Vulnerabilities Exploited in the Wild with Public PoC
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2024-1561
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
gradio-app/gradio - Info Disclosure
An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.
CWE-29
Apr 16, 2024
CVE-2024-29269
8.8
HIGH
EXPLOITED
8 PoCs
Analysis
NUCLEI
EPSS 0.93
Telesquare TLR-2005KSH - Remote Command Execution
An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
CWE-77
Apr 10, 2024
CVE-2024-6670
9.8
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.94
WhatsUp Gold SQL Injection (CVE-2024-6670)
In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.
CWE-89
Aug 29, 2024
CVE-2024-2961
7.3
HIGH
EXPLOITED
16 PoCs
Analysis
NUCLEI
EPSS 0.92
GNU C Library <2.39 - Buffer Overflow
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
CWE-787
Apr 17, 2024
CVE-2024-7339
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Provision-isr Sh-4050a5-5l(mm) Firmware - Information Disclosure
A vulnerability has been found in TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM) and AVISION DVR AV108T and classified as problematic. This vulnerability affects unknown code of the file /queryDevInfo. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273262 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-200
Aug 01, 2024
CVE-2024-8190
7.2
HIGH
KEV
2 PoCs
Analysis
EPSS 0.91
Ivanti Cloud Services Appliance <4.6.518 - Command Injection
An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.
CWE-78
Sep 10, 2024
CVE-2024-8529
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.70
WordPress LearnPress Unauthenticated SQLi (CVE-2024-8522, CVE-2024-8529)
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_fields' parameter of the /wp-json/lp/v1/courses/archive-course REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Sep 12, 2024
CVE-2024-8522
10.0
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.88
LearnPress - WordPress LMS Plugin <4.2.7 - SQL Injection
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Sep 12, 2024
CVE-2024-7120
6.3
MEDIUM
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Raisecom Msg2300 Firmware - OS Command Injection
A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
CWE-78
Jul 26, 2024
CVE-2024-8277
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.52
WooCommerce Photo Reviews Premium <1.3.13.2 - Auth Bypass
The WooCommerce Photo Reviews Premium plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.3.13.2. This is due to the plugin not properly validating what user transient is being used in the login() function and not properly verifying the user's identity. This makes it possible for unauthenticated attackers to log in as user that has dismissed an admin notice in the past 30 days, which is often an administrator. Alternatively, a user can log in as any user with any transient that has a valid user_id as the value, though it would be more difficult to exploit this successfully.
CWE-306
Sep 11, 2024
CVE-2024-6473
7.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.03
Yandex Browser <24.7.1.380 - DLL Hijacking
Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used.
CWE-426
Sep 03, 2024
CVE-2024-7928
4.3
MEDIUM
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.92
Fastadmin < 1.3.4.20220530 - Path Traversal
A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.
CWE-22
Aug 19, 2024
CVE-2024-7965
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.27
Google Chrome < 128.0.6613.84 - Out-of-Bounds Write
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-358
Aug 21, 2024
CVE-2024-7029
8.8
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.93
Avtech Avm1203 Firmware - Command Injection
Commands can be injected over the network and executed without authentication.
CWE-77
Aug 02, 2024
CVE-2024-38856
9.8
CRITICAL
KEV
14 PoCs
Analysis
EPSS 0.94
Apache OFBiz forgotPassword/ProgramExport RCE
Incorrect Authorization vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: through 18.12.14.
Users are recommended to upgrade to version 18.12.15, which fixes the issue.
Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the screen definitions don't explicitly check user's permissions because they rely on the configuration of their endpoints).
CWE-863
Aug 05, 2024
CVE-2024-7971
9.6
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.01
Google Chrome < 128.0.6613.84 - Type Confusion
Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843
Aug 21, 2024
CVE-2024-43917
9.3
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.90
WordPress TI WooCommerce Wishlist SQL Injection (CVE-2024-43917)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2.
CWE-89
Aug 29, 2024
CVE-2024-39717
7.2
HIGH
KEV
1 PoC
Analysis
EPSS 0.05
Versa-networks Versa Director - Unrestricted File Upload
The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in.
CWE-434
Aug 22, 2024
CVE-2024-37032
8.8
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Ollama < 0.1.34 - Path Traversal
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
CWE-22
May 31, 2024
CVE-2024-28000
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.92
WordPress LiteSpeed Cache - Unauthenticated Privilege Escalation to Admin
Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache.This issue affects LiteSpeed Cache: from n/a through <= 6.3.0.1.
CWE-266
Aug 21, 2024