Vulnerabilities Exploited in the Wild with Public PoC
Updated 7m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2024-1212
10.0
CRITICAL
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Progress Loadmaster < 7.2.48.10 - OS Command Injection
Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
CWE-78
Feb 21, 2024
CVE-2024-10924
9.8
CRITICAL
EXPLOITED
25 PoCs
Analysis
NUCLEI
EPSS 0.94
WordPress Really Simple SSL Plugin Authentication Bypass to RCE
The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
CWE-306
Nov 15, 2024
CVE-2024-10571
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.87
Ays-pro Chartify < 2.9.6 - Remote File Inclusion
The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-98
Nov 14, 2024
CVE-2024-9465
9.1
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Paloaltonetworks Expedition < 1.2.96 - SQL Injection
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
CWE-89
Oct 09, 2024
CVE-2024-9463
7.5
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Paloaltonetworks Expedition < 1.2.96 - OS Command Injection
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
CWE-78
Oct 09, 2024
CVE-2024-10914
8.1
HIGH
EXPLOITED
17 PoCs
Analysis
NUCLEI
EPSS 0.94
Dlink Dns-320 Firmware - Command Injection
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CWE-78
Nov 06, 2024
CVE-2024-49039
8.8
HIGH
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.64
Microsoft Windows 10 1507 < 10.0.10240.20826 - Authentication Bypass
Windows Task Scheduler Elevation of Privilege Vulnerability
CWE-287
Nov 12, 2024
CVE-2024-43451
6.5
MEDIUM
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.90
NTLM Hash Disclosure Spoofing - Info Disclosure
NTLM Hash Disclosure Spoofing Vulnerability
CWE-73
Nov 12, 2024
CVE-2024-12856
7.2
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.74
Four-faith F3x36 Firmware - OS Command Injection
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
CWE-78
Dec 27, 2024
CVE-2024-43093
7.3
HIGH
KEV
1 PoC
EPSS 0.00
Java - Privilege Escalation
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CWE-176
Nov 13, 2024
CVE-2024-51567
10.0
CRITICAL
KEV
RANSOMWARE
5 PoCs
Analysis
NUCLEI
EPSS 0.94
CyberPanel Multi CVE Pre-auth RCE
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CWE-306
Oct 29, 2024
CVE-2024-39713
8.6
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
Rocket.chat < 6.10.1 - SSRF
A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1.
CWE-918
Aug 05, 2024
CVE-2024-5910
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.91
Palo Alto Expedition Remote Code Execution (CVE-2024-5910 and CVE-2024-9464)
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition.
Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.
CWE-306
Jul 10, 2024
CVE-2024-36991
7.5
HIGH
EXPLOITED
13 PoCs
Analysis
NUCLEI
EPSS 0.94
Splunk < 9.0.10 - Path Traversal
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
CWE-22
Jul 01, 2024
CVE-2024-48217
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.01
SiSMART v7.4.0 - Privilege Escalation
An Insecure Direct Object Reference (IDOR) in the dashboard of SiSMART v7.4.0 allows attackers to execute a horizontal-privilege escalation.
CWE-639
Nov 01, 2024
CVE-2024-44258
7.1
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.02
Apple Ipados < 17.7.1 - Symlink Following
This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1, tvOS 18.1, visionOS 2.1. Restoring a maliciously crafted backup file may lead to modification of protected system files.
CWE-59
Oct 28, 2024
CVE-2024-21894
9.8
CRITICAL
EXPLOITED
1 PoC
EPSS 0.09
Ivanti Connect Secure - Out-of-Bounds Write
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code
CWE-703
Apr 04, 2024
CVE-2024-51568
10.0
CRITICAL
EXPLOITED
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.93
CyberPanel <2.3.5 - Command Injection
CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters.
CWE-78
Oct 29, 2024
CVE-2024-37383
6.1
MEDIUM
KEV
4 PoCs
Analysis
EPSS 0.64
Roundcube Webmail < 1.5.7 - XSS
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.
CWE-79
Jun 07, 2024
CVE-2024-47575
9.8
CRITICAL
KEV
12 PoCs
Analysis
NUCLEI
EPSS 0.94
Fortinet FortiManager <7.6.0 - RCE
A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
CWE-306
Oct 23, 2024