Latest Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,880 CVEs tracked 53,712 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,664 vendors 43,956 researchers
53,712 results Clear all
CVE-2024-8418 7.5 HIGH 1 PoC Analysis EPSS 0.00
Aardvark-dns - DoS
A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue prevents legitimate users from accessing DNS services, thereby disrupting normal operations and causing service downtime.
CWE-400 Sep 04, 2024
CVE-2024-0044 6.7 MEDIUM SSVC PoC 17 PoCs Analysis EPSS 0.09
PackageInstallerService - Privilege Escalation
In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-74 Mar 11, 2024
CVE-2024-1485 8.0 HIGH 1 PoC 1 Writeup EPSS 0.02
Devfile Registry-support < 0.0.0-20240206 - Path Traversal
A flaw was found in the decompression function of registry-support. This issue can be triggered if an unauthenticated remote attacker tricks a user into parsing a devfile which uses the `parent` or `plugin` keywords. This could download a malicious archive and cause the cleanup process to overwrite or delete files outside of the archive, which should not be allowed.
CWE-22 Feb 14, 2024
CVE-2024-49113 7.5 HIGH SSVC PoC 5 PoCs Analysis EPSS 0.89
Microsoft Windows 10 1507 < 10.0.10240.20857 - Out-of-Bounds Read
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CWE-125 Dec 12, 2024
CVE-2024-50050 6.3 MEDIUM 2 PoCs Analysis EPSS 0.03
Llama Stack <7a8aa775e5a267cf8660d83140011a0b7f91e005 - RCE
Llama Stack prior to revision 7a8aa775e5a267cf8660d83140011a0b7f91e005 used pickle as a serialization format for socket communication, potentially allowing for remote code execution. Socket communication has been changed to use JSON instead.
Oct 23, 2024
CVE-2024-6323 7.5 HIGH 1 PoC EPSS 0.00
GitLab EE <16.11.5, <17.0.3, <17.1.1 - Info Disclosure
Improper authorization in global search in GitLab EE affecting all versions from 16.11 prior to 16.11.5 and 17.0 prior to 17.0.3 and 17.1 prior to 17.1.1 allows an attacker leak content of a private repository in a public project.
CWE-863 Jun 27, 2024
CVE-2024-22363 7.5 HIGH 1 PoC Analysis EPSS 0.00
SheetJS Community Edition <0.20.2 - DoS
SheetJS Community Edition before 0.20.2 is vulnerable.to Regular Expression Denial of Service (ReDoS).
CWE-1333 Apr 05, 2024
CVE-2024-4041 6.1 MEDIUM 1 PoC Analysis EPSS 0.04
Yoast SEO <22.5 - XSS
The Yoast SEO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URLs in all versions up to, and including, 22.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CWE-79 May 14, 2024
CVE-2024-25830 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.39
F-logic Datacube3 Firmware - Path Traversal
F-logic DataCube3 v1.0 is vulnerable to Incorrect Access Control due to an improper directory access restriction. An unauthenticated, remote attacker can exploit this, by sending a URI that contains the path of the configuration file. A successful exploit could allow the attacker to extract the root and admin password.
CWE-22 Feb 29, 2024
CVE-2024-48839 10.0 CRITICAL 2 PoCs Analysis EPSS 0.06
ABB Aspect-ent-2 Firmware < 3.08.03 - Code Injection
Improper Input Validation vulnerability allows Remote Code Execution.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
CWE-94 Dec 05, 2024
CVE-2024-51550 10.0 CRITICAL 1 PoC Analysis EPSS 0.04
ABB ASPECT Enterprise, NEXUS Series, and MATRIX Series <3.08.02 <3 - Data Validation
Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
CWE-1287 Dec 05, 2024
CVE-2024-51977 5.3 MEDIUM EXPLOITED SSVC PoC 3 PoCs Analysis NUCLEI EPSS 0.45
Multiple Brother devices authentication bypass via default administrator password generation
An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number.
CWE-538 Jun 25, 2025
CVE-2024-6670 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.94
WhatsUp Gold SQL Injection (CVE-2024-6670)
In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.
CWE-89 Aug 29, 2024
CVE-2024-20419 10.0 CRITICAL EXPLOITED SSVC PoC 2 PoCs Analysis NUCLEI EPSS 0.91
Cisco Smart Software Manager (SSM) On-Prem Account Takeover (CVE-2024-20419)
A vulnerability in the authentication system of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to change the password of any user, including administrative users. This vulnerability is due to improper implementation of the password-change process. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user.
CWE-620 Jul 17, 2024
CVE-2024-5276 9.8 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.87
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
CWE-20 Jun 25, 2024
CVE-2024-48766 8.6 HIGH EXPLOITED SSVC PoC 2 PoCs Analysis NUCLEI EPSS 0.78
Netalertx < 24.10.12 - Path Traversal
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
CWE-22 May 13, 2025
CVE-2024-57727 7.5 HIGH KEV SSVC ACTIVE RANSOMWARE 3 PoCs Analysis NUCLEI EPSS 0.94
SimpleHelp Path Traversal Vulnerability CVE-2024-57727
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
CWE-22 Jan 15, 2025
CVE-2024-8522 10.0 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.88
LearnPress - WordPress LMS Plugin <4.2.7 - SQL Injection
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Sep 12, 2024
CVE-2024-8503 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
VICIdial Authenticated Remote Code Execution
An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial to enumerate database records. By default, VICIdial stores plaintext credentials within the database.
CWE-89 Sep 10, 2024
CVE-2024-43917 9.3 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.90
WordPress TI WooCommerce Wishlist SQL Injection (CVE-2024-43917)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2.
CWE-89 Aug 29, 2024