVD GitHub
CVSS 3.1
9.9
EPSS
12.5%
CVE-2025-31048 CRITICAL Act Now

Themify Shopo WordPress theme (through 1.1.4) allows authenticated users to upload web shells. Despite requiring low-level authentication, the scope change to CVSS 9.9 means any subscriber account can achieve full server compromise.

WordPress PHP RCE Remote Code Execution
NVD
CVSS 3.1
9.9
EPSS
0.0%
CVE-2025-7612 HIGH POC This Week

CVE-2025-7612 is a critical SQL injection vulnerability in code-projects Mobile Shop 1.0 affecting the /login.php file's email parameter, allowing remote unauthenticated attackers to execute arbitrary SQL queries and potentially extract or modify sensitive data. The vulnerability has been publicly disclosed with exploit code available, making it actively exploitable in the wild. With a CVSS score of 7.3 and demonstrated public PoC availability, this represents an immediate threat to deployments of this product.

PHP SQLi Remote Code Execution Mobile Shop
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-7609 HIGH POC This Week

CVE-2025-7609 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /register.php endpoint via the ruser_email parameter. An unauthenticated remote attacker can exploit this to read, modify, or delete database contents, potentially compromising user data and application integrity. Public exploit code exists, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution Simple Shopping Cart
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-7608 HIGH POC This Week

CVE-2025-7608 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /userlogin.php endpoint's user_email parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially extract, modify, or delete database contents. The vulnerability has been publicly disclosed with proof-of-concept exploit code available, and while the CVSS score is 7.3 (moderate-to-high severity), the low attack complexity and lack of authentication requirements make this a high-priority exploit target for threat actors.

PHP SQLi Remote Code Execution Simple Shopping Cart
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-7587 HIGH POC This Week

CVE-2025-7587 is a critical SQL injection vulnerability in code-projects Online Appointment Booking System version 1.0, affecting the /cover.php endpoint where uname and psw parameters are not properly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to data exfiltration, authentication bypass, and database manipulation. The vulnerability has been publicly disclosed with working exploits available, making active exploitation highly probable in the wild.

PHP SQLi Remote Code Execution Online Appointment Booking System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-7528 HIGH POC This Week

CVE-2025-7528 is a critical stack-based buffer overflow vulnerability in Tenda FH1202 firmware version 1.2.0.14(408) affecting the /goform/GstDhcpSetSer endpoint. An authenticated attacker can remotely exploit this vulnerability by manipulating the 'dips' parameter to achieve arbitrary code execution with full system compromise (confidentiality, integrity, and availability impact). The vulnerability has public exploit code available and meets criteria for active exploitation risk.

Buffer Overflow Remote Code Execution Fh1202 Firmware Tenda
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-7515 HIGH POC This Week

CVE-2025-7515 is a critical SQL injection vulnerability in code-projects Online Appointment Booking System version 1.0, specifically in the /ulocateus.php file where the 'doctorname' parameter is insufficiently sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of database contents. The vulnerability has been publicly disclosed with proof-of-concept code available, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution Online Appointment Booking System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-7509 HIGH POC This Week

CVE-2025-7509 is a critical SQL injection vulnerability in code-projects Modern Bag 1.0 affecting the /admin/slide.php endpoint via the idSlide parameter. An unauthenticated remote attacker can exploit this with no user interaction to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution Modern Bag
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-7475 HIGH POC This Week

CVE-2025-7475 is a critical SQL injection vulnerability in code-projects Simple Car Rental System version 1.0, located in the /pay.php file where the 'mpesa' parameter is insufficiently sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of database records. The vulnerability has been publicly disclosed with proof-of-concept availability, indicating active exploitation risk in real-world deployments.

PHP SQLi Remote Code Execution Simple Car Rental System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-7467 HIGH POC This Week

CVE-2025-7467 is a critical SQL injection vulnerability in code-projects Modern Bag version 1.0 affecting the /product-detail.php file's ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially exfiltrate, modify, or delete database contents. The vulnerability has been publicly disclosed with exploit code available, and the CVSS 7.3 score reflects moderate-to-high real-world impact with low attack complexity and no authentication requirements.

PHP SQLi Remote Code Execution Modern Bag
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-47812 CRITICAL POC KEV THREAT Emergency

Wing FTP Server before 7.4.4 contains a critical remote code execution vulnerability (CVE-2025-47812, CVSS 10.0) through null byte injection in user/admin web interfaces that enables arbitrary Lua code execution in session files. With EPSS 92.7% and KEV listing, this vulnerability guarantees unauthenticated root/SYSTEM code execution on affected servers, as the FTP service runs with maximum privileges by default.

RCE Code Injection Ftp Remote Code Execution Privilege Escalation +1
NVD Exploit-DB
CVSS 3.1
10.0
EPSS
92.7%
Threat
7.8
CVE-2025-6565 HIGH POC This Week

CVE-2025-6565 is a critical stack-based buffer overflow vulnerability in Netgear WNCE3001 v1.0.0.50 affecting the HTTP POST request handler's Host parameter processing. An authenticated attacker can remotely exploit this to achieve complete system compromise including confidentiality, integrity, and availability violations. Public exploitation code exists, elevating immediate risk.

Buffer Overflow Netgear Remote Code Execution
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.3%
CVE-2025-6501 HIGH POC This Week

CVE-2025-6501 is a critical SQL injection vulnerability in code-projects Inventory Management System 1.0 affecting the /php_action/createCategories.php file, where the 'categoriesStatus' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Public exploit disclosure and proof-of-concept availability indicate active threat potential with low barrier to exploitation.

PHP SQLi Remote Code Execution Inventory Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6481 HIGH POC This Week

CVE-2025-6481 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System 1.0 affecting the /update.php file's ID parameter, allowing unauthenticated remote attackers to manipulate database queries and potentially extract, modify, or delete sensitive data. The vulnerability has been publicly disclosed with proof-of-concept availability, significantly increasing exploitation risk in production environments. With a CVSS score of 7.3 and low attack complexity, this represents an immediate threat to any organization running the affected version without patches.

PHP SQLi Remote Code Execution Simple Pizza Ordering System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6479 HIGH POC This Week

CVE-2025-6479 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System 1.0 affecting the /salesreport.php file parameter 'dayfrom'. An unauthenticated attacker can remotely execute arbitrary SQL queries with no user interaction required, potentially enabling data exfiltration, modification, or deletion. The vulnerability has been publicly disclosed with exploit proof-of-concept availability, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution Simple Pizza Ordering System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6468 HIGH POC This Week

CVE-2025-6468 is a critical SQL injection vulnerability in code-projects Online Bidding System version 1.0 affecting the /bidnow.php file's ID parameter. An unauthenticated remote attacker can exploit this vulnerability to read, modify, or delete database contents, potentially compromising confidentiality, integrity, and availability of the entire bidding system. The vulnerability has been publicly disclosed with proof-of-concept code available, significantly increasing exploitation risk in active deployments.

PHP SQLi Remote Code Execution Online Bidding System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6458 HIGH POC This Week

CVE-2025-6458 is a critical SQL injection vulnerability in code-projects Online Hotel Reservation System version 1.0, affecting the /admin/execedituser.php endpoint. An unauthenticated remote attacker can manipulate the 'userid' parameter to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, making it actively exploitable in the wild.

PHP SQLi Remote Code Execution Online Hotel Reservation System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6457 HIGH POC This Week

CVE-2025-6457 is a critical SQL injection vulnerability in code-projects Online Hotel Reservation System 1.0 affecting the /reservation/demo.php file, where the 'Start' parameter is unsanitized and directly used in database queries. An unauthenticated remote attacker can exploit this vulnerability to read, modify, or delete sensitive database content including guest information, reservations, and payment data. The vulnerability has been publicly disclosed with exploit code available, though specific EPSS probability and KEV/CISA inclusion status cannot be determined from provided data.

PHP SQLi Remote Code Execution Online Hotel Reservation System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6451 HIGH POC This Week

CVE-2025-6451 is a critical SQL injection vulnerability in code-projects Simple Online Hotel Reservation System version 1.0, affecting the /admin/delete_pending.php file where the transaction_id parameter is unsanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to data exfiltration, modification, or deletion of the hotel reservation database. Public exploit disclosure and active threat indicators suggest this vulnerability warrants immediate patching.

PHP SQLi Remote Code Execution Simple Online Hotel Reservation System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6450 HIGH POC This Week

CVE-2025-6450 is a critical SQL injection vulnerability in code-projects Simple Online Hotel Reservation System version 1.0, affecting the /admin/confirm_reserve.php endpoint where the transaction_id parameter is inadequately sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion of the hotel reservation database. Public exploit code is available and the vulnerability meets criteria for active exploitation risk.

PHP SQLi Remote Code Execution Simple Online Hotel Reservation System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6449 HIGH POC This Week

CVE-2025-6449 is a critical SQL injection vulnerability in Simple Online Hotel Reservation System v1.0 affecting the /admin/checkout_query.php endpoint. An unauthenticated remote attacker can manipulate the 'transaction_id' parameter to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or system disruption. The vulnerability has been publicly disclosed with exploits available, and the CVSS 7.3 score reflects high impact across confidentiality, integrity, and availability despite moderate attack complexity.

PHP SQLi Remote Code Execution Simple Online Hotel Reservation System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6448 HIGH POC This Week

CVE-2025-6448 is a critical SQL injection vulnerability in code-projects Simple Online Hotel Reservation System 1.0 affecting the /admin/delete_room.php endpoint. An unauthenticated remote attacker can manipulate the room_id parameter to execute arbitrary SQL queries, potentially resulting in unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with working exploits available, making active exploitation likely.

PHP SQLi Remote Code Execution Simple Online Hotel Reservation System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6418 HIGH POC This Week

CVE-2025-6418 is a critical SQL injection vulnerability in Simple Online Hotel Reservation System 1.0 affecting the /admin/edit_query_account.php endpoint, where the 'Name' parameter is improperly sanitized, allowing remote attackers to execute arbitrary SQL queries without authentication. The vulnerability has been publicly disclosed with exploit code availability, making it a high-priority threat for organizations running this system in production; attackers can manipulate database queries to extract sensitive data, modify records, or potentially escalate privileges.

PHP SQLi Remote Code Execution Simple Online Hotel Reservation System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6363 HIGH POC This Week

CVE-2025-6363 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, specifically in the /adding-exec.php file where the 'ingname' parameter is improperly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of database records. With a CVSS score of 7.3 and network-based attack vector requiring no user interaction, this vulnerability poses significant risk to affected deployments, though real-world exploitation likelihood depends on whether POC code and active exploitation attempts are documented.

PHP SQLi Remote Code Execution Simple Pizza Ordering System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6360 HIGH POC This Week

CVE-2025-6360 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, affecting the /portal.php file's ID parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL commands, potentially compromising data confidentiality, integrity, and availability. The vulnerability has been publicly disclosed with exploit code available, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution Simple Pizza Ordering System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6357 HIGH POC This Week

CVE-2025-6357 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, specifically in the /paymentportal.php file where the 'person' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this vulnerability with no user interaction required to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion of database contents. The vulnerability has been publicly disclosed with proof-of-concept code available, increasing the likelihood of active exploitation.

PHP SQLi Remote Code Execution Simple Pizza Ordering System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-6334 HIGH This Week

CVE-2025-6334 is a critical stack-based buffer overflow vulnerability in D-Link DIR-867 1.0 routers, affecting the Query String Handler's strncpy function implementation. Remote attackers with low privileges can exploit this vulnerability to achieve complete system compromise including confidentiality, integrity, and availability breaches. The vulnerability has documented public exploits available, affects end-of-life hardware no longer receiving vendor support, and carries a high CVSS 3.1 score of 8.8.

Buffer Overflow D-Link RCE Remote Code Execution Dir 867 Firmware
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.2%
CVE-2025-6316 HIGH POC This Week

CVE-2025-6316 is a critical SQL injection vulnerability in code-projects Online Shoe Store version 1.0, specifically in the /admin/admin_running.php file where the 'qty' parameter is improperly sanitized. An unauthenticated remote attacker can exploit this flaw to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, and while the CVSS score is 7.3 (high), the attack vector is network-based with low complexity, indicating active exploitation is feasible.

PHP SQLi Remote Code Execution Online Shoe Store
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-23121 HIGH PATCH CERT-EU This Week

Remote code execution vulnerability in Backup Server that allows authenticated domain users to execute arbitrary code with high severity (CVSS 8.8). The vulnerability requires valid domain credentials but no user interaction, making it a significant risk for organizations with Backup Server deployments in Active Directory environments. If actively exploited or with public POC availability, this represents an immediate priority for patching.

RCE Remote Code Execution Authentication Bypass
NVD
CVSS 3.1
8.8
EPSS
0.6%
CVE-2025-6147 HIGH POC This Week

Critical buffer overflow vulnerability in TOTOLINK A702R router firmware (version 4.0.0-B20230721.1521) affecting the HTTP POST request handler for the /boafrm/formSysLog endpoint. An authenticated attacker can exploit this vulnerability remotely by manipulating the submit-url parameter to achieve arbitrary code execution with full system compromise (confidentiality, integrity, and availability impact). Public exploit code is available, significantly elevating real-world exploitation risk.

Buffer Overflow TP-Link Remote Code Execution A702r Firmware TOTOLINK
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.6%
CVE-2025-29902 CRITICAL Act Now

Critical remote code execution vulnerability with a perfect CVSS 10.0 score that allows unauthenticated attackers to execute arbitrary code on affected servers over the network with no user interaction required. The vulnerability stems from improper handling of code evaluation (CWE-94: Improper Control of Generation of Code) and affects systems processing untrusted input. Given the maximum CVSS severity, network attack vector, and lack of authentication requirements, this vulnerability represents an immediate and severe threat to any exposed systems and should be treated as a critical priority for patching regardless of additional context.

RCE Remote Code Execution
NVD
CVSS 3.1
10.0
EPSS
0.7%
CVE-2025-5978 HIGH POC This Week

A critical stack-based buffer overflow vulnerability exists in Tenda FH1202 firmware version 1.2.0.14 within the /goform/VirtualSer endpoint's fromVirtualSer function, triggered by unsanitized 'page' parameter manipulation. An authenticated attacker can exploit this remotely to achieve arbitrary code execution with full system compromise (confidentiality, integrity, and availability impact). Public exploit disclosure and proof-of-concept availability significantly elevate real-world exploitation risk.

Buffer Overflow Remote Code Execution Fh1202 Firmware Tenda
NVD VulDB
CVSS 3.1
8.8
EPSS
0.5%
CVE-2025-5977 HIGH POC This Week

Critical SQL injection vulnerability in code-projects School Fees Payment System version 1.0, specifically in the /datatable.php file where the sSortDir_0 parameter is improperly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially compromising confidentiality, integrity, and availability of the underlying database. The vulnerability has been publicly disclosed with exploit code available, indicating active exploitation risk.

PHP SQLi Remote Code Execution School Fees Payment System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-5969 HIGH POC This Week

Critical stack-based buffer overflow vulnerability in D-Link DIR-632 firmware version FW103B08, affecting the HTTP POST request handler in the /biurl_grou component. An authenticated attacker can remotely exploit this vulnerability to achieve arbitrary code execution with high impact on confidentiality, integrity, and availability. Public exploit code has been disclosed and the affected product is no longer maintained by D-Link, significantly increasing real-world risk.

Buffer Overflow D-Link Remote Code Execution Dir 632 Firmware
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.4%
CVE-2025-32710 HIGH This Week

Use-after-free vulnerability in Windows Remote Desktop Services (RDS) that allows unauthenticated network attackers to execute arbitrary code with high complexity requirements. The vulnerability affects Windows systems running RDS and represents a critical remote code execution risk; exploitation requires network access but no user interaction, though attack complexity is rated as high. If this CVE has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, it indicates active exploitation in the wild and should be treated as an immediate priority.

Microsoft Windows Remote Code Execution Use After Free Windows Server 2025 +6
NVD
CVSS 3.1
8.1
EPSS
0.3%
CVE-2025-5934 HIGH POC This Week

A critical stack-based buffer overflow vulnerability (CVE-2025-5934) exists in Netgear EX3700 wireless extenders up to version 1.0.0.88, affecting the sub_41619C function in the /mtd file. An authenticated attacker can remotely exploit this vulnerability to achieve complete system compromise including confidentiality, integrity, and availability breaches. Public exploit code is available, and while the affected product line is no longer supported by Netgear, immediate patching to version 1.0.0.98 is critical for active deployments.

Buffer Overflow Netgear Remote Code Execution Ex3700 Firmware
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.3%
CVE-2025-5758 HIGH POC This Week

Critical SQL injection vulnerability in SourceCodester Open Source Clinic Management System v1.0, specifically in the /doctor.php file where the 'doctorname' parameter is insufficiently sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of sensitive healthcare information. The vulnerability has public exploit disclosure and may be actively exploited.

PHP SQLi Remote Code Execution Open Source Clinic Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-5708 HIGH POC This Week

Critical SQL injection vulnerability in code-projects Real Estate Property Management System version 1.0, specifically in the /Admin/NewsReport.php file where the 'txtFrom' parameter is improperly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or denial of service. The vulnerability has been publicly disclosed with exploit code available, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution Real Estate Property Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-5685 HIGH POC This Week

Critical stack-based buffer overflow vulnerability in Tenda CH22 router firmware version 1.0.0.1, affecting the formNatlimit function in the /goform/Natlimit endpoint. An authenticated remote attacker can exploit improper input validation on the 'page' parameter to achieve arbitrary code execution with full system privileges (confidentiality, integrity, and availability compromise). Public exploit code is available and the vulnerability meets active exploitation criteria.

Buffer Overflow Remote Code Execution Ch22 Firmware Tenda
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.3%
CVE-2025-5631 HIGH POC This Week

Critical SQL injection vulnerability in the /publicposts.php file of Content Management System and News-Buzz version 1.0 by code-projects/anirbandutta9. The vulnerability allows unauthenticated remote attackers to inject arbitrary SQL commands through the 'post' parameter, potentially enabling unauthorized data access, modification, or deletion. A public exploit has been disclosed and the vulnerability is exploitable with low attack complexity, making it an active threat.

PHP SQLi Remote Code Execution Content Management System News Buzz
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-5624 CRITICAL POC Act Now

Critical stack-based buffer overflow vulnerability in D-Link DIR-816 firmware version 1.10CNB05 affecting the QoSPortSetup function. An unauthenticated remote attacker can exploit this vulnerability by manipulating port0_group, port0_remarker, ssid0_group, or ssid0_remarker parameters to achieve arbitrary code execution, complete system compromise (confidentiality, integrity, availability), and full device takeover. Public exploit code has been disclosed, increasing real-world exploitation risk significantly.

Buffer Overflow D-Link Remote Code Execution Dir 816 Firmware
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.7%
CVE-2025-5621 HIGH POC This Week

A command injection vulnerability in A vulnerability (CVSS 7.3). Risk factors: public PoC available.

Command Injection D-Link RCE Remote Code Execution Dir 816 Firmware
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
1.0%
CVE-2025-5608 HIGH POC This Week

Critical remote buffer overflow vulnerability in Tenda AC18 router firmware version 15.03.05.05, affecting the reboot timer configuration function. An authenticated attacker can exploit improper input validation on the 'rebootTime' parameter to achieve remote code execution with full system compromise (confidentiality, integrity, availability). Public exploit code exists and the vulnerability is actively exploitable with low attack complexity.

Buffer Overflow RCE Remote Code Execution Ac18 Firmware Tenda
NVD VulDB
CVSS 3.1
8.8
EPSS
0.2%
CVE-2025-5593 HIGH POC This Week

Critical buffer overflow vulnerability in the HOST Command Handler of FreeFloat FTP Server 1.0 that allows unauthenticated remote attackers to trigger a denial of service or potentially achieve code execution. The vulnerability has a disclosed public exploit and may be actively exploited in the wild. With a CVSS score of 7.3 and network-accessible attack vector, this poses significant risk to any organization running the affected FTP server without immediate patching.

Buffer Overflow Ftp Remote Code Execution Denial Of Service Freefloat Ftp Server
NVD VulDB
CVSS 3.1
7.3
EPSS
0.2%
CVE-2025-5583 HIGH POC This Week

Critical SQL injection vulnerability in CodeAstro Real Estate Management System version 1.0, specifically in the /register.php file that allows unauthenticated remote attackers to inject arbitrary SQL commands. The vulnerability enables attackers to read, modify, or delete sensitive database information including user credentials, property listings, and financial records. Public exploit code is available and the vulnerability is likely being actively exploited in the wild, making immediate patching essential for all affected installations.

PHP SQLi Remote Code Execution Real Estate Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-5551 HIGH POC This Week

Critical buffer overflow vulnerability in FreeFloat FTP Server 1.0's SYSTEM Command Handler that allows unauthenticated remote attackers to achieve information disclosure, integrity violation, and service disruption. The vulnerability has been publicly disclosed with exploit code available, making it actively exploitable in real-world environments without requiring user interaction or elevated privileges.

Buffer Overflow Ftp Remote Code Execution Denial Of Service Freefloat Ftp Server
NVD VulDB
CVSS 3.1
7.3
EPSS
0.2%
CVE-2026-4234
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL injection in SSCMS 7.4.0 via the tableHandWrite parameter in SitesAddController.Submit.cs allows authenticated remote attackers to execute arbitrary SQL commands. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early disclosure notification.

SQLi Remote Code Execution Sscms
NVD VulDB
CVE-2025-68553
EPSS 0% CVSS 9.9
CRITICAL Act Now

Unrestricted file upload in Lendiz (lendiz) WordPress theme allows uploading web shells for remote code execution.

WordPress PHP RCE +1
NVD
CVE-2026-27577
EPSS 0% CVSS 9.9
CRITICAL PATCH Act Now

Additional expression evaluation exploits in n8n before 2.10.1/2.9.3/1.123.22. Fourth distinct code execution path through the expression engine. Patch available.

RCE Remote Code Execution Code Injection +3
NVD GitHub
CVE-2025-68549
EPSS 0% CVSS 9.9
CRITICAL Act Now

Unrestricted file upload in Wiguard (wiguard) WordPress theme allows uploading web shells for remote code execution.

WordPress PHP RCE +1
NVD
CVE-2026-22769
EPSS 34% 4.5 CVSS 10.0
CRITICAL KEV PATCH THREAT Act Now

Dell RecoverPoint for Virtual Machines prior to 6.0.3.1 HF1 contains hardcoded credentials (CVE-2026-22769, CVSS 10.0) that allow unauthenticated remote attackers with knowledge of the credentials to gain root-level access to the underlying operating system. KEV-listed, this vulnerability exposes disaster recovery infrastructure to complete compromise, potentially affecting the integrity of backup and replication data.

Dell Authentication Bypass Privilege Escalation +3
NVD
CVE-2026-25053
EPSS 0% CVSS 9.9
CRITICAL PATCH Act Now

n8n has a command injection vulnerability (CVSS 9.9) allowing authenticated users to execute arbitrary OS commands through workflow definitions.

RCE Remote Code Execution Command Injection +4
NVD GitHub
CVE-2026-25049
EPSS 0% CVSS 9.9
CRITICAL PATCH Act Now

n8n workflow automation platform has an authenticated code execution vulnerability (CVSS 9.9) through improper runtime behavior modification, enabling server takeover.

RCE Remote Code Execution Command Injection +4
NVD GitHub
CVE-2025-68986
EPSS 0% CVSS 9.9
CRITICAL Act Now

Miion WordPress theme by zozothemes has an unrestricted file upload vulnerability allowing unauthenticated web shell deployment and server compromise.

WordPress PHP RCE +1
NVD
CVE-2025-68910
EPSS 0% CVSS 9.9
CRITICAL Act Now

Blogzee WordPress theme by blazethemes has an unrestricted file upload vulnerability — the fourth blazethemes product affected by the same shared vulnerable upload component.

WordPress PHP RCE +1
NVD
CVE-2025-68909
EPSS 0% CVSS 9.9
CRITICAL Act Now

Blogistic WordPress theme by blazethemes has an unrestricted file upload vulnerability enabling attackers to deploy web shells for persistent server access.

WordPress PHP RCE +1
NVD
CVE-2025-67968
EPSS 0% CVSS 9.9
CRITICAL Act Now

Real Homes CRM WordPress plugin has an unrestricted file upload allowing web shell deployment for persistent remote code execution.

WordPress PHP RCE +1
NVD
CVE-2025-62056
EPSS 0% CVSS 9.9
CRITICAL Act Now

News Event WordPress theme by blazethemes has an unrestricted file upload allowing web shell deployment and remote code execution.

WordPress PHP RCE +1
NVD
CVE-2025-62050
EPSS 0% CVSS 9.9
CRITICAL Act Now

Blogmatic WordPress theme by blazethemes has an unrestricted file upload vulnerability allowing attackers to upload web shells for persistent server access.

WordPress PHP RCE +1
NVD
CVE-2025-64090
EPSS 0% CVSS 10.0
CRITICAL Act Now

Command injection via the hostname field allowing authenticated code execution with maximum CVSS 10.0 and scope change.

Command Injection RCE Remote Code Execution +2
NVD
CVE-2026-21877
EPSS 12% CVSS 9.9
CRITICAL PATCH Act Now

n8n workflow automation (through 1.121.2) allows authenticated users to execute arbitrary code via the n8n service, with scope change enabling full compromise of both self-hosted and cloud instances. EPSS 12.5% indicates high exploitation activity. Patch available.

RCE Remote Code Execution Code Injection +2
NVD GitHub
CVE-2025-31048
EPSS 0% CVSS 9.9
CRITICAL Act Now

Themify Shopo WordPress theme (through 1.1.4) allows authenticated users to upload web shells. Despite requiring low-level authentication, the scope change to CVSS 9.9 means any subscriber account can achieve full server compromise.

WordPress PHP RCE +1
NVD
CVE-2025-7612
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7612 is a critical SQL injection vulnerability in code-projects Mobile Shop 1.0 affecting the /login.php file's email parameter, allowing remote unauthenticated attackers to execute arbitrary SQL queries and potentially extract or modify sensitive data. The vulnerability has been publicly disclosed with exploit code available, making it actively exploitable in the wild. With a CVSS score of 7.3 and demonstrated public PoC availability, this represents an immediate threat to deployments of this product.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7609
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7609 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /register.php endpoint via the ruser_email parameter. An unauthenticated remote attacker can exploit this to read, modify, or delete database contents, potentially compromising user data and application integrity. Public exploit code exists, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7608
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7608 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /userlogin.php endpoint's user_email parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially extract, modify, or delete database contents. The vulnerability has been publicly disclosed with proof-of-concept exploit code available, and while the CVSS score is 7.3 (moderate-to-high severity), the low attack complexity and lack of authentication requirements make this a high-priority exploit target for threat actors.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7587
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7587 is a critical SQL injection vulnerability in code-projects Online Appointment Booking System version 1.0, affecting the /cover.php endpoint where uname and psw parameters are not properly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to data exfiltration, authentication bypass, and database manipulation. The vulnerability has been publicly disclosed with working exploits available, making active exploitation highly probable in the wild.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7528
EPSS 0% CVSS 8.8
HIGH POC This Week

CVE-2025-7528 is a critical stack-based buffer overflow vulnerability in Tenda FH1202 firmware version 1.2.0.14(408) affecting the /goform/GstDhcpSetSer endpoint. An authenticated attacker can remotely exploit this vulnerability by manipulating the 'dips' parameter to achieve arbitrary code execution with full system compromise (confidentiality, integrity, and availability impact). The vulnerability has public exploit code available and meets criteria for active exploitation risk.

Buffer Overflow Remote Code Execution Fh1202 Firmware +1
NVD GitHub VulDB
CVE-2025-7515
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7515 is a critical SQL injection vulnerability in code-projects Online Appointment Booking System version 1.0, specifically in the /ulocateus.php file where the 'doctorname' parameter is insufficiently sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of database contents. The vulnerability has been publicly disclosed with proof-of-concept code available, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7509
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7509 is a critical SQL injection vulnerability in code-projects Modern Bag 1.0 affecting the /admin/slide.php endpoint via the idSlide parameter. An unauthenticated remote attacker can exploit this with no user interaction to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7475
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7475 is a critical SQL injection vulnerability in code-projects Simple Car Rental System version 1.0, located in the /pay.php file where the 'mpesa' parameter is insufficiently sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of database records. The vulnerability has been publicly disclosed with proof-of-concept availability, indicating active exploitation risk in real-world deployments.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7467
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7467 is a critical SQL injection vulnerability in code-projects Modern Bag version 1.0 affecting the /product-detail.php file's ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially exfiltrate, modify, or delete database contents. The vulnerability has been publicly disclosed with exploit code available, and the CVSS 7.3 score reflects moderate-to-high real-world impact with low attack complexity and no authentication requirements.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-47812
EPSS 93% 7.8 CVSS 10.0
CRITICAL POC KEV THREAT Emergency

Wing FTP Server before 7.4.4 contains a critical remote code execution vulnerability (CVE-2025-47812, CVSS 10.0) through null byte injection in user/admin web interfaces that enables arbitrary Lua code execution in session files. With EPSS 92.7% and KEV listing, this vulnerability guarantees unauthenticated root/SYSTEM code execution on affected servers, as the FTP service runs with maximum privileges by default.

RCE Code Injection Ftp +3
NVD Exploit-DB
CVE-2025-6565
EPSS 0% CVSS 8.8
HIGH POC This Week

CVE-2025-6565 is a critical stack-based buffer overflow vulnerability in Netgear WNCE3001 v1.0.0.50 affecting the HTTP POST request handler's Host parameter processing. An authenticated attacker can remotely exploit this to achieve complete system compromise including confidentiality, integrity, and availability violations. Public exploitation code exists, elevating immediate risk.

Buffer Overflow Netgear Remote Code Execution
NVD GitHub VulDB
CVE-2025-6501
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6501 is a critical SQL injection vulnerability in code-projects Inventory Management System 1.0 affecting the /php_action/createCategories.php file, where the 'categoriesStatus' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Public exploit disclosure and proof-of-concept availability indicate active threat potential with low barrier to exploitation.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6481
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6481 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System 1.0 affecting the /update.php file's ID parameter, allowing unauthenticated remote attackers to manipulate database queries and potentially extract, modify, or delete sensitive data. The vulnerability has been publicly disclosed with proof-of-concept availability, significantly increasing exploitation risk in production environments. With a CVSS score of 7.3 and low attack complexity, this represents an immediate threat to any organization running the affected version without patches.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6479
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6479 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System 1.0 affecting the /salesreport.php file parameter 'dayfrom'. An unauthenticated attacker can remotely execute arbitrary SQL queries with no user interaction required, potentially enabling data exfiltration, modification, or deletion. The vulnerability has been publicly disclosed with exploit proof-of-concept availability, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6468
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6468 is a critical SQL injection vulnerability in code-projects Online Bidding System version 1.0 affecting the /bidnow.php file's ID parameter. An unauthenticated remote attacker can exploit this vulnerability to read, modify, or delete database contents, potentially compromising confidentiality, integrity, and availability of the entire bidding system. The vulnerability has been publicly disclosed with proof-of-concept code available, significantly increasing exploitation risk in active deployments.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6458
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6458 is a critical SQL injection vulnerability in code-projects Online Hotel Reservation System version 1.0, affecting the /admin/execedituser.php endpoint. An unauthenticated remote attacker can manipulate the 'userid' parameter to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, making it actively exploitable in the wild.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6457
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6457 is a critical SQL injection vulnerability in code-projects Online Hotel Reservation System 1.0 affecting the /reservation/demo.php file, where the 'Start' parameter is unsanitized and directly used in database queries. An unauthenticated remote attacker can exploit this vulnerability to read, modify, or delete sensitive database content including guest information, reservations, and payment data. The vulnerability has been publicly disclosed with exploit code available, though specific EPSS probability and KEV/CISA inclusion status cannot be determined from provided data.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6451
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6451 is a critical SQL injection vulnerability in code-projects Simple Online Hotel Reservation System version 1.0, affecting the /admin/delete_pending.php file where the transaction_id parameter is unsanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to data exfiltration, modification, or deletion of the hotel reservation database. Public exploit disclosure and active threat indicators suggest this vulnerability warrants immediate patching.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6450
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6450 is a critical SQL injection vulnerability in code-projects Simple Online Hotel Reservation System version 1.0, affecting the /admin/confirm_reserve.php endpoint where the transaction_id parameter is inadequately sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion of the hotel reservation database. Public exploit code is available and the vulnerability meets criteria for active exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6449
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6449 is a critical SQL injection vulnerability in Simple Online Hotel Reservation System v1.0 affecting the /admin/checkout_query.php endpoint. An unauthenticated remote attacker can manipulate the 'transaction_id' parameter to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or system disruption. The vulnerability has been publicly disclosed with exploits available, and the CVSS 7.3 score reflects high impact across confidentiality, integrity, and availability despite moderate attack complexity.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6448
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6448 is a critical SQL injection vulnerability in code-projects Simple Online Hotel Reservation System 1.0 affecting the /admin/delete_room.php endpoint. An unauthenticated remote attacker can manipulate the room_id parameter to execute arbitrary SQL queries, potentially resulting in unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with working exploits available, making active exploitation likely.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6418
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6418 is a critical SQL injection vulnerability in Simple Online Hotel Reservation System 1.0 affecting the /admin/edit_query_account.php endpoint, where the 'Name' parameter is improperly sanitized, allowing remote attackers to execute arbitrary SQL queries without authentication. The vulnerability has been publicly disclosed with exploit code availability, making it a high-priority threat for organizations running this system in production; attackers can manipulate database queries to extract sensitive data, modify records, or potentially escalate privileges.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6363
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6363 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, specifically in the /adding-exec.php file where the 'ingname' parameter is improperly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of database records. With a CVSS score of 7.3 and network-based attack vector requiring no user interaction, this vulnerability poses significant risk to affected deployments, though real-world exploitation likelihood depends on whether POC code and active exploitation attempts are documented.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6360
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6360 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, affecting the /portal.php file's ID parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL commands, potentially compromising data confidentiality, integrity, and availability. The vulnerability has been publicly disclosed with exploit code available, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6357
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6357 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, specifically in the /paymentportal.php file where the 'person' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this vulnerability with no user interaction required to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion of database contents. The vulnerability has been publicly disclosed with proof-of-concept code available, increasing the likelihood of active exploitation.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-6334
EPSS 0% CVSS 8.8
HIGH This Week

CVE-2025-6334 is a critical stack-based buffer overflow vulnerability in D-Link DIR-867 1.0 routers, affecting the Query String Handler's strncpy function implementation. Remote attackers with low privileges can exploit this vulnerability to achieve complete system compromise including confidentiality, integrity, and availability breaches. The vulnerability has documented public exploits available, affects end-of-life hardware no longer receiving vendor support, and carries a high CVSS 3.1 score of 8.8.

Buffer Overflow D-Link RCE +2
NVD GitHub VulDB
CVE-2025-6316
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-6316 is a critical SQL injection vulnerability in code-projects Online Shoe Store version 1.0, specifically in the /admin/admin_running.php file where the 'qty' parameter is improperly sanitized. An unauthenticated remote attacker can exploit this flaw to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, and while the CVSS score is 7.3 (high), the attack vector is network-based with low complexity, indicating active exploitation is feasible.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-23121
EPSS 1% CVSS 8.8
HIGH PATCH This Week

Remote code execution vulnerability in Backup Server that allows authenticated domain users to execute arbitrary code with high severity (CVSS 8.8). The vulnerability requires valid domain credentials but no user interaction, making it a significant risk for organizations with Backup Server deployments in Active Directory environments. If actively exploited or with public POC availability, this represents an immediate priority for patching.

RCE Remote Code Execution Authentication Bypass
NVD
CVE-2025-6147
EPSS 1% CVSS 8.8
HIGH POC This Week

Critical buffer overflow vulnerability in TOTOLINK A702R router firmware (version 4.0.0-B20230721.1521) affecting the HTTP POST request handler for the /boafrm/formSysLog endpoint. An authenticated attacker can exploit this vulnerability remotely by manipulating the submit-url parameter to achieve arbitrary code execution with full system compromise (confidentiality, integrity, and availability impact). Public exploit code is available, significantly elevating real-world exploitation risk.

Buffer Overflow TP-Link Remote Code Execution +2
NVD GitHub VulDB
CVE-2025-29902
EPSS 1% CVSS 10.0
CRITICAL Act Now

Critical remote code execution vulnerability with a perfect CVSS 10.0 score that allows unauthenticated attackers to execute arbitrary code on affected servers over the network with no user interaction required. The vulnerability stems from improper handling of code evaluation (CWE-94: Improper Control of Generation of Code) and affects systems processing untrusted input. Given the maximum CVSS severity, network attack vector, and lack of authentication requirements, this vulnerability represents an immediate and severe threat to any exposed systems and should be treated as a critical priority for patching regardless of additional context.

RCE Remote Code Execution
NVD
CVE-2025-5978
EPSS 1% CVSS 8.8
HIGH POC This Week

A critical stack-based buffer overflow vulnerability exists in Tenda FH1202 firmware version 1.2.0.14 within the /goform/VirtualSer endpoint's fromVirtualSer function, triggered by unsanitized 'page' parameter manipulation. An authenticated attacker can exploit this remotely to achieve arbitrary code execution with full system compromise (confidentiality, integrity, and availability impact). Public exploit disclosure and proof-of-concept availability significantly elevate real-world exploitation risk.

Buffer Overflow Remote Code Execution Fh1202 Firmware +1
NVD VulDB
CVE-2025-5977
EPSS 0% CVSS 7.3
HIGH POC This Week

Critical SQL injection vulnerability in code-projects School Fees Payment System version 1.0, specifically in the /datatable.php file where the sSortDir_0 parameter is improperly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially compromising confidentiality, integrity, and availability of the underlying database. The vulnerability has been publicly disclosed with exploit code available, indicating active exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-5969
EPSS 0% CVSS 8.8
HIGH POC This Week

Critical stack-based buffer overflow vulnerability in D-Link DIR-632 firmware version FW103B08, affecting the HTTP POST request handler in the /biurl_grou component. An authenticated attacker can remotely exploit this vulnerability to achieve arbitrary code execution with high impact on confidentiality, integrity, and availability. Public exploit code has been disclosed and the affected product is no longer maintained by D-Link, significantly increasing real-world risk.

Buffer Overflow D-Link Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-32710
EPSS 0% CVSS 8.1
HIGH This Week

Use-after-free vulnerability in Windows Remote Desktop Services (RDS) that allows unauthenticated network attackers to execute arbitrary code with high complexity requirements. The vulnerability affects Windows systems running RDS and represents a critical remote code execution risk; exploitation requires network access but no user interaction, though attack complexity is rated as high. If this CVE has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, it indicates active exploitation in the wild and should be treated as an immediate priority.

Microsoft Windows Remote Code Execution +8
NVD
CVE-2025-5934
EPSS 0% CVSS 8.8
HIGH POC This Week

A critical stack-based buffer overflow vulnerability (CVE-2025-5934) exists in Netgear EX3700 wireless extenders up to version 1.0.0.88, affecting the sub_41619C function in the /mtd file. An authenticated attacker can remotely exploit this vulnerability to achieve complete system compromise including confidentiality, integrity, and availability breaches. Public exploit code is available, and while the affected product line is no longer supported by Netgear, immediate patching to version 1.0.0.98 is critical for active deployments.

Buffer Overflow Netgear Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-5758
EPSS 0% CVSS 7.3
HIGH POC This Week

Critical SQL injection vulnerability in SourceCodester Open Source Clinic Management System v1.0, specifically in the /doctor.php file where the 'doctorname' parameter is insufficiently sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of sensitive healthcare information. The vulnerability has public exploit disclosure and may be actively exploited.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-5708
EPSS 0% CVSS 7.3
HIGH POC This Week

Critical SQL injection vulnerability in code-projects Real Estate Property Management System version 1.0, specifically in the /Admin/NewsReport.php file where the 'txtFrom' parameter is improperly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or denial of service. The vulnerability has been publicly disclosed with exploit code available, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-5685
EPSS 0% CVSS 8.8
HIGH POC This Week

Critical stack-based buffer overflow vulnerability in Tenda CH22 router firmware version 1.0.0.1, affecting the formNatlimit function in the /goform/Natlimit endpoint. An authenticated remote attacker can exploit improper input validation on the 'page' parameter to achieve arbitrary code execution with full system privileges (confidentiality, integrity, and availability compromise). Public exploit code is available and the vulnerability meets active exploitation criteria.

Buffer Overflow Remote Code Execution Ch22 Firmware +1
NVD GitHub VulDB
CVE-2025-5631
EPSS 0% CVSS 7.3
HIGH POC This Week

Critical SQL injection vulnerability in the /publicposts.php file of Content Management System and News-Buzz version 1.0 by code-projects/anirbandutta9. The vulnerability allows unauthenticated remote attackers to inject arbitrary SQL commands through the 'post' parameter, potentially enabling unauthorized data access, modification, or deletion. A public exploit has been disclosed and the vulnerability is exploitable with low attack complexity, making it an active threat.

PHP SQLi Remote Code Execution +2
NVD GitHub VulDB
CVE-2025-5624
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

Critical stack-based buffer overflow vulnerability in D-Link DIR-816 firmware version 1.10CNB05 affecting the QoSPortSetup function. An unauthenticated remote attacker can exploit this vulnerability by manipulating port0_group, port0_remarker, ssid0_group, or ssid0_remarker parameters to achieve arbitrary code execution, complete system compromise (confidentiality, integrity, availability), and full device takeover. Public exploit code has been disclosed, increasing real-world exploitation risk significantly.

Buffer Overflow D-Link Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-5621
EPSS 1% CVSS 7.3
HIGH POC This Week

A command injection vulnerability in A vulnerability (CVSS 7.3). Risk factors: public PoC available.

Command Injection D-Link RCE +2
NVD GitHub VulDB
CVE-2025-5608
EPSS 0% CVSS 8.8
HIGH POC This Week

Critical remote buffer overflow vulnerability in Tenda AC18 router firmware version 15.03.05.05, affecting the reboot timer configuration function. An authenticated attacker can exploit improper input validation on the 'rebootTime' parameter to achieve remote code execution with full system compromise (confidentiality, integrity, availability). Public exploit code exists and the vulnerability is actively exploitable with low attack complexity.

Buffer Overflow RCE Remote Code Execution +2
NVD VulDB
CVE-2025-5593
EPSS 0% CVSS 7.3
HIGH POC This Week

Critical buffer overflow vulnerability in the HOST Command Handler of FreeFloat FTP Server 1.0 that allows unauthenticated remote attackers to trigger a denial of service or potentially achieve code execution. The vulnerability has a disclosed public exploit and may be actively exploited in the wild. With a CVSS score of 7.3 and network-accessible attack vector, this poses significant risk to any organization running the affected FTP server without immediate patching.

Buffer Overflow Ftp Remote Code Execution +2
NVD VulDB
CVE-2025-5583
EPSS 0% CVSS 7.3
HIGH POC This Week

Critical SQL injection vulnerability in CodeAstro Real Estate Management System version 1.0, specifically in the /register.php file that allows unauthenticated remote attackers to inject arbitrary SQL commands. The vulnerability enables attackers to read, modify, or delete sensitive database information including user credentials, property listings, and financial records. Public exploit code is available and the vulnerability is likely being actively exploited in the wild, making immediate patching essential for all affected installations.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-5551
EPSS 0% CVSS 7.3
HIGH POC This Week

Critical buffer overflow vulnerability in FreeFloat FTP Server 1.0's SYSTEM Command Handler that allows unauthenticated remote attackers to achieve information disclosure, integrity violation, and service disruption. The vulnerability has been publicly disclosed with exploit code available, making it actively exploitable in real-world environments without requiring user interaction or elevated privileges.

Buffer Overflow Ftp Remote Code Execution +2
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy