Latest Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,876 CVEs tracked 53,708 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,663 vendors 43,954 researchers
53,708 results Clear all
CVE-2024-38773 9.3 CRITICAL 1 PoC Analysis EPSS 0.00
Formlift For Infusionsoft Web Forms < 7.5.18 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Adrian Tobey FormLift for Infusionsoft Web Forms allows Blind SQL Injection.This issue affects FormLift for Infusionsoft Web Forms: from n/a through 7.5.17.
CWE-89 Jul 22, 2024
CVE-2024-4367 8.8 HIGH SSVC PoC 26 PoCs Analysis EPSS 0.35
Mozilla Firefox < 115.11.0 - Improper Condition Check
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
CWE-754 May 14, 2024
CVE-2024-45496 9.9 CRITICAL 4 PoCs Analysis EPSS 0.00
OpenShift - Privilege Escalation
A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.
CWE-269 Sep 17, 2024
CVE-2024-7387 9.1 CRITICAL SSVC PoC 4 PoCs Analysis EPSS 0.01
Openshift Builder - Path Traversal
A flaw was found in openshift/builder. This vulnerability allows command injection via path traversal, where a malicious user can execute arbitrary commands on the OpenShift node running the builder container. When using the “Docker” strategy, executable files inside the privileged build container can be overridden using the `spec.source.secrets.secret.destinationDir` attribute of the `BuildConfig` definition. An attacker running code in a privileged container could escalate their permissions on the node running the container.
CWE-250 Sep 17, 2024
CVE-2024-2083 9.9 CRITICAL SSVC PoC 1 PoC 1 Writeup Analysis EPSS 0.01
Zenml < 0.55.5 - Path Traversal
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
CWE-29 Apr 16, 2024
CVE-2024-30498 9.3 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.17
Crmperks Crm Perks Forms < 1.1.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CRM Perks CRM Perks Forms.This issue affects CRM Perks Forms: from n/a through 1.1.4.
CWE-89 Mar 29, 2024
CVE-2024-30502 9.3 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.18
Wptravelengine WP Travel Engine < 5.8.0 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel Engine.This issue affects WP Travel Engine: from n/a through 5.7.9.
CWE-89 Mar 29, 2024
CVE-2024-43425 8.1 HIGH 9 PoCs Analysis NUCLEI EPSS 0.89
Moodle Remote Code Execution (CVE-2024-43425)
A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.
CWE-94 Nov 07, 2024
CVE-2024-25096 10.0 CRITICAL 2 PoCs Analysis EPSS 0.01
Canto <3.0.7 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Canto Inc. Canto allows Code Injection.This issue affects Canto: from n/a through 3.0.7.
CWE-94 Apr 03, 2024
CVE-2024-3912 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
ASUS Router - RCE
Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.
CWE-434 Jun 14, 2024
CVE-2024-47175 8.6 HIGH SSVC PoC 1 PoC 1 Writeup Analysis EPSS 0.33
CUPS - RCE
CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
CWE-20 Sep 26, 2024
CVE-2024-47076 8.6 HIGH SSVC PoC 2 PoCs Analysis EPSS 0.74
CUPS - Info Disclosure
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
CWE-20 Sep 26, 2024
CVE-2024-34102 9.8 CRITICAL KEV SSVC ACTIVE 27 PoCs Analysis NUCLEI EPSS 0.94
CosmicSting: Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow in the iconv() function of glibc (CVE-2024-2961)
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
CWE-611 Jun 13, 2024
CVE-2024-30850 8.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.80
Chaos RAT XSS to RCE
Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2024-33434. Reason: This record is a duplicate of CVE-2024-33434. Notes: All CVE users should reference CVE-2024-33434 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
CWE-77 Apr 12, 2024
CVE-2024-2997 2.4 LOW 5 PoCs Analysis EPSS 0.06
Bdtask Multi-Store Inventory Management System <20240320 - XSS
A vulnerability was found in Bdtask Multi-Store Inventory Management System up to 20240320. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument Category Name/Model Name/Brand Name/Unit Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258199. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-79 Mar 27, 2024
CVE-2024-10835 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.01
Dbgpt Db-gpt < 0.7.1 - SQL Injection
In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write using DuckDB SQL, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE).
CWE-89 Mar 20, 2025
CVE-2024-13902 2.4 LOW SSVC PoC 1 PoC EPSS 0.00
Huang-yk Student-manage - Code Injection
A vulnerability, which was classified as problematic, was found in huang-yk student-manage 1.0. This affects an unknown part of the component Edit a Student Information Page. The manipulation of the argument Class leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-94 Mar 06, 2025
CVE-2024-13022 6.3 MEDIUM SSVC PoC 1 PoC EPSS 0.00
Taisan Tarzan-cms 1.0.0 - Unrestricted Upload
A vulnerability, which was classified as critical, was found in taisan tarzan-cms 1.0.0. This affects the function UploadResponse of the file src/main/java/com/tarzan/cms/modules/admin/controller/common/UploadController.java of the component Article Management. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-284 Dec 29, 2024
CVE-2024-11175 3.5 LOW SSVC PoC 1 PoC 1 Writeup EPSS 0.00
Publiccms - Code Injection
A vulnerability was found in Public CMS 5.202406.d and classified as problematic. This issue affects some unknown processing of the file /admin/cmsVote/save of the component Voting Management. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named b9530b9cc1f5cfdad4b637874f59029a6283a65c. It is recommended to apply a patch to fix this issue.
CWE-94 Nov 13, 2024
CVE-2024-11070 3.5 LOW SSVC PoC 1 PoC EPSS 0.00
Publiccms - Code Injection
A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS 5.202406.d. This issue affects some unknown processing of the file /admin/cmsTagType/save of the component Tag Type Handler. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-94 Nov 11, 2024