Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,712 results
Clear all
CVE-2024-26304
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.73
L2/L3 Management service - Buffer Overflow
There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
CWE-121
May 01, 2024
CVE-2024-32709
9.3
CRITICAL
1 PoC
NUCLEI
EPSS 0.93
Plechev Andrey WP-Recall <16.26.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
CWE-89
Apr 24, 2024
CVE-2024-31497
5.9
MEDIUM
5 PoCs
Analysis
EPSS 0.19
PuTTY <0.81 - Info Disclosure
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.
CWE-338
Apr 15, 2024
CVE-2024-21508
9.8
CRITICAL
1 PoC
1 Writeup
EPSS 0.40
NPM Mysql2 < 3.9.4 - Code Injection
Versions of the package mysql2 before 3.9.4 are vulnerable to Remote Code Execution (RCE) via the readCodeFor function due to improper validation of the supportBigNumbers and bigNumberStrings values.
CWE-94
Apr 11, 2024
CVE-2024-31345
9.1
CRITICAL
1 PoC
EPSS 0.01
Sukhchain Singh Auto Poster <1.2 - Unrestricted Upload
Unrestricted Upload of File with Dangerous Type vulnerability in Sukhchain Singh Auto Poster.This issue affects Auto Poster: from n/a through 1.2.
CWE-434
Apr 07, 2024
CVE-2024-31286
9.9
CRITICAL
1 PoC
EPSS 0.01
J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus <8.6.03.005 - Unr...
Unrestricted Upload of File with Dangerous Type vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus.This issue affects WP Photo Album Plus: from n/a before 8.6.03.005.
CWE-434
Apr 07, 2024
CVE-2024-21894
9.8
CRITICAL
EXPLOITED
1 PoC
EPSS 0.09
Ivanti Connect Secure - Out-of-Bounds Write
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code
CWE-703
Apr 04, 2024
CVE-2024-27191
8.5
HIGH
1 PoC
EPSS 0.00
Inperstton Slivery Extender <1.0.2 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in inpersttion Slivery Extender slivery-extender allows Remote Code Inclusion.This issue affects Slivery Extender: from n/a through <= 1.0.2.
CWE-94
Apr 03, 2024
CVE-2024-2086
10.0
CRITICAL
1 PoC
EPSS 0.01
WordPress Integrate Google Drive - Info Disclosure
The Integrate Google Drive – Browse, Upload, Download, Embed, Play, Share, Gallery, and Manage Your Google Drive Files Into Your WordPress Site plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to a missing capability check on multiple AJAX in all versions up to, and including, 1.3.8. This makes it possible for authenticated attackers to modify plugin settings as well as allowing full read/write/delete access to the Google Drive associated with the plugin.
CWE-862
Mar 30, 2024
CVE-2024-26198
8.8
HIGH
3 PoCs
EPSS 0.03
Microsoft Exchange Server - Untrusted Search Path
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-426
Mar 12, 2024
CVE-2024-26160
5.5
MEDIUM
3 PoCs
Analysis
EPSS 0.38
Microsoft Windows 11 22h2 < 10.0.22621.3296 - Buffer Over-read
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CWE-126
Mar 12, 2024
CVE-2024-21426
7.8
HIGH
2 PoCs
EPSS 0.01
Microsoft Sharepoint Server - Use After Free
Microsoft SharePoint Server Remote Code Execution Vulnerability
CWE-416
Mar 12, 2024
CVE-2024-21411
8.8
HIGH
1 PoC
EPSS 0.05
Skype < 8.113 - Remote Code Execution
Skype for Consumer Remote Code Execution Vulnerability
CWE-453
Mar 12, 2024
CVE-2024-21407
8.1
HIGH
EXPLOITED
RANSOMWARE
1 PoC
EPSS 0.06
Microsoft Windows 10 1507 < 10.0.10240.20526 - Use After Free
Windows Hyper-V Remote Code Execution Vulnerability
CWE-416
Mar 12, 2024
CVE-2024-21400
9.0
CRITICAL
SSVC PoC
1 PoC
EPSS 0.02
Microsoft Confidental Containers < 0.3.3 - Path Traversal
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CWE-22
Mar 12, 2024
CVE-2024-21334
9.8
CRITICAL
1 PoC
EPSS 0.07
Microsoft Open Management Infrastructure < 1.8.1-0 - Use After Free
Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
CWE-416
Mar 12, 2024
CVE-2024-21899
9.8
CRITICAL
EXPLOITED
1 PoC
EPSS 0.11
Qnap Qts < 4.5.4.2627 - Authentication Bypass
An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.3.2578 build 20231110 and later
QTS 4.5.4.2627 build 20231225 and later
QuTS hero h5.1.3.2578 build 20231110 and later
QuTS hero h4.5.4.2626 build 20231225 and later
QuTScloud c5.1.5.2651 and later
CWE-287
Mar 08, 2024
CVE-2024-28222
9.8
CRITICAL
1 PoC
EPSS 0.01
Veritas Netbackup < 8.1.2 - Path Traversal
In Veritas NetBackup before 8.1.2 and NetBackup Appliance before 3.1.2, the BPCD process inadequately validates the file path, allowing an unauthenticated attacker to upload and execute a custom file.
CWE-22
Mar 07, 2024
CVE-2024-20337
8.2
HIGH
1 PoC
EPSS 0.04
Cisco Secure Client - CRLF Injection
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
CWE-93
Mar 06, 2024
CVE-2024-0967
4.3
MEDIUM
1 PoC
EPSS 0.00
OpenText/Micro Focus ArcSight ESM - RCE
A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited.
Mar 01, 2024