Latest Vulnerabilities with Public Exploits
Updated 35m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,712 results
Clear all
CVE-2024-9043
9.8
CRITICAL
1 PoC
EPSS 0.00
Cellopoint Secure Email Gateway < 4.5.0 - Out-of-Bounds Write
Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges.
CWE-121
Sep 20, 2024
CVE-2024-5057
9.3
CRITICAL
EXPLOITED
1 PoC
NUCLEI
EPSS 0.64
Awesomemotive Easy Digital Downloads < 3.2.12 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12.
CWE-89
Aug 29, 2024
CVE-2024-45436
7.5
HIGH
3 PoCs
Analysis
EPSS 0.29
Ollama <0.1.47 - Path Traversal
extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory.
CWE-22
Aug 29, 2024
CVE-2024-28987
9.1
CRITICAL
KEV
SSVC ACTIVE
9 PoCs
Analysis
NUCLEI
EPSS 0.94
SolarWinds Web Help Desk - Hardcoded Credential
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
CWE-798
Aug 21, 2024
CVE-2024-44083
7.5
HIGH
SSVC PoC
3 PoCs
Analysis
EPSS 0.12
Hex-rays Ida Pro < 8.4 - Resource Allocation Without Limits
ida64.dll in Hex-Rays IDA Pro through 8.4 crashes when there is a section that has many jumps linked, and the final jump corresponds to the payload from where the actual entry point will be invoked. NOTE: in many use cases, this is an inconvenience but not a security issue.
CWE-770
Aug 19, 2024
CVE-2024-38193
7.8
HIGH
KEV
SSVC ACTIVE
4 PoCs
Analysis
EPSS 0.73
Windows Ancillary Function Driver - Privilege Escalation
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CWE-416
Aug 13, 2024
CVE-2024-38189
8.8
HIGH
KEV
SSVC ACTIVE
1 PoC
EPSS 0.44
Microsoft Project < - RCE
Microsoft Project Remote Code Execution Vulnerability
CWE-20
Aug 13, 2024
CVE-2024-37084
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.83
Vmware Spring Cloud Data Flow < 2.11.4 - Code Injection
In Spring Cloud Data Flow versions prior to 2.11.4, a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server
CWE-94
Jul 25, 2024
CVE-2024-6222
7.0
HIGH
1 PoC
EPSS 0.02
Docker Desktop <4.29.0 - Privilege Escalation
In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.
Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.
As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default.
CWE-923
Jul 09, 2024
CVE-2024-38100
7.8
HIGH
EXPLOITED
SSVC PoC
1 PoC
EPSS 0.31
Windows File Explorer - Privilege Escalation
Windows File Explorer Elevation of Privilege Vulnerability
CWE-284
Jul 09, 2024
CVE-2024-38041
5.5
MEDIUM
2 PoCs
Analysis
EPSS 0.17
Windows Kernel - Info Disclosure
Windows Kernel Information Disclosure Vulnerability
CWE-200
Jul 09, 2024
CVE-2024-39943
9.9
CRITICAL
SSVC PoC
3 PoCs
Analysis
EPSS 0.78
Rejetto HTTP File Server < 0.52.10 - Improper Access Control
rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).
CWE-78
Jul 04, 2024
CVE-2024-20399
6.0
MEDIUM
KEV
SSVC ACTIVE
1 PoC
EPSS 0.01
Cisco NX-OS Software - Command Injection
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.
Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:
Nexus 3000 Series Switches
Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later
Nexus 9000 Series Switches in standalone NX-OS mode
CWE-78
Jul 01, 2024
CVE-2024-37085
6.8
MEDIUM
KEV
SSVC ACTIVE
RANSOMWARE
4 PoCs
Analysis
EPSS 0.72
Vmware Esxi < 5.2 - Authentication Bypass
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
CWE-305
Jun 25, 2024
CVE-2024-6028
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.80
Ays-pro Quiz Maker < 6.5.8.4 - SQL Injection
The Quiz Maker plugin for WordPress is vulnerable to time-based SQL Injection via the 'ays_questions' parameter in all versions up to, and including, 6.5.8.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Jun 25, 2024
CVE-2024-30078
8.8
HIGH
3 PoCs
Analysis
EPSS 0.25
Windows Wi-Fi Driver - RCE
Windows Wi-Fi Driver Remote Code Execution Vulnerability
CWE-20
Jun 11, 2024
CVE-2024-5124
7.5
HIGH
SSVC PoC
2 PoCs
Analysis
EPSS 0.46
gaizhenbiao/chuanhuchatgpt <20240310 - Info Disclosure
A timing attack vulnerability exists in the gaizhenbiao/chuanhuchatgpt repository, specifically within the password comparison logic. The vulnerability is present in version 20240310 of the software, where passwords are compared using the '=' operator in Python. This method of comparison allows an attacker to guess passwords based on the timing of each character's comparison. The issue arises from the code segment that checks a password for a particular username, which can lead to the exposure of sensitive information to an unauthorized actor. An attacker exploiting this vulnerability could potentially guess user passwords, compromising the security of the system.
CWE-203
Jun 06, 2024
CVE-2024-5452
9.8
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.57
Lightningai Pytorch Lightning < 2.3.3 - Remote Code Execution
A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the `deepdiff` library. The library uses `deepdiff.Delta` objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default.
CWE-915
Jun 06, 2024
CVE-2024-5326
8.8
HIGH
3 PoCs
Analysis
EPSS 0.53
Post Grid Gutenberg Blocks & WordPress Blog Plugin - Info Disclosure
The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
CWE-862
May 30, 2024
CVE-2024-32523
8.1
HIGH
2 PoCs
Analysis
EPSS 0.47
EverPress Mailster <4.0.6 - Path Traversal
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in EverPress Mailster mailster.This issue affects Mailster: from n/a through <= 4.0.6.
CWE-98
May 17, 2024