Latest Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,880 CVEs tracked 53,712 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,664 vendors 43,956 researchers
53,712 results Clear all
CVE-2024-26304 9.8 CRITICAL 2 PoCs Analysis EPSS 0.73
L2/L3 Management service - Buffer Overflow
There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
CWE-121 May 01, 2024
CVE-2024-32709 9.3 CRITICAL 1 PoC NUCLEI EPSS 0.93
Plechev Andrey WP-Recall <16.26.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
CWE-89 Apr 24, 2024
CVE-2024-31497 5.9 MEDIUM 5 PoCs Analysis EPSS 0.19
PuTTY <0.81 - Info Disclosure
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.
CWE-338 Apr 15, 2024
CVE-2024-21508 9.8 CRITICAL 1 PoC 1 Writeup EPSS 0.40
NPM Mysql2 < 3.9.4 - Code Injection
Versions of the package mysql2 before 3.9.4 are vulnerable to Remote Code Execution (RCE) via the readCodeFor function due to improper validation of the supportBigNumbers and bigNumberStrings values.
CWE-94 Apr 11, 2024
CVE-2024-31345 9.1 CRITICAL 1 PoC EPSS 0.01
Sukhchain Singh Auto Poster <1.2 - Unrestricted Upload
Unrestricted Upload of File with Dangerous Type vulnerability in Sukhchain Singh Auto Poster.This issue affects Auto Poster: from n/a through 1.2.
CWE-434 Apr 07, 2024
CVE-2024-31286 9.9 CRITICAL 1 PoC EPSS 0.01
J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus <8.6.03.005 - Unr...
Unrestricted Upload of File with Dangerous Type vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus.This issue affects WP Photo Album Plus: from n/a before 8.6.03.005.
CWE-434 Apr 07, 2024
CVE-2024-21894 9.8 CRITICAL EXPLOITED 1 PoC EPSS 0.09
Ivanti Connect Secure - Out-of-Bounds Write
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code
CWE-703 Apr 04, 2024
CVE-2024-27191 8.5 HIGH 1 PoC EPSS 0.00
Inperstton Slivery Extender <1.0.2 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in inpersttion Slivery Extender slivery-extender allows Remote Code Inclusion.This issue affects Slivery Extender: from n/a through <= 1.0.2.
CWE-94 Apr 03, 2024
CVE-2024-2086 10.0 CRITICAL 1 PoC EPSS 0.01
WordPress Integrate Google Drive - Info Disclosure
The Integrate Google Drive – Browse, Upload, Download, Embed, Play, Share, Gallery, and Manage Your Google Drive Files Into Your WordPress Site plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to a missing capability check on multiple AJAX in all versions up to, and including, 1.3.8. This makes it possible for authenticated attackers to modify plugin settings as well as allowing full read/write/delete access to the Google Drive associated with the plugin.
CWE-862 Mar 30, 2024
CVE-2024-26198 8.8 HIGH 3 PoCs EPSS 0.03
Microsoft Exchange Server - Untrusted Search Path
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-426 Mar 12, 2024
CVE-2024-26160 5.5 MEDIUM 3 PoCs Analysis EPSS 0.38
Microsoft Windows 11 22h2 < 10.0.22621.3296 - Buffer Over-read
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CWE-126 Mar 12, 2024
CVE-2024-21426 7.8 HIGH 2 PoCs EPSS 0.01
Microsoft Sharepoint Server - Use After Free
Microsoft SharePoint Server Remote Code Execution Vulnerability
CWE-416 Mar 12, 2024
CVE-2024-21411 8.8 HIGH 1 PoC EPSS 0.05
Skype < 8.113 - Remote Code Execution
Skype for Consumer Remote Code Execution Vulnerability
CWE-453 Mar 12, 2024
CVE-2024-21407 8.1 HIGH EXPLOITED RANSOMWARE 1 PoC EPSS 0.06
Microsoft Windows 10 1507 < 10.0.10240.20526 - Use After Free
Windows Hyper-V Remote Code Execution Vulnerability
CWE-416 Mar 12, 2024
CVE-2024-21400 9.0 CRITICAL SSVC PoC 1 PoC EPSS 0.02
Microsoft Confidental Containers < 0.3.3 - Path Traversal
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CWE-22 Mar 12, 2024
CVE-2024-21334 9.8 CRITICAL 1 PoC EPSS 0.07
Microsoft Open Management Infrastructure < 1.8.1-0 - Use After Free
Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
CWE-416 Mar 12, 2024
CVE-2024-21899 9.8 CRITICAL EXPLOITED 1 PoC EPSS 0.11
Qnap Qts < 4.5.4.2627 - Authentication Bypass
An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTS hero h4.5.4.2626 build 20231225 and later QuTScloud c5.1.5.2651 and later
CWE-287 Mar 08, 2024
CVE-2024-28222 9.8 CRITICAL 1 PoC EPSS 0.01
Veritas Netbackup < 8.1.2 - Path Traversal
In Veritas NetBackup before 8.1.2 and NetBackup Appliance before 3.1.2, the BPCD process inadequately validates the file path, allowing an unauthenticated attacker to upload and execute a custom file.
CWE-22 Mar 07, 2024
CVE-2024-20337 8.2 HIGH 1 PoC EPSS 0.04
Cisco Secure Client - CRLF Injection
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
CWE-93 Mar 06, 2024
CVE-2024-0967 4.3 MEDIUM 1 PoC EPSS 0.00
OpenText/Micro Focus ArcSight ESM - RCE
A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited.
Mar 01, 2024