Latest Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,712 results
Clear all
CVE-2024-22729
9.8
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.91
Netis MW5360 V1.0.1.3031 - Command Injection
NETIS SYSTEMS MW5360 V1.0.1.3031 was discovered to contain a command injection vulnerability via the password parameter on the login page.
CWE-77
Jan 25, 2024
CVE-2024-51092
1 PoC
Analysis
LibreNMS Authenticated RCE (CVE-2024-51092)
An authenticated attacker can create dangerous directory names on the system and alter sensitive configuration parameters through the web portal. Those two defects combined then allows to inject arbitrary OS commands inside shell_exec() calls, thus achieving arbitrary code execution.
CVE-2024-6232
7.5
HIGH
1 PoC
1 Writeup
Analysis
EPSS 0.04
CPython - ReDoS
There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
CWE-1333
Sep 03, 2024
CVE-2024-0670
8.8
HIGH
7 PoCs
Analysis
EPSS 0.00
Checkmk <2.2.0p23-2.0.0 - Privilege Escalation
Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges
CWE-427
Mar 11, 2024
CVE-2024-32964
9.0
CRITICAL
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.74
Lobehub Lobe Chat < 0.150.6 - SSRF
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.
CWE-918
May 14, 2024
CVE-2024-54085
9.8
CRITICAL
KEV
SSVC ACTIVE
2 PoCs
Analysis
EPSS 0.43
AMI's SPx - Auth Bypass
AMI’s SPx contains
a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
CWE-290
Mar 11, 2025
CVE-2024-10654
5.3
MEDIUM
SSVC PoC
2 PoCs
Analysis
EPSS 0.02
Totolink Lr350 Firmware - Improper Authorization
A vulnerability has been found in TOTOLINK LR350 up to 9.3.5u.6369 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /formLoginAuth.htm. The manipulation of the argument authCode with the input 1 leads to authorization bypass. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 9.3.5u.6698_B20230810 is able to address this issue. It is recommended to upgrade the affected component.
CWE-266
Nov 01, 2024
CVE-2024-9264
9.9
CRITICAL
SSVC PoC
13 PoCs
Analysis
NUCLEI
EPSS 0.94
Grafana < 11.0.6+security-01 - Command Injection
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
CWE-94
Oct 18, 2024
CVE-2024-8636
8.8
HIGH
2 PoCs
Analysis
EPSS 0.01
Google Chrome <128.0.6613.137 - Buffer Overflow
Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416
Sep 11, 2024
CVE-2024-8198
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Google Chrome <128.0.6613.113 - Buffer Overflow
Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.113 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-120
Aug 28, 2024
CVE-2024-8193
8.8
HIGH
2 PoCs
Analysis
EPSS 0.01
Google Chrome <128.0.6613.113 - Buffer Overflow
Heap buffer overflow in Skia in Google Chrome prior to 128.0.6613.113 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-122
Aug 28, 2024
CVE-2024-42364
6.5
MEDIUM
2 PoCs
Analysis
EPSS 0.00
Homepage 0.9.1 - SSRF
Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS rebinding. In this attack, an attacker will ask a user to visit his/her website. The attacker website will then change the DNS records of their domain from their IP address to the internal IP address of the homepage instance. To tell which IP addresses are valid, we can rebind a subdomain to each IP address we want to check, and see if there is a response. Once potential candidates have been found, the attacker can launch the attack by reading the response of the webserver after the IP address has changed. When the attacker domain is fetched, the response will be from the homepage instance, not the attacker website, because the IP address has been changed. Due to a lack of authentication, a user’s private information such as API keys (fixed after first report) and other private information can then be extracted by the attacker website.
CWE-290
Aug 23, 2024
CVE-2024-7966
8.8
HIGH
2 PoCs
Analysis
EPSS 0.01
Google Chrome < 128.0.6613.84 - Memory Corruption
Out of bounds memory access in Skia in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
CWE-119
Aug 21, 2024
CVE-2024-41817
7.0
HIGH
SSVC PoC
3 PoCs
Analysis
EPSS 0.19
Imagemagick < 7.1.1-36 - Uncontrolled Search Path
ImageMagick is a free and open-source software suite, used for editing and manipulating digital images. The `AppImage` version `ImageMagick` might use an empty path when setting `MAGICK_CONFIGURE_PATH` and `LD_LIBRARY_PATH` environment variables while executing, which might lead to arbitrary code execution by loading malicious configuration files or shared libraries in the current working directory while executing `ImageMagick`. The vulnerability is fixed in 7.11-36.
CWE-427
Jul 29, 2024
CVE-2024-39930
9.9
CRITICAL
SSVC PoC
5 PoCs
Analysis
EPSS 0.12
Gogs < 0.13.0 - Remote Code Execution
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
CWE-88
Jul 04, 2024
CVE-2024-55271
3.5
LOW
SSVC PoC
1 PoC
Analysis
EPSS 0.00
phpgurukul Gym Management System 1.0 - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in phpgurukul Gym Management System 1.0. This issue is present in the profile update functionality of the User Panel, specifically the /profile.php endpoint.
CWE-352
Feb 17, 2026
CVE-2024-55270
8.8
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
phpgurukul Student Management System 1.0 - SQL Injection
phpgurukul Student Management System 1.0 is vulnerable to SQL Injection in studentms/admin/search.php via the searchdata parameter.
CWE-89
Feb 17, 2026
CVE-2024-34444
7.1
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.01
ThemePunch OHG Slider Revolution <6.7.0 - Info Disclosure
Missing Authorization vulnerability in ThemePunch OHG Slider Revolution.This issue affects Slider Revolution: from n/a before 6.7.0.
CWE-862
Jun 19, 2024
CVE-2024-37383
6.1
MEDIUM
KEV
SSVC ACTIVE
4 PoCs
Analysis
EPSS 0.64
Roundcube Webmail < 1.5.7 - XSS
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.
CWE-79
Jun 07, 2024
CVE-2024-51978
9.8
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
2 Writeups
Analysis
NUCLEI
EPSS 0.54
Unknown Device - Info Disclosure
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
CWE-1391
Jun 25, 2025