Vulnerabilities Exploited in the Wild with Public PoC

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
2,390 results Clear all
CVE-2024-36104 9.1 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Apache OFBiz <18.12.14 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14. Users are recommended to upgrade to version 18.12.14, which fixes the issue.
CWE-22 Jun 04, 2024
CVE-2024-23897 9.8 CRITICAL KEV RANSOMWARE 56 PoCs Analysis NUCLEI EPSS 0.94
Jenkins cli Ampersand Replacement Arbitrary File Read
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
CWE-22 Jan 24, 2024
CVE-2024-38193 7.8 HIGH KEV 4 PoCs Analysis EPSS 0.73
Windows Ancillary Function Driver - Privilege Escalation
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CWE-416 Aug 13, 2024
CVE-2024-38189 8.8 HIGH KEV 1 PoC EPSS 0.44
Microsoft Project < - RCE
Microsoft Project Remote Code Execution Vulnerability
CWE-20 Aug 13, 2024
CVE-2024-36971 7.8 HIGH KEV 1 PoC Analysis EPSS 0.00
Debian Linux < 4.19.316 - Use After Free
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets.
CWE-416 Jun 10, 2024
CVE-2024-32113 9.8 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
Apache OFBiz <18.12.13 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13. Users are recommended to upgrade to version 18.12.13, which fixes the issue.
CWE-22 May 08, 2024
CVE-2024-29895 10.0 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
Cacti 1.3.x DEV - Command Injection
Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.
CWE-77 May 14, 2024
CVE-2024-5057 9.3 CRITICAL EXPLOITED 1 PoC NUCLEI EPSS 0.64
Awesomemotive Easy Digital Downloads < 3.2.12 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12.
CWE-89 Aug 29, 2024
CVE-2024-37085 6.8 MEDIUM KEV RANSOMWARE 4 PoCs Analysis EPSS 0.72
Vmware Esxi < 5.2 - Authentication Bypass
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
CWE-305 Jun 25, 2024
CVE-2024-5217 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
ServiceNow - RCE
ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
CWE-184 Jul 10, 2024
CVE-2024-4879 9.8 CRITICAL KEV 11 PoCs Analysis NUCLEI EPSS 0.94
ServiceNow - RCE
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
CWE-1287 Jul 10, 2024
CVE-2024-7014 8.1 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.18
Telegram < 10.14.5 - Improper Input Validation
EvilVideo vulnerability allows sending malicious apps disguised as videos in Telegram for Android application affecting versions 10.14.4 and older.
CWE-20 Jul 23, 2024
CVE-2024-6387 8.1 HIGH EXPLOITED 101 PoCs Analysis EPSS 0.55
OpenSSH - DoS
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CWE-364 Jul 01, 2024
CVE-2024-34102 9.8 CRITICAL KEV 27 PoCs Analysis NUCLEI EPSS 0.94
CosmicSting: Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow in the iconv() function of glibc (CVE-2024-2961)
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
CWE-611 Jun 13, 2024
CVE-2024-28995 8.6 HIGH KEV 14 PoCs Analysis NUCLEI EPSS 0.94
SolarWinds Serv-U - Directory Traversal
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
CWE-22 Jun 06, 2024
CVE-2024-36401 9.8 CRITICAL KEV 26 PoCs Analysis NUCLEI EPSS 0.94
Geoserver unauthenticated Remote Code Execution
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.
CWE-95 Jul 01, 2024
CVE-2024-38112 7.5 HIGH KEV 1 PoC Analysis EPSS 0.93
Windows MSHTML - SSRF
Windows MSHTML Platform Spoofing Vulnerability
CWE-451 Jul 09, 2024
CVE-2024-38080 7.8 HIGH KEV 1 PoC Analysis EPSS 0.21
Windows Hyper-V - Privilege Escalation
Windows Hyper-V Elevation of Privilege Vulnerability
CWE-190 Jul 09, 2024
CVE-2024-38526 7.2 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.83
pdoc <14.5.1 - Open Redirect
pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.
CWE-1395 Jun 26, 2024
CVE-2024-23692 9.8 CRITICAL KEV RANSOMWARE 17 PoCs Analysis NUCLEI EPSS 0.94
Rejetto HTTP File Server - Template injection
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
CWE-1336 May 31, 2024