Vulnerabilities Exploited in the Wild with Public PoC

Updated 6m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
2,390 results Clear all
CVE-2024-55956 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.91
Cleo LexiCom, VLTrader, and Harmony Unauthenticated Remote Code Execution
In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.
CWE-77 Dec 13, 2024
CVE-2024-35250 7.8 HIGH KEV 8 PoCs Analysis EPSS 0.57
Windows Kernel-Mode Driver - Privilege Escalation
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CWE-822 Jun 11, 2024
CVE-2024-20767 7.4 HIGH KEV 7 PoCs Analysis NUCLEI EPSS 0.94
CVE-2024-20767 - Adobe Coldfusion Arbitrary File Read
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
CWE-284 Mar 18, 2024
CVE-2024-53677 9.8 CRITICAL EXPLOITED 22 PoCs Analysis EPSS 0.93
Apache Struts < 6.4.0 - Unrestricted File Upload
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
CWE-434 Dec 11, 2024
CVE-2024-50623 9.8 CRITICAL KEV RANSOMWARE 5 PoCs Analysis NUCLEI EPSS 0.94
Cleo Harmony < 5.8.0.21 - Unrestricted File Upload
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution.
CWE-434 Oct 28, 2024
CVE-2024-11972 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.91
Hunk Companion WP <1.9.0 - Auth Bypass
The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.
Dec 31, 2024
CVE-2024-49138 7.8 HIGH KEV 10 PoCs Analysis EPSS 0.85
Microsoft Windows 10 1507 < 10.0.10240.20857 - Heap Buffer Overflow
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE-122 Dec 12, 2024
CVE-2024-35286 9.8 CRITICAL EXPLOITED 1 PoC NUCLEI EPSS 0.64
Mitel Micollab < 9.8.0.33 - SQL Injection
A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations.
CWE-89 Oct 21, 2024
CVE-2024-3378 4.3 MEDIUM EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.03
iboss Secure Web Gateway <10.1 - XSS
A vulnerability has been found in iboss Secure Web Gateway up to 10.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login of the component Login Portal. The manipulation of the argument redirectUrl leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.2.0.160 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-259501 was assigned to this vulnerability.
CWE-79 Apr 06, 2024
CVE-2024-12209 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.89
WP Umbrella: Update Backup Restore & Monitoring <= 2.17.0 - Local File Inclusion
The WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-98 Dec 08, 2024
CVE-2024-51211 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.04
Os4ed Opensis - SQL Injection
SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands.
CWE-89 Nov 08, 2024
CVE-2024-45507 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Apache OFBiz <18.12.16 - SSRF/Code Injection
Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.16. Users are recommended to upgrade to version 18.12.16, which fixes the issue.
CWE-918 Sep 04, 2024
CVE-2024-39914 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Fogproject < 1.5.10.41 - Command Injection
FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34.
CWE-77 Jul 12, 2024
CVE-2024-51378 10.0 CRITICAL KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Cyberpanel < 2.3.8 - OS Command Injection
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CWE-78 Oct 29, 2024
CVE-2024-11680 9.8 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.94
ProjectSend <r1720 - Auth Bypass
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
CWE-306 Nov 26, 2024
CVE-2024-10400 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Themeum Tutor Lms < 2.7.6 - SQL Injection
The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the ‘rating_filter’ parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Nov 21, 2024
CVE-2024-44308 8.8 HIGH KEV 1 PoC Analysis EPSS 0.02
Debian Linux < 18.1.1 - Denial of Service
The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.
Nov 20, 2024
CVE-2024-26229 7.8 HIGH EXPLOITED 10 PoCs Analysis EPSS 0.83
Microsoft Windows 10 1507 < 10.0.10240.20596 - Heap Buffer Overflow
Windows CSC Service Elevation of Privilege Vulnerability
CWE-122 Apr 09, 2024
CVE-2024-9474 7.2 HIGH KEV RANSOMWARE 10 PoCs Analysis NUCLEI EPSS 0.94
Paloaltonetworks Pan-os < 10.1.14 - OS Command Injection
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
CWE-78 Nov 18, 2024
CVE-2024-0012 9.8 CRITICAL KEV RANSOMWARE 14 PoCs Analysis NUCLEI EPSS 0.94
Paloaltonetworks Pan-os - Missing Authentication
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
CWE-306 Nov 18, 2024