Latest Vulnerabilities with Public Exploits

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,876 CVEs tracked 53,708 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,663 vendors 43,954 researchers
53,708 results Clear all
CVE-2024-3807 8.8 HIGH EXPLOITED RANSOMWARE 1 PoC EPSS 0.06
Porto theme <7.1.0 - Code Injection
The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via 'porto_page_header_shortcode_type', 'slideshow_type' and 'post_layout' post meta. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. This was partially patched in version 7.1.0 and fully patched in version 7.1.1.
CWE-98 May 14, 2024
CVE-2024-3806 9.8 CRITICAL EXPLOITED RANSOMWARE 3 PoCs Analysis EPSS 0.59
Porto theme for WordPress <7.1.0 - Local File Inclusion
The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
CWE-98 May 14, 2024
CVE-2024-29895 10.0 CRITICAL EXPLOITED SSVC PoC 6 PoCs Analysis NUCLEI EPSS 0.93
Cacti 1.3.x DEV - Command Injection
Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.
CWE-77 May 14, 2024
CVE-2024-32113 9.8 CRITICAL KEV SSVC ACTIVE 8 PoCs Analysis NUCLEI EPSS 0.94
Apache OFBiz <18.12.13 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13. Users are recommended to upgrade to version 18.12.13, which fixes the issue.
CWE-22 May 08, 2024
CVE-2024-2876 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.91
Wordpress Email Subscribers by Icegram Express - SQL Injection
The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'run' function of the 'IG_ES_Subscribers_Query' class in all versions up to, and including, 5.7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 02, 2024
CVE-2024-4040 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 22 PoCs Analysis NUCLEI EPSS 0.94
CrushFTP <10.7.1-11.1.0 - RCE
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
CWE-1336 Apr 22, 2024
CVE-2024-31982 10.0 CRITICAL EXPLOITED SSVC PoC 6 PoCs Analysis NUCLEI EPSS 0.94
XWiki Platform <4.10.20,15.5.4,15.10-rc-1 - RCE
XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.
CWE-95 Apr 10, 2024
CVE-2024-29269 8.8 HIGH EXPLOITED SSVC PoC 8 PoCs Analysis NUCLEI EPSS 0.93
Telesquare TLR-2005KSH - Remote Command Execution
An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
CWE-77 Apr 10, 2024
CVE-2024-27972 9.9 CRITICAL EXPLOITED 1 PoC EPSS 0.15
Very Good Plugins WP Fusion Lite <3.41.24 - Command Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Jack Arturo WP Fusion Lite wp-fusion-lite.This issue affects WP Fusion Lite: from n/a through <= 3.41.24.
CWE-94 Apr 03, 2024
CVE-2024-27956 9.9 CRITICAL EXPLOITED 19 PoCs Analysis NUCLEI EPSS 0.94
WordPress Automatic Plugin <= 3.92.0 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
CWE-89 Mar 21, 2024
CVE-2024-1071 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
WordPress Ultimate Member SQL Injection (CVE-2024-1071)
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Mar 13, 2024
CVE-2024-27564 5.8 MEDIUM EXPLOITED SSVC PoC 5 PoCs Analysis NUCLEI EPSS 0.92
ChatGPT个人专用版 - Server Side Request Forgery
pictureproxy.php in the dirk1983 mm1.ltd source code f9f4bbc allows SSRF via the url parameter. NOTE: the references section has an archived copy of pictureproxy.php from its original GitHub location, but the repository name might later change because it is misleading.
CWE-918 Mar 05, 2024
CVE-2024-27199 7.3 HIGH KEV SSVC ACTIVE RANSOMWARE 2 PoCs 1 Writeup Analysis NUCLEI EPSS 0.91
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
CWE-22 Mar 04, 2024
CVE-2024-1212 10.0 CRITICAL KEV SSVC ACTIVE 7 PoCs Analysis NUCLEI EPSS 0.94
Progress Loadmaster < 7.2.48.10 - OS Command Injection
Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
CWE-78 Feb 21, 2024
CVE-2024-1709 10.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 9 PoCs Analysis NUCLEI EPSS 0.94
Connectwise Screenconnect < 23.9.8 - Authentication Bypass
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
CWE-288 Feb 21, 2024
CVE-2024-1708 8.4 HIGH KEV SSVC ACTIVE RANSOMWARE 3 PoCs Analysis EPSS 0.54
ConnectWise ScreenConnect Unauthenticated Remote Code Execution
ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.
CWE-22 Feb 21, 2024
CVE-2024-23113 9.8 CRITICAL KEV SSVC ACTIVE 8 PoCs Analysis EPSS 0.54
Fortinet Fortiproxy < 7.0.14 - Format String Vulnerability
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
CWE-134 Feb 15, 2024
CVE-2024-23334 5.9 MEDIUM EXPLOITED SSVC PoC RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.93
aiohttp - Directory Traversal
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.
CWE-22 Jan 29, 2024
CVE-2024-0204 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
Fortra GoAnywhere MFT Unauthenticated Remote Code Execution
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
CWE-425 Jan 22, 2024
CVE-2024-9387 6.4 MEDIUM 2 PoCs Analysis EPSS 0.00
Gitlab < 17.4.6 - Open Redirect
An issue was discovered in GitLab CE/EE affecting all versions from 11.8 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. An attacker could potentially perform an open redirect against a given releases API endpoint.
CWE-601 Dec 12, 2024