Vulnerabilities Exploited in the Wild with Public PoC
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2024-50967
6.5
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.38
Becon DATAGerry <2.2.0 - Info Disclosure
The /rest/rights/ REST API endpoint in Becon DATAGerry through 2.2.0 contains an Incorrect Access Control vulnerability. An attacker can remotely access this endpoint without authentication, leading to unauthorized disclosure of sensitive information.
CWE-862
Jan 17, 2025
CVE-2024-54085
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.43
AMI's SPx - Auth Bypass
AMI’s SPx contains
a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
CWE-290
Mar 11, 2025
CVE-2024-48914
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.92
Vendure Asset-server-plugin < 2.3.3 - Path Traversal
Vendure is an open-source headless commerce platform. Prior to versions 3.0.5 and 2.3.3, a vulnerability in Vendure's asset server plugin allows an attacker to craft a request which is able to traverse the server file system and retrieve the contents of arbitrary files, including sensitive data such as configuration files, environment variables, and other critical data stored on the server. In the same code path is an additional vector for crashing the server via a malformed URI. Patches are available in versions 3.0.5 and 2.3.3. Some workarounds are also available. One may use object storage rather than the local file system, e.g. MinIO or S3, or define middleware which detects and blocks requests with urls containing `/../`.
CWE-20
Oct 15, 2024
CVE-2024-0692
8.8
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.78
SolarWinds Security Event Manager - RCE
The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
CWE-502
Mar 01, 2024
CVE-2024-21407
8.1
HIGH
EXPLOITED
RANSOMWARE
1 PoC
EPSS 0.06
Microsoft Windows 10 1507 < 10.0.10240.20526 - Use After Free
Windows Hyper-V Remote Code Execution Vulnerability
CWE-416
Mar 12, 2024
CVE-2024-42009
9.3
CRITICAL
KEV
6 PoCs
Analysis
NUCLEI
EPSS 0.91
Roundcube Webmail < 1.5.8 - XSS
A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.
CWE-79
Aug 05, 2024
CVE-2024-52301
7.5
HIGH
EXPLOITED
4 PoCs
Analysis
EPSS 0.66
Laravel - Info Disclosure
Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs.
CWE-88
Nov 12, 2024
CVE-2024-50498
10.0
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.92
Lubus WP Query Console < 1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Ajit Bohra WP Query Console wp-query-console allows Code Injection.This issue affects WP Query Console: from n/a through <= 1.0.
CWE-94
Oct 28, 2024
CVE-2024-46982
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
EPSS 0.49
Vercel Next.js < 13.5.7 - IDOR
Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.
CWE-639
Sep 17, 2024
CVE-2024-43360
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.63
Zoneminder < 1.36.34 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.
CWE-89
Aug 12, 2024
CVE-2024-29972
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Zyxel NAS326 <V5.21(AAZF.17)C0 - Command Injection
** UNSUPPORTED WHEN ASSIGNED **
The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
CWE-78
Jun 04, 2024
CVE-2024-27292
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Docassemble - Local File Inclusion
Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.
CWE-706
Mar 21, 2024
CVE-2024-31839
4.8
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.85
CHAOS 5.0.1 - XSS
Cross Site Scripting vulnerability in tiagorlampert CHAOS v.5.0.1 allows a remote attacker to escalate privileges via the sendCommandHandler function in the handler.go component.
CWE-79
Apr 12, 2024
CVE-2024-30850
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.80
Chaos RAT XSS to RCE
Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2024-33434. Reason: This record is a duplicate of CVE-2024-33434. Notes: All CVE users should reference CVE-2024-33434 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
CWE-77
Apr 12, 2024
CVE-2024-56145
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Craft CMS Twig Template Injection RCE via FTP Templates Path
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue.
CWE-94
Dec 18, 2024
CVE-2024-9047
9.8
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Iptanus Wordpress File Upload < 4.24.12 - Path Traversal
The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
CWE-22
Oct 12, 2024
CVE-2024-46506
10.0
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
Unauthenticated RCE in NetAlertX
NetAlertX 23.01.14 through 24.x before 24.10.12 allows unauthenticated command injection via settings update because function=savesettings lacks an authentication requirement, as exploited in the wild in May 2025. This is related to settings.php and util.php.
CWE-306
May 13, 2025
CVE-2024-48766
8.6
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.78
Netalertx < 24.10.12 - Path Traversal
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
CWE-22
May 13, 2025
CVE-2024-11120
9.8
CRITICAL
KEV
1 PoC
EPSS 0.66
Geovision Gv-vs12 Firmware - OS Command Injection
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
CWE-78
Nov 15, 2024
CVE-2024-38475
9.1
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache HTTP Server <2.4.59 - RCE
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.
Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
CWE-116
Jul 01, 2024