Latest Vulnerabilities with Public Exploits
Updated 39m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,708 results
Clear all
CVE-2024-48455
2.7
LOW
EXPLOITED
SSVC PoC
2 PoCs
Analysis
NUCLEI
EPSS 0.63
Netis Router Exploit Chain Reactor (CVE-2024-48455, CVE-2024-48456 and CVE-2024-48457).
An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component.
Jan 06, 2025
CVE-2024-9474
7.2
HIGH
KEV
SSVC ACTIVE
RANSOMWARE
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Paloaltonetworks Pan-os < 10.1.14 - OS Command Injection
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
CWE-78
Nov 18, 2024
CVE-2024-5910
9.8
CRITICAL
KEV
SSVC ACTIVE
4 PoCs
Analysis
NUCLEI
EPSS 0.91
Palo Alto Expedition Remote Code Execution (CVE-2024-5910 and CVE-2024-9464)
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition.
Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.
CWE-306
Jul 10, 2024
CVE-2024-24809
8.5
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.90
Traccar - Unrestricted File Upload
Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix `device.` under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue.
CWE-27
Apr 10, 2024
CVE-2024-30088
7.0
HIGH
KEV
SSVC ACTIVE
RANSOMWARE
9 PoCs
Analysis
EPSS 0.89
Windows Kernel - Privilege Escalation
Windows Kernel Elevation of Privilege Vulnerability
CWE-367
Jun 11, 2024
CVE-2024-23897
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
56 PoCs
Analysis
NUCLEI
EPSS 0.94
Jenkins cli Ampersand Replacement Arbitrary File Read
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
CWE-22
Jan 24, 2024
CVE-2024-3408
9.8
CRITICAL
EXPLOITED
SSVC PoC
2 PoCs
Analysis
NUCLEI
EPSS 0.91
D-Tale RCE
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the application fails to properly restrict custom filter queries, enabling attackers to execute arbitrary code on the server by bypassing the restriction on the `/update-settings` endpoint, even when `enable_custom_filters` is not enabled. This vulnerability allows attackers to bypass authentication mechanisms and execute remote code on the server.
CWE-94
Jun 06, 2024
CVE-2024-28185
10.0
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.65
Judge0 - Code Injection
Judge0 is an open-source online code execution system. The application does not account for symlinks placed inside the sandbox directory, which can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox. When executing a submission, Judge0 writes a `run_script` to the sandbox directory. The security issue is that an attacker can create a symbolic link (symlink) at the path `run_script` before this code is executed, resulting in the `f.write` writing to an arbitrary file on the unsandboxed system. An attacker can leverage this vulnerability to overwrite scripts on the system and gain code execution outside of the sandbox.
CWE-59
Apr 18, 2024
CVE-2024-21893
8.2
HIGH
KEV
SSVC ACTIVE
RANSOMWARE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti SAML - Server Side Request Forgery (SSRF)
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
CWE-918
Jan 31, 2024
CVE-2024-21888
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.61
Ivanti Connect Secure - Improper Privilege Management
A privilege escalation vulnerability in web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a user to elevate privileges to that of an administrator.
CWE-269
Jan 31, 2024
CVE-2024-21887
9.1
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) - Command Injection
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
CWE-77
Jan 12, 2024
CVE-2024-1086
7.8
HIGH
KEV
SSVC ACTIVE
RANSOMWARE
12 PoCs
Analysis
EPSS 0.86
Linux Kernel < 5.15.149 - Use After Free
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.
We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
CWE-416
Jan 31, 2024
CVE-2024-32114
8.5
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.02
Apache ActiveMQ 6.x - Info Disclosure
In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located).
It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST API).
To mitigate, users can update the default conf/jetty.xml configuration file to add authentication requirement:
<bean id="securityConstraintMapping" class="org.eclipse.jetty.security.ConstraintMapping">
<property name="constraint" ref="securityConstraint" />
<property name="pathSpec" value="/" />
</bean>
Or we encourage users to upgrade to Apache ActiveMQ 6.1.2 where the default configuration has been updated with authentication by default.
CWE-1188
May 02, 2024
CVE-2024-3400
10.0
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
49 PoCs
Analysis
NUCLEI
EPSS 0.94
Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.
Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
CWE-20
Apr 12, 2024
CVE-2024-46987
7.7
HIGH
SSVC PoC
11 PoCs
Analysis
EPSS 0.24
Tuzitio Camaleon Cms < 2.8.2 - Information Disclosure
Camaleon CMS is a dynamic and advanced content management system based on Ruby on Rails. A path traversal vulnerability accessible via MediaController's download_private_file method allows authenticated users to download any file on the web server Camaleon CMS is running on (depending on the file permissions). This issue may lead to Information Disclosure. This issue has been addressed in release version 2.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-22
Sep 18, 2024
CVE-2024-42009
9.3
CRITICAL
KEV
SSVC ACTIVE
6 PoCs
Analysis
NUCLEI
EPSS 0.91
Roundcube Webmail < 1.5.8 - XSS
A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.
CWE-79
Aug 05, 2024
CVE-2024-12029
9.8
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.44
Pypi Invokeai < 5.4.3rc2 - Insecure Deserialization
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.
CWE-502
Mar 20, 2025
CVE-2024-5836
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Google Chrome <126.0.6478.54 - RCE
Inappropriate Implementation in DevTools in Google Chrome prior to 126.0.6478.54 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: High)
CWE-474
Jun 11, 2024
CVE-2024-26229
7.8
HIGH
EXPLOITED
SSVC PoC
10 PoCs
Analysis
EPSS 0.86
Microsoft Windows 10 1507 < 10.0.10240.20596 - Heap Buffer Overflow
Windows CSC Service Elevation of Privilege Vulnerability
CWE-122
Apr 09, 2024
CVE-2024-49019
7.8
HIGH
SSVC PoC
3 PoCs
Analysis
EPSS 0.05
Active Directory Certificate Services - Privilege Escalation
Active Directory Certificate Services Elevation of Privilege Vulnerability
CWE-1390
Nov 12, 2024