Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,880 CVEs tracked 53,712 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,664 vendors 43,956 researchers
53,712 results Clear all
CVE-2024-13322 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.22
Ads Pro Plugin - WordPress <4.88 - SQL Injection
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to SQL Injection via the 'a_id' parameter in all versions up to, and including, 4.88 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 02, 2025
CVE-2024-48248 8.6 HIGH KEV SSVC ACTIVE 2 PoCs Analysis NUCLEI EPSS 0.94
Nakivo Backup & Replication Director - Absolute Path Traversal
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).
CWE-36 Mar 04, 2025
CVE-2024-53544 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
NovaCHRON Smart Time Plus <8.6 - SQL Injection
NovaCHRON Zeitsysteme GmbH & Co. KG Smart Time Plus v8.x to v8.6 was discovered to contain a SQL injection vulnerability via the getCookieNames method in the smarttimeplus/MySQLConnection endpoint.
CWE-89 Feb 24, 2025
CVE-2024-53543 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
NovaCHRON Smart Time Plus <8.7 - SQL Injection
NovaCHRON Zeitsysteme GmbH & Co. KG Smart Time Plus v8.x to v8.6 was discovered to contain a SQL injection vulnerability via the addProject method in the smarttimeplus/MySQLConnection endpoint.
CWE-89 Feb 24, 2025
CVE-2024-55457 6.5 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.80
MasterSAM Star Gate 11 - Path Traversal
MasterSAM Star Gate 11 is vulnerable to directory traversal via /adama/adama/downloadService. An attacker can exploit this vulnerability by manipulating the file parameter to access arbitrary files on the server, potentially exposing sensitive information.
CWE-22 Feb 20, 2025
CVE-2024-13485 7.5 HIGH 2 PoCs Analysis EPSS 0.11
LTL Freight Quotes - ABF Freight Edition <3.3.7 - SQL Injection
The LTL Freight Quotes – ABF Freight Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 19, 2025
CVE-2024-13481 7.5 HIGH 2 PoCs Analysis EPSS 0.15
LTL Freight Quotes - R+L Carriers Edition <3.3.4 - SQL Injection
The LTL Freight Quotes – R+L Carriers Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.3.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 19, 2025
CVE-2024-13478 7.5 HIGH 2 PoCs Analysis EPSS 0.19
LTL Freight Quotes - TForce Edition <3.6.4 - SQL Injection
The LTL Freight Quotes – TForce Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 19, 2025
CVE-2024-13488 7.5 HIGH 2 PoCs Analysis EPSS 0.15
LTL Freight Quotes - Estes Edition <3.3.7 - SQL Injection
The LTL Freight Quotes – Estes Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 15, 2025
CVE-2024-13475 7.5 HIGH 1 PoC Analysis EPSS 0.01
Small Package Quotes - UPS Edition <4.5.16 - SQL Injection
The Small Package Quotes – UPS Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 4.5.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 12, 2025
CVE-2024-57241 6.5 MEDIUM SSVC PoC 2 PoCs Analysis NUCLEI EPSS 0.23
Dedecms - Open Redirect
Dedecms 5.71sp1 and earlier is vulnerable to URL redirect. In the web application, a logic error does not judge the input GET request resulting in URL redirection.
CWE-601 Feb 11, 2025
CVE-2024-51818 9.3 CRITICAL 2 PoCs Analysis EPSS 0.19
Fancy Product Designer <6.4.3 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in radykal Fancy Product Designer fancy-product-designer.This issue affects Fancy Product Designer: from n/a through <= 6.4.3.
CWE-89 Jan 21, 2025
CVE-2024-11396 5.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.54
Event Monster - Info Disclosure
The Event Monster – Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.3 via the Visitors List Export file. During the export, a CSV file is created in the wp-content folder with a hardcoded filename that is publicly accessible. This makes it possible for unauthenticated attackers to extract data about event visitors, that includes first and last names, email, and phone number.
CWE-359 Jan 14, 2025
CVE-2024-54764 6.5 MEDIUM EXPLOITED SSVC PoC 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.06
ipTIME A2004 <12.17.0 - Info Disclosure
An access control issue in the component /login/hostinfo2.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
Jan 06, 2025
CVE-2024-56512 5.4 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.41
Apache NiFi <2.0.0 - Auth Bypass
Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Contexts, referenced Controller Services, and referenced Parameter Providers, when creating new Process Groups. Creating a new Process Group can include binding to a Parameter Context, but in cases where the Process Group did not reference any Parameter values, the framework did not check user authorization for the bound Parameter Context. Missing authorization for a bound Parameter Context enabled clients to download non-sensitive Parameter values after creating the Process Group. Creating a new Process Group can also include referencing existing Controller Services or Parameter Providers. The framework did not check user authorization for referenced Controller Services or Parameter Providers, enabling clients to create Process Groups and use these components that were otherwise unauthorized. This vulnerability is limited in scope to authenticated users authorized to create Process Groups. The scope is further limited to deployments with component-based authorization policies. Upgrading to Apache NiFi 2.1.0 is the recommended mitigation, which includes authorization checking for Parameter and Controller Service references on Process Group creation.
CWE-638 Dec 28, 2024
CVE-2024-38819 7.5 HIGH 6 PoCs Analysis NUCLEI EPSS 0.93
Org.springframework Spring-webflux < 6.1.14 - Path Traversal
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
CWE-22 Dec 19, 2024
CVE-2024-28138 7.3 HIGH 1 PoC Analysis EPSS 0.01
Unknown - Command Injection
An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized.
CWE-78 Dec 10, 2024
CVE-2024-42327 9.9 CRITICAL 11 PoCs Analysis EPSS 0.91
Zabbix < 6.0.32 - SQL Injection
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
CWE-89 Nov 27, 2024
CVE-2024-52726 7.5 HIGH 1 PoC Analysis EPSS 0.32
Crmeb - Out-of-Bounds Read
CRMEB v5.4.0 is vulnerable to Arbitrary file read in the save_basics function which allows an attacker to obtain sensitive information
CWE-125 Nov 22, 2024
CVE-2024-10400 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Themeum Tutor Lms < 2.7.6 - SQL Injection
The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the ‘rating_filter’ parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Nov 21, 2024