Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,880 CVEs tracked 53,712 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,664 vendors 43,956 researchers
53,712 results Clear all
CVE-2024-22729 9.8 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.91
Netis MW5360 V1.0.1.3031 - Command Injection
NETIS SYSTEMS MW5360 V1.0.1.3031 was discovered to contain a command injection vulnerability via the password parameter on the login page.
CWE-77 Jan 25, 2024
CVE-2024-51092 1 PoC Analysis
LibreNMS Authenticated RCE (CVE-2024-51092)
An authenticated attacker can create dangerous directory names on the system and alter sensitive configuration parameters through the web portal. Those two defects combined then allows to inject arbitrary OS commands inside shell_exec() calls, thus achieving arbitrary code execution.
CVE-2024-6232 7.5 HIGH 1 PoC 1 Writeup Analysis EPSS 0.04
CPython - ReDoS
There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
CWE-1333 Sep 03, 2024
CVE-2024-0670 8.8 HIGH 7 PoCs Analysis EPSS 0.00
Checkmk <2.2.0p23-2.0.0 - Privilege Escalation
Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges
CWE-427 Mar 11, 2024
CVE-2024-32964 9.0 CRITICAL SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.74
Lobehub Lobe Chat < 0.150.6 - SSRF
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.
CWE-918 May 14, 2024
CVE-2024-54085 9.8 CRITICAL KEV SSVC ACTIVE 2 PoCs Analysis EPSS 0.43
AMI's SPx - Auth Bypass
AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
CWE-290 Mar 11, 2025
CVE-2024-10654 5.3 MEDIUM SSVC PoC 2 PoCs Analysis EPSS 0.02
Totolink Lr350 Firmware - Improper Authorization
A vulnerability has been found in TOTOLINK LR350 up to 9.3.5u.6369 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /formLoginAuth.htm. The manipulation of the argument authCode with the input 1 leads to authorization bypass. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 9.3.5u.6698_B20230810 is able to address this issue. It is recommended to upgrade the affected component.
CWE-266 Nov 01, 2024
CVE-2024-9264 9.9 CRITICAL SSVC PoC 13 PoCs Analysis NUCLEI EPSS 0.94
Grafana < 11.0.6+security-01 - Command Injection
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
CWE-94 Oct 18, 2024
CVE-2024-8636 8.8 HIGH 2 PoCs Analysis EPSS 0.01
Google Chrome <128.0.6613.137 - Buffer Overflow
Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 Sep 11, 2024
CVE-2024-8198 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Google Chrome <128.0.6613.113 - Buffer Overflow
Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.113 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-120 Aug 28, 2024
CVE-2024-8193 8.8 HIGH 2 PoCs Analysis EPSS 0.01
Google Chrome <128.0.6613.113 - Buffer Overflow
Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.113 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-122 Aug 28, 2024
CVE-2024-42364 6.5 MEDIUM 2 PoCs Analysis EPSS 0.00
Homepage 0.9.1 - SSRF
Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS rebinding. In this attack, an attacker will ask a user to visit his/her website. The attacker website will then change the DNS records of their domain from their IP address to the internal IP address of the homepage instance. To tell which IP addresses are valid, we can rebind a subdomain to each IP address we want to check, and see if there is a response. Once potential candidates have been found, the attacker can launch the attack by reading the response of the webserver after the IP address has changed. When the attacker domain is fetched, the response will be from the homepage instance, not the attacker website, because the IP address has been changed. Due to a lack of authentication, a user’s private information such as API keys (fixed after first report) and other private information can then be extracted by the attacker website.
CWE-290 Aug 23, 2024
CVE-2024-7966 8.8 HIGH 2 PoCs Analysis EPSS 0.01
Google Chrome < 128.0.6613.84 - Memory Corruption
Out of bounds memory access in Skia in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
CWE-119 Aug 21, 2024
CVE-2024-41817 7.0 HIGH SSVC PoC 3 PoCs Analysis EPSS 0.19
Imagemagick < 7.1.1-36 - Uncontrolled Search Path
ImageMagick is a free and open-source software suite, used for editing and manipulating digital images. The `AppImage` version `ImageMagick` might use an empty path when setting `MAGICK_CONFIGURE_PATH` and `LD_LIBRARY_PATH` environment variables while executing, which might lead to arbitrary code execution by loading malicious configuration files or shared libraries in the current working directory while executing `ImageMagick`. The vulnerability is fixed in 7.11-36.
CWE-427 Jul 29, 2024
CVE-2024-39930 9.9 CRITICAL SSVC PoC 5 PoCs Analysis EPSS 0.12
Gogs < 0.13.0 - Remote Code Execution
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
CWE-88 Jul 04, 2024
CVE-2024-55271 3.5 LOW SSVC PoC 1 PoC Analysis EPSS 0.00
phpgurukul Gym Management System 1.0 - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in phpgurukul Gym Management System 1.0. This issue is present in the profile update functionality of the User Panel, specifically the /profile.php endpoint.
CWE-352 Feb 17, 2026
CVE-2024-55270 8.8 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
phpgurukul Student Management System 1.0 - SQL Injection
phpgurukul Student Management System 1.0 is vulnerable to SQL Injection in studentms/admin/search.php via the searchdata parameter.
CWE-89 Feb 17, 2026
CVE-2024-34444 7.1 HIGH EXPLOITED 1 PoC Analysis EPSS 0.01
ThemePunch OHG Slider Revolution <6.7.0 - Info Disclosure
Missing Authorization vulnerability in ThemePunch OHG Slider Revolution.This issue affects Slider Revolution: from n/a before 6.7.0.
CWE-862 Jun 19, 2024
CVE-2024-37383 6.1 MEDIUM KEV SSVC ACTIVE 4 PoCs Analysis EPSS 0.64
Roundcube Webmail < 1.5.7 - XSS
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.
CWE-79 Jun 07, 2024
CVE-2024-51978 9.8 CRITICAL EXPLOITED SSVC PoC 1 PoC 2 Writeups Analysis NUCLEI EPSS 0.54
Unknown Device - Info Disclosure
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
CWE-1391 Jun 25, 2025