Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
2,390 results Clear all
CVE-2024-38100 7.8 HIGH EXPLOITED 1 PoC EPSS 0.31
Windows File Explorer - Privilege Escalation
Windows File Explorer Elevation of Privilege Vulnerability
CWE-284 Jul 09, 2024
CVE-2024-0582 7.8 HIGH EXPLOITED 9 PoCs Analysis EPSS 0.01
Linux Kernel - Memory Corruption
A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CWE-416 Jan 16, 2024
CVE-2024-23108 10.0 CRITICAL EXPLOITED RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.90
Fortinet FortiSIEM - OS Command Injection
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet allows attacker to execute unauthorized code or commands via via crafted API requests.
CWE-78 Feb 05, 2024
CVE-2024-53704 9.8 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
Sonicwall Sonicos < 7.1.1-7058 - Authentication Bypass
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
CWE-287 Jan 09, 2025
CVE-2024-57727 7.5 HIGH KEV RANSOMWARE 3 PoCs Analysis NUCLEI EPSS 0.94
SimpleHelp Path Traversal Vulnerability CVE-2024-57727
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
CWE-22 Jan 15, 2025
CVE-2024-21413 9.8 CRITICAL KEV 35 PoCs Analysis EPSS 0.93
Microsoft 365 Apps - Improper Input Validation
Microsoft Outlook Remote Code Execution Vulnerability
CWE-20 Feb 13, 2024
CVE-2024-48455 2.7 LOW EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.63
Netis Router Exploit Chain Reactor (CVE-2024-48455, CVE-2024-48456 and CVE-2024-48457).
An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component.
Jan 06, 2025
CVE-2024-45195 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
Apache OFBiz <18.12.16 - Info Disclosure
Direct Request ('Forced Browsing') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.16. Users are recommended to upgrade to version 18.12.16, which fixes the issue.
CWE-425 Sep 04, 2024
CVE-2024-29059 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
.NET Framework - Leaking ObjRefs via HTTP .NET Remoting
.NET Framework Information Disclosure Vulnerability
CWE-209 Mar 23, 2024
CVE-2024-6298 10.0 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.35
ABB ASPECT Enterprise, NEXUS Series, MATRIX Series <3.08.01 - Unauthorized File Access
Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01 ; MATRIX Series v3.08.01 allows Attacker to execute arbitrary code remotely
CWE-1287 Jul 05, 2024
CVE-2024-42448 9.9 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis EPSS 0.61
VSPC - RCE
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
CWE-94 Dec 12, 2024
CVE-2024-6205 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
PayPlus Payment Gateway <6.6.9 - SQL Injection
The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
CWE-89 Jul 19, 2024
CVE-2024-13375 9.8 CRITICAL EXPLOITED 1 PoC EPSS 0.11
Adifier System <3.1.7 - Privilege Escalation
The Adifier System plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.1.7. This is due to the plugin not properly validating a user's identity prior to updating their details like password through the adifier_recover() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CWE-620 Jan 18, 2025
CVE-2024-50603 10.0 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Aviatrix Controller < 7.1.4191 - OS Command Injection
An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
CWE-78 Jan 08, 2025
CVE-2024-55591 9.8 CRITICAL KEV RANSOMWARE 10 PoCs Analysis NUCLEI EPSS 0.94
Fortinet Fortiproxy < 7.0.20 - Authentication Bypass
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
CWE-288 Jan 14, 2025
CVE-2024-41713 9.1 CRITICAL KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Mitel Micollab < 9.8.1.201 - Path Traversal
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations.
CWE-22 Oct 21, 2024
CVE-2024-3393 7.5 HIGH KEV 2 PoCs EPSS 0.78
Palo Alto Networks PAN-OS - DoS
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
CWE-754 Dec 27, 2024
CVE-2024-11305 6.3 MEDIUM EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.46
Altenergy Power Control Software <20241108 - SQL Injection
A vulnerability classified as critical was found in Altenergy Power Control Software up to 20241108. This vulnerability affects the function get_status_zigbee of the file /index.php/display/status_zigbee. The manipulation of the argument date leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-74 Nov 18, 2024
CVE-2024-48307 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Jeecg Boot - SQL Injection
JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.
CWE-89 Oct 31, 2024
CVE-2024-12356 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) unauthenticated Remote Code Execution
A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user.
CWE-77 Dec 17, 2024