Latest Vulnerabilities with Public Exploits

Updated 35m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,880 CVEs tracked 53,712 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,664 vendors 43,956 researchers
53,712 results Clear all
CVE-2024-23113 9.8 CRITICAL KEV SSVC ACTIVE 8 PoCs Analysis EPSS 0.54
Fortinet Fortiproxy < 7.0.14 - Format String Vulnerability
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
CWE-134 Feb 15, 2024
CVE-2024-23334 5.9 MEDIUM EXPLOITED SSVC PoC RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.93
aiohttp - Directory Traversal
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.
CWE-22 Jan 29, 2024
CVE-2024-0204 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
Fortra GoAnywhere MFT Unauthenticated Remote Code Execution
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
CWE-425 Jan 22, 2024
CVE-2024-9387 6.4 MEDIUM 2 PoCs Analysis EPSS 0.00
Gitlab < 17.4.6 - Open Redirect
An issue was discovered in GitLab CE/EE affecting all versions from 11.8 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. An attacker could potentially perform an open redirect against a given releases API endpoint.
CWE-601 Dec 12, 2024
CVE-2024-50379 9.8 CRITICAL SSVC PoC 19 PoCs Analysis EPSS 0.86
Apache Tomcat < 9.0.98 - TOCTOU Race Condition
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
CWE-367 Dec 17, 2024
CVE-2024-13375 9.8 CRITICAL EXPLOITED 1 PoC EPSS 0.11
Adifier System <3.1.7 - Privilege Escalation
The Adifier System plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.1.7. This is due to the plugin not properly validating a user's identity prior to updating their details like password through the adifier_recover() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CWE-620 Jan 18, 2025
CVE-2024-11281 9.8 CRITICAL 1 PoC EPSS 0.03
WooCommerce Point of Sale <6.1.0 - Privilege Escalation
The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 6.1.0. This is due to insufficient validation on the 'logged_in_user_id' value when option values are empty and the ability for attackers to change the email of arbitrary user accounts. This makes it possible for unauthenticated attackers to change the email of arbitrary user accounts, including administrators, and reset their password to gain access to the account.
CWE-862 Dec 25, 2024
CVE-2024-49112 9.8 CRITICAL SSVC PoC 5 PoCs Analysis EPSS 0.82
Microsoft Windows 10 1507 < 10.0.10240.20857 - Integer Overflow
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CWE-190 Dec 12, 2024
CVE-2024-10592 6.4 MEDIUM 1 PoC EPSS 0.41
Mapster WP Maps <1.6.0 - XSS
The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-80 Nov 16, 2024
CVE-2024-10015 6.4 MEDIUM 1 PoC EPSS 0.24
WordPress ConvertCalculator <1.1.1 - XSS
The ConvertCalculator for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' and 'type' parameters in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79 Nov 16, 2024
CVE-2024-10793 7.2 HIGH 3 PoCs Analysis EPSS 0.69
Melapress WP Activity Log < 5.2.2 - XSS
The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user_id parameter in all versions up to, and including, 5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrative user accesses an injected page.
CWE-79 Nov 15, 2024
CVE-2024-11120 9.8 CRITICAL KEV SSVC ACTIVE 1 PoC EPSS 0.66
Geovision Gv-vs12 Firmware - OS Command Injection
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
CWE-78 Nov 15, 2024
CVE-2024-43093 7.3 HIGH KEV SSVC ACTIVE 1 PoC EPSS 0.00
Java - Privilege Escalation
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CWE-176 Nov 13, 2024
CVE-2024-48904 9.8 CRITICAL 1 PoC EPSS 0.07
Trendmicro Cloud Edge < 5.6.3228 - Command Injection
An command injection vulnerability in Trend Micro Cloud Edge could allow a remote attacker to execute arbitrary code on affected appliances. Please note: authentication is not required in order to exploit this vulnerability.
CWE-77 Oct 22, 2024
CVE-2024-21534 9.8 CRITICAL SSVC PoC 4 PoCs Analysis EPSS 0.93
NPM Jsonpath-plus < 10.2.0 - Code Injection
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
CWE-94 Oct 11, 2024
CVE-2024-9796 9.8 CRITICAL SSVC PoC 5 PoCs Analysis NUCLEI EPSS 0.83
Internet-formation Wp-advanced-search < 3.3.9.2 - SQL Injection
The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
CWE-89 Oct 10, 2024
CVE-2024-43582 8.1 HIGH 1 PoC EPSS 0.26
Microsoft Windows 10 1809 < 10.0.17763.6414 - Use After Free
Remote Desktop Protocol Server Remote Code Execution Vulnerability
CWE-416 Oct 08, 2024
CVE-2024-43532 8.8 HIGH 3 PoCs EPSS 0.61
Remote Registry Service - Privilege Escalation
Remote Registry Service Elevation of Privilege Vulnerability
CWE-636 Oct 08, 2024
CVE-2024-9441 9.8 CRITICAL SSVC PoC 4 PoCs Analysis EPSS 0.60
Linear eMerge e3-Series <1.00-07 - Command Injection
The Linear eMerge e3-Series through version 1.00-07 is vulnerable to an OS command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary OS commands via the login_id parameter when invoking the forgot_password functionality over HTTP.
CWE-78 Oct 02, 2024
CVE-2024-8275 9.8 CRITICAL 2 PoCs Analysis EPSS 0.84
The Events Calendar <6.6.4 - SQL Injection
The The Events Calendar plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tribe_has_next_event' function in all versions up to, and including, 6.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only sites that have manually added tribe_has_next_event() will be vulnerable to this SQL injection.
CWE-89 Sep 25, 2024