Latest Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,876 CVEs tracked 53,708 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,663 vendors 43,954 researchers
53,708 results Clear all
CVE-2024-56348 4.3 MEDIUM 2 PoCs Analysis EPSS 0.00
Jetbrains Teamcity < 2024.12 - Incorrect Authorization
In JetBrains TeamCity before 2024.12 improper access control allowed viewing details of unauthorized agents
CWE-863 Dec 20, 2024
CVE-2024-36991 7.5 HIGH EXPLOITED SSVC PoC 13 PoCs Analysis NUCLEI EPSS 0.94
Splunk < 9.0.10 - Path Traversal
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
CWE-22 Jul 01, 2024
CVE-2024-27304 9.8 CRITICAL 2 PoCs Analysis EPSS 0.02
pgx <4.18.2, <5.5.4 - SQL Injection
pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.
CWE-190 Mar 06, 2024
CVE-2024-25081 4.2 MEDIUM 1 PoC Analysis EPSS 0.00
FontForge <20230101 - Command Injection
Splinefont in FontForge through 20230101 allows command injection via crafted filenames.
CWE-77 Feb 26, 2024
CVE-2024-48510 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.02
Mihula Prodotnetzip < 1.19.0 - Path Traversal
Directory Traversal vulnerability in DotNetZip v.1.16.0 and before allows a remote attacker to execute arbitrary code via the src/Zip.Shared/ZipEntry.Extract.cs component NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-22 Nov 13, 2024
CVE-2024-56410 5.4 MEDIUM SSVC PoC 1 PoC 1 Writeup Analysis EPSS 0.01
PhpSpreadsheet <3.7.0, 2.3.5, 2.1.6, 1.29.7 - XSS
PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 have a cross-site scripting (XSS) vulnerability in custom properties. The HTML page is generated without clearing custom properties. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue.
CWE-79 Jan 03, 2025
CVE-2024-53677 9.8 CRITICAL EXPLOITED SSVC PoC 22 PoCs Analysis EPSS 0.93
Apache Struts < 6.4.0 - Unrestricted File Upload
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
CWE-434 Dec 11, 2024
CVE-2024-23222 8.8 HIGH KEV SSVC ACTIVE 3 PoCs Analysis EPSS 0.01
Apple Tvos < 17.3 - Type Confusion
A type confusion issue was addressed with improved checks. This issue is fixed in Safari 17.3, iOS 15.8.7 and iPadOS 15.8.7, iOS 16.7.5 and iPadOS 16.7.5, iOS 17.3 and iPadOS 17.3, macOS Monterey 12.7.3, macOS Sonoma 14.3, macOS Ventura 13.6.4, tvOS 17.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. This fix associated with the Coruna exploit was shipped in iOS 17.3 on January 22, 2024. This update brings that fix to devices that cannot update to the latest iOS version.
CWE-843 Jan 23, 2024
CVE-2024-14027 ANALYSIS PENDING 1 PoC Analysis EPSS 0.00
Linux Kernel - Memory Corruption
In the Linux kernel, the following vulnerability has been resolved: fs/xattr: missing fdput() in fremovexattr error path In the Linux kernel, the fremovexattr() syscall calls fdget() to acquire a file reference but returns early without calling fdput() when strncpy_from_user() fails on the name argument. In multi-threaded processes where fdget() takes the slow path, this permanently leaks one file reference per call, pinning the struct file and associated kernel objects in memory. An unprivileged local user can exploit this to cause kernel memory exhaustion. The issue was inadvertently fixed by commit a71874379ec8 ("xattr: switch to CLASS(fd)").
Mar 09, 2026
CVE-2024-47176 5.3 MEDIUM EXPLOITED SSVC PoC 18 PoCs Analysis NUCLEI EPSS 0.88
CUPS - SSRF
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
CWE-1327 Sep 26, 2024
CVE-2024-3495 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.93
Country State City Dropdown CF7 <2.7.2 - SQL Injection
The Country State City Dropdown CF7 plugin for WordPress is vulnerable to SQL Injection via the ‘cnt’ and 'sid' parameters in versions up to, and including, 2.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 22, 2024
CVE-2024-21762 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 13 PoCs Analysis EPSS 0.93
Fortinet Fortiproxy < 2.0.14 - Out-of-Bounds Write
A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests
CWE-787 Feb 09, 2024
CVE-2024-32002 9.0 CRITICAL SSVC PoC 73 PoCs Analysis EPSS 0.80
Git <2.45.1-2.39.4 - Code Injection
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
CWE-22 May 14, 2024
CVE-2024-21338 7.8 HIGH KEV SSVC ACTIVE RANSOMWARE 11 PoCs Analysis EPSS 0.79
Windows Kernel - Privilege Escalation
Windows Kernel Elevation of Privilege Vulnerability
CWE-822 Feb 13, 2024
CVE-2024-43144 9.3 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.23
StylemixThemes Cost Calculator <3.2.15 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StylemixThemes Cost Calculator Builder allows SQL Injection.This issue affects Cost Calculator Builder: from n/a through 3.2.15.
CWE-89 Aug 29, 2024
CVE-2024-27198 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.93
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
CWE-288 Mar 04, 2024
CVE-2024-51428 7.5 HIGH 2 PoCs Analysis EPSS 0.00
Espressif Esp-idf - Resource Allocation Without Limits
An issue in Espressif Esp idf v5.3.0 allows attackers to cause a Denial of Service (DoS) via a crafted data channel packet.
CWE-770 Nov 07, 2024
CVE-2024-34064 5.4 MEDIUM 7 PoCs 1 Writeup Analysis EPSS 0.01
Jinja - XSS
Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.
CWE-79 May 06, 2024
CVE-2024-22393 9.1 CRITICAL 3 PoCs Analysis EPSS 0.27
Apache Answer <1.2.1 - DoS
Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. Pixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user can cause such an attack by uploading an image when posting content. Users are recommended to upgrade to version [1.2.5], which fixes the issue.
CWE-434 Feb 22, 2024
CVE-2024-31317 7.8 HIGH 13 PoCs Analysis EPSS 0.07
Google Android - Insecure Deserialization
In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
CWE-502 Jul 09, 2024