Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,708 results
Clear all
CVE-2024-45337
9.1
CRITICAL
4 PoCs
Analysis
EPSS 0.30
Misused connection.serverAuthenticate - Auth Bypass
Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/[email protected] enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.
Dec 12, 2024
CVE-2024-34351
7.5
HIGH
6 PoCs
Analysis
NUCLEI
EPSS 0.93
Next.js - SSRF
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.
CWE-918
May 14, 2024
CVE-2024-25082
6.5
MEDIUM
4 PoCs
Analysis
EPSS 0.02
FontForge <20230101 - Command Injection
Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed files.
CWE-77
Feb 26, 2024
CVE-2024-47823
9.8
CRITICAL
SSVC PoC
1 PoC
1 Writeup
Analysis
EPSS 0.00
Livewire <2.12.7-3.5.2 - Code Injection
Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-434
Oct 08, 2024
CVE-2024-27766
5.7
MEDIUM
SSVC PoC
2 PoCs
Analysis
EPSS 0.31
MariaDB <11.1 - RCE
An issue in MariaDB v.11.1 allows a remote attacker to execute arbitrary code via the lib_mysqludf_sys.so function. NOTE: this is disputed by the MariaDB Foundation because no privilege boundary is crossed.
CWE-94
Oct 17, 2024
CVE-2024-56426
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Samsung Mobile/Wearable Processor - Buffer Overflow
An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, W920, W930, W1000. The lack of a length check leads to out-of-bounds writes via malformed USB packets to the target.
CWE-787
Nov 04, 2025
CVE-2024-29988
8.8
HIGH
KEV
SSVC ACTIVE
2 PoCs
Analysis
EPSS 0.63
SmartScreen Prompt - Privilege Escalation
SmartScreen Prompt Security Feature Bypass Vulnerability
CWE-693
Apr 09, 2024
CVE-2024-49138
7.8
HIGH
KEV
SSVC ACTIVE
10 PoCs
Analysis
EPSS 0.85
Microsoft Windows 10 1507 < 10.0.10240.20857 - Heap Buffer Overflow
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE-122
Dec 12, 2024
CVE-2024-56325
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.22
Apache Pinot < 1.3.0 - Authentication Bypass
Authentication Bypass Issue
If the path does not contain / and contain., authentication is not required.
Expected Normal Request and Response Example
curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users
Return: {"code":401,"error":"HTTP 401 Unauthorized"}
Malicious Request and Response Example
curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .
Return: {"users":{}}
A new user gets added bypassing authentication, enabling the user to control Pinot.
CWE-288
Apr 01, 2025
CVE-2024-6387
8.1
HIGH
EXPLOITED
SSVC PoC
101 PoCs
Analysis
EPSS 0.58
OpenSSH - DoS
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CWE-364
Jul 01, 2024
CVE-2024-11680
9.8
CRITICAL
KEV
SSVC ACTIVE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
ProjectSend <r1720 - Auth Bypass
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
CWE-306
Nov 26, 2024
CVE-2024-27348
9.8
CRITICAL
KEV
SSVC ACTIVE
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache HugeGraph-Server - Remote Command Execution
RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11
Users are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue.
CWE-284
Apr 22, 2024
CVE-2024-0582
7.8
HIGH
EXPLOITED
9 PoCs
Analysis
EPSS 0.01
Linux Kernel - Memory Corruption
A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CWE-416
Jan 16, 2024
CVE-2024-21410
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
EPSS 0.05
Microsoft Exchange Server - Authentication Bypass
Microsoft Exchange Server Elevation of Privilege Vulnerability
CWE-287
Feb 13, 2024
CVE-2024-36039
6.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
PyMySQL <1.1.0 - SQL Injection
PyMySQL through 1.1.0 allows SQL injection if used with untrusted JSON input because keys are not escaped by escape_dict.
CWE-89
May 21, 2024
CVE-2024-47611
MEDIUM
1 PoC
1 Writeup
Analysis
EPSS 0.00
XZ Utils <5.6.2 - Command Injection
XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, the characters are converted to similar-looking characters with best-fit mapping. Some best-fit mappings result in ASCII characters that change the meaning of the command line, which can be exploited with malicious filenames to do argument injection or directory traversal attacks. This vulnerability is fixed in 5.6.3. Command line tools built for Cygwin or MSYS2 are unaffected. liblzma is unaffected.
CWE-176
Oct 02, 2024
CVE-2024-52302
HIGH
3 PoCs
Analysis
EPSS 0.04
common-user-management - RCE
common-user-management is a robust Spring Boot application featuring user management services designed to control user access dynamically. There is a critical security vulnerability in the application endpoint /api/v1/customer/profile-picture. This endpoint allows file uploads without proper validation or restrictions, enabling attackers to upload malicious files that can lead to Remote Code Execution (RCE).
CWE-434
Nov 14, 2024
CVE-2024-30051
7.8
HIGH
KEV
SSVC ACTIVE
RANSOMWARE
2 PoCs
Analysis
EPSS 0.44
Windows DWM Core Library - Privilege Escalation
Windows DWM Core Library Elevation of Privilege Vulnerability
CWE-122
May 14, 2024
CVE-2024-2473
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.16
WPS Hide Login <= 1.9.15.2 - Login Page Disclosure
The WPS Hide Login plugin for WordPress is vulnerable to Login Page Disclosure in all versions up to, and including, 1.9.15.2. This is due to a bypass that is created when the 'action=postpass' parameter is supplied. This makes it possible for attackers to easily discover any login page that may have been hidden by the plugin.
CWE-863
Jun 11, 2024
CVE-2024-42210
7.6
HIGH
1 PoC
Analysis
EPSS 0.00
HCL Unica Marketing Operations v12.1.8 and lower is affected by a Stored cross-site scripting (XSS) vulnerability
A Stored cross-site scripting (XSS) vulnerability affects HCL Unica Marketing Operations v12.1.8 and lower. Stored cross-site scripting (also known as second-order or persistent XSS) arises when an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way.
CWE-79
Mar 19, 2026