Latest Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,712 results
Clear all
CVE-2024-4358
9.8
CRITICAL
KEV
SSVC ACTIVE
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Telerik Report Server Auth Bypass and Deserialization RCE
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
CWE-290
May 29, 2024
CVE-2024-45309
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.89
OneDev Unauthenticated Arbitrary File Read
OneDev is a Git server with CI/CD, kanban, and packages. A vulnerability in versions prior to 11.0.9 allows unauthenticated users to read arbitrary files accessible by the OneDev server process. This issue has been fixed in version 11.0.9.
CWE-22
Oct 21, 2024
CVE-2024-45256
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.51
BYOB Unauthenticated RCE via Arbitrary File Write and Command Injection (CVE-2024-45256, CVE-2024-45257)
An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py.
CWE-22
Aug 26, 2024
CVE-2024-5806
9.1
CRITICAL
EXPLOITED
SSVC PoC
3 PoCs
Analysis
EPSS 0.90
Progress MOVEit SFTP Authentication Bypass for Arbitrary File Read
Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2.
CWE-287
Jun 25, 2024
CVE-2024-30851
6.5
MEDIUM
3 PoCs
Analysis
EPSS 0.69
Jasmin Ransomware Web Server Unauthenticated SQL Injection
Directory Traversal vulnerability in codesiddhant Jasmin Ransomware v.1.0.1 allows an attacker to obtain sensitive information via the download_file.php component.
CWE-22
May 03, 2024
CVE-2024-20767
7.4
HIGH
KEV
SSVC ACTIVE
7 PoCs
Analysis
NUCLEI
EPSS 0.94
CVE-2024-20767 - Adobe Coldfusion Arbitrary File Read
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
CWE-284
Mar 18, 2024
CVE-2024-57487
6.5
MEDIUM
2 PoCs
Analysis
EPSS 0.45
Car Rental System 1.0 File Upload RCE (Authenticated)
In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server.
CWE-94
Jan 13, 2025
CVE-2024-55956
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.91
Cleo LexiCom, VLTrader, and Harmony Unauthenticated Remote Code Execution
In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.
CWE-77
Dec 13, 2024
CVE-2024-8856
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.93
WordPress WP Time Capsule Arbitrary File Upload to RCE
The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Nov 16, 2024
CVE-2024-10924
9.8
CRITICAL
EXPLOITED
25 PoCs
Analysis
NUCLEI
EPSS 0.94
WordPress Really Simple SSL Plugin Authentication Bypass to RCE
The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
CWE-306
Nov 15, 2024
CVE-2024-8517
9.8
CRITICAL
SSVC PoC
3 PoCs
Analysis
NUCLEI
EPSS 0.93
SPIP <4.3.2-4.1.18 - Command Injection
SPIP before 4.3.2, 4.2.16, and
4.1.18 is vulnerable to a command injection issue. A
remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.
CWE-78
Sep 06, 2024
CVE-2024-6782
9.8
CRITICAL
EXPLOITED
SSVC PoC
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Calibre 6.9.0-7.14.0 - Unauthenticated RCE
Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
CWE-863
Aug 06, 2024
CVE-2024-5084
9.8
CRITICAL
8 PoCs
Analysis
NUCLEI
EPSS 0.93
Hashthemes Hash Form < 1.1.1 - Unrestricted File Upload
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
May 23, 2024
CVE-2024-25641
9.1
CRITICAL
SSVC PoC
9 PoCs
Analysis
EPSS 0.88
Cacti Import Packages RCE
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.
CWE-20
May 14, 2024
CVE-2024-34069
7.5
HIGH
1 PoC
Analysis
EPSS 0.39
Werkzeug - Code Injection
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.
CWE-352
May 06, 2024
CVE-2024-31819
9.8
CRITICAL
SSVC PoC
3 PoCs
Analysis
EPSS 0.80
WWBN AVideo <14.2 - RCE
An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component.
CWE-94
Apr 10, 2024
CVE-2024-24725
8.8
HIGH
3 PoCs
Analysis
EPSS 0.82
Gibbon <26.0.00 - Code Injection
Gibbon through 26.0.00 allows remote authenticated users to conduct PHP deserialization attacks via columnOrder in a POST request to the modules/System%20Admin/import_run.php&type=externalAssessment&step=4 URI.
CWE-502
Mar 23, 2024
CVE-2024-23759
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.67
Gambio - Insecure Deserialization
Deserialization of Untrusted Data in Gambio through 4.9.2.0 allows attackers to run arbitrary code via "search" parameter of the Parcelshopfinder/AddAddressBookEntry" function.
CWE-502
Feb 12, 2024
CVE-2024-44000
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.93
Litespeedtech Litespeed Cache - Insufficiently Protected Credentials
Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a through < 6.5.0.1.
CWE-522
Oct 20, 2024
CVE-2024-7399
8.8
HIGH
KEV
SSVC ACTIVE
2 PoCs
Analysis
NUCLEI
EPSS 0.82
Samsung MagicINFO 9 Server Remote Code Execution (CVE-2024-7399)
Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority.
CWE-22
Aug 12, 2024