Vulnerabilities Exploited in the Wild with Public PoC

Updated 7m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
2,390 results Clear all
CVE-2024-1212 10.0 CRITICAL KEV 7 PoCs Analysis NUCLEI EPSS 0.94
Progress Loadmaster < 7.2.48.10 - OS Command Injection
Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
CWE-78 Feb 21, 2024
CVE-2024-10924 9.8 CRITICAL EXPLOITED 25 PoCs Analysis NUCLEI EPSS 0.94
WordPress Really Simple SSL Plugin Authentication Bypass to RCE
The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
CWE-306 Nov 15, 2024
CVE-2024-10571 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.87
Ays-pro Chartify < 2.9.6 - Remote File Inclusion
The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-98 Nov 14, 2024
CVE-2024-9465 9.1 CRITICAL KEV 5 PoCs Analysis NUCLEI EPSS 0.94
Paloaltonetworks Expedition < 1.2.96 - SQL Injection
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
CWE-89 Oct 09, 2024
CVE-2024-9463 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
Paloaltonetworks Expedition < 1.2.96 - OS Command Injection
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
CWE-78 Oct 09, 2024
CVE-2024-10914 8.1 HIGH EXPLOITED 17 PoCs Analysis NUCLEI EPSS 0.94
Dlink Dns-320 Firmware - Command Injection
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CWE-78 Nov 06, 2024
CVE-2024-49039 8.8 HIGH KEV RANSOMWARE 2 PoCs Analysis EPSS 0.64
Microsoft Windows 10 1507 < 10.0.10240.20826 - Authentication Bypass
Windows Task Scheduler Elevation of Privilege Vulnerability
CWE-287 Nov 12, 2024
CVE-2024-43451 6.5 MEDIUM KEV RANSOMWARE 1 PoC Analysis EPSS 0.90
NTLM Hash Disclosure Spoofing - Info Disclosure
NTLM Hash Disclosure Spoofing Vulnerability
CWE-73 Nov 12, 2024
CVE-2024-12856 7.2 HIGH EXPLOITED 1 PoC Analysis EPSS 0.74
Four-faith F3x36 Firmware - OS Command Injection
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
CWE-78 Dec 27, 2024
CVE-2024-43093 7.3 HIGH KEV 1 PoC EPSS 0.00
Java - Privilege Escalation
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CWE-176 Nov 13, 2024
CVE-2024-51567 10.0 CRITICAL KEV RANSOMWARE 5 PoCs Analysis NUCLEI EPSS 0.94
CyberPanel Multi CVE Pre-auth RCE
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CWE-306 Oct 29, 2024
CVE-2024-39713 8.6 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
Rocket.chat < 6.10.1 - SSRF
A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1.
CWE-918 Aug 05, 2024
CVE-2024-5910 9.8 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.91
Palo Alto Expedition Remote Code Execution (CVE-2024-5910 and CVE-2024-9464)
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.
CWE-306 Jul 10, 2024
CVE-2024-36991 7.5 HIGH EXPLOITED 13 PoCs Analysis NUCLEI EPSS 0.94
Splunk < 9.0.10 - Path Traversal
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
CWE-22 Jul 01, 2024
CVE-2024-48217 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.01
SiSMART v7.4.0 - Privilege Escalation
An Insecure Direct Object Reference (IDOR) in the dashboard of SiSMART v7.4.0 allows attackers to execute a horizontal-privilege escalation.
CWE-639 Nov 01, 2024
CVE-2024-44258 7.1 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.02
Apple Ipados < 17.7.1 - Symlink Following
This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1, tvOS 18.1, visionOS 2.1. Restoring a maliciously crafted backup file may lead to modification of protected system files.
CWE-59 Oct 28, 2024
CVE-2024-21894 9.8 CRITICAL EXPLOITED 1 PoC EPSS 0.09
Ivanti Connect Secure - Out-of-Bounds Write
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code
CWE-703 Apr 04, 2024
CVE-2024-51568 10.0 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.93
CyberPanel <2.3.5 - Command Injection
CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters.
CWE-78 Oct 29, 2024
CVE-2024-37383 6.1 MEDIUM KEV 4 PoCs Analysis EPSS 0.64
Roundcube Webmail < 1.5.7 - XSS
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.
CWE-79 Jun 07, 2024
CVE-2024-47575 9.8 CRITICAL KEV 12 PoCs Analysis NUCLEI EPSS 0.94
Fortinet FortiManager <7.6.0 - RCE
A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
CWE-306 Oct 23, 2024