Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,712 results
Clear all
CVE-2024-20291
5.8
MEDIUM
1 PoC
EPSS 0.14
Cisco Nexus 3000/9000 - RCE
A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.
This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.
CWE-284
Feb 29, 2024
CVE-2024-21378
8.8
HIGH
2 PoCs
Analysis
EPSS 0.22
Microsoft 365 Apps - Code Injection
Microsoft Outlook Remote Code Execution Vulnerability
CWE-94
Feb 13, 2024
CVE-2024-0519
8.8
HIGH
KEV
SSVC ACTIVE
2 PoCs
Analysis
EPSS 0.00
Google Chrome <120.0.6099.224 - Memory Corruption
Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-125
Jan 16, 2024
CVE-2024-0195
6.3
MEDIUM
SSVC PoC
5 PoCs
Analysis
NUCLEI
EPSS 0.92
Ssssssss Spider-flow - Code Injection
A vulnerability, which was classified as critical, was found in spider-flow 0.4.3. Affected is the function FunctionService.saveFunction of the file src/main/java/org/spiderflow/controller/FunctionController.java. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249510 is the identifier assigned to this vulnerability.
CWE-94
Jan 02, 2024
CVE-2024-53704
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Sonicwall Sonicos < 7.1.1-7058 - Authentication Bypass
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
CWE-287
Jan 09, 2025
CVE-2024-0001
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.02
FlashArray Purity - Privilege Escalation
A condition exists in FlashArray Purity whereby a local account intended for initial array configuration remains active potentially allowing a malicious actor to gain elevated privileges.
CWE-1188
Sep 23, 2024
CVE-2024-29847
9.8
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.63
Ivanti EPM <2022 SU6-2024 September - Code Injection
Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.
CWE-502
Sep 12, 2024
CVE-2024-7928
4.3
MEDIUM
EXPLOITED
SSVC PoC
6 PoCs
Analysis
NUCLEI
EPSS 0.92
Fastadmin < 1.3.4.20220530 - Path Traversal
A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.
CWE-22
Aug 19, 2024
CVE-2024-41570
9.8
CRITICAL
SSVC PoC
6 PoCs
Analysis
EPSS 0.74
Havoc - SSRF
An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
CWE-918
Aug 12, 2024
CVE-2024-7029
8.8
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.93
Avtech Avm1203 Firmware - Command Injection
Commands can be injected over the network and executed without authentication.
CWE-77
Aug 02, 2024
CVE-2024-7120
6.3
MEDIUM
EXPLOITED
SSVC PoC
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Raisecom Msg2300 Firmware - OS Command Injection
A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
CWE-78
Jul 26, 2024
CVE-2024-37742
8.2
HIGH
SSVC PoC
5 PoCs
Analysis
EPSS 0.00
Safe Exam Browser <3.5.0 - Info Disclosure
Insecure Access Control in Safe Exam Browser (SEB) = 3.5.0 on Windows. The vulnerability allows an attacker to share clipboard data between the SEB kiosk mode and the underlying system, compromising exam integrity. By exploiting this flaw, an attacker can bypass exam controls and gain an unfair advantage during exams.
CWE-284
Jun 25, 2024
CVE-2024-5522
6.5
MEDIUM
SSVC PoC
3 PoCs
Analysis
NUCLEI
EPSS 0.84
Bplugins Html5 Video Player < 2.5.27 - SQL Injection
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
CWE-89
Jun 20, 2024
CVE-2024-3183
8.1
HIGH
2 PoCs
Analysis
EPSS 0.21
FreeIPA - Info Disclosure
A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password.
If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).
CWE-916
Jun 12, 2024
CVE-2024-5420
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.47
SEH Computertechnik <20.1.22 - XSS
Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
CWE-79
Jun 04, 2024
CVE-2024-23739
9.8
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.36
Discord for macOS <0.0.291 - RCE
An issue in Discord for macOS version 0.0.291 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
Jan 28, 2024
CVE-2024-23743
3.3
LOW
SSVC PoC
2 PoCs
Analysis
EPSS 0.00
Notion <3.1.0 - RCE
Notion through 3.1.0 on macOS might allow code execution because of RunAsNode and enableNodeClilnspectArguments. NOTE: the vendor states "the attacker must launch the Notion Desktop application with nonstandard flags that turn the Electron-based application into a Node.js execution environment."
CWE-250
Jan 28, 2024
CVE-2024-23738
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.13
Postman < 10.22 - Remote Code Execution
An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states "we dispute the report's accuracy ... the configuration does not enable remote code execution.."
Jan 28, 2024
CVE-2024-34716
9.6
CRITICAL
5 PoCs
Analysis
EPSS 0.37
Prestashop < 8.1.6 - XSS
PrestaShop is an open source e-commerce web application. A cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled is present starting from PrestaShop 8.1.0 and prior to PrestaShop 8.1.6. When the customer thread feature flag is enabled through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. This vulnerability is patched in 8.1.6. A workaround is to disable the customer-thread feature-flag.
CWE-79
May 14, 2024
CVE-2024-32651
10.0
CRITICAL
SSVC PoC
4 PoCs
Analysis
NUCLEI
EPSS 0.92
changedetection.io - RCE
changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced).
CWE-1336
Apr 26, 2024