Latest Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,712 results
Clear all
CVE-2024-11305
6.3
MEDIUM
EXPLOITED
SSVC PoC
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.46
Altenergy Power Control Software <20241108 - SQL Injection
A vulnerability classified as critical was found in Altenergy Power Control Software up to 20241108. This vulnerability affects the function get_status_zigbee of the file /index.php/display/status_zigbee. The manipulation of the argument date leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-74
Nov 18, 2024
CVE-2024-9935
7.5
HIGH
5 PoCs
Analysis
NUCLEI
EPSS 0.94
PDF Generator Addon - Path Traversal
The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.0.0 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. CVE-2025-24569 may be a duplicate of this issue.
CWE-22
Nov 16, 2024
CVE-2024-52295
9.8
CRITICAL
SSVC PoC
1 PoC
1 Writeup
Analysis
EPSS 0.01
DataEase <2.10.2 - Auth Bypass
DataEase is an open source data visualization analysis tool. Prior to 2.10.2, DataEase allows attackers to forge jwt and take over services. The JWT secret is hardcoded in the code, and the UID and OID are hardcoded. The vulnerability has been fixed in v2.10.2.
CWE-798
Nov 13, 2024
CVE-2024-48307
9.8
CRITICAL
EXPLOITED
SSVC PoC
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Jeecg Boot - SQL Injection
JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.
CWE-89
Oct 31, 2024
CVE-2024-9989
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.93
WordPress Crypto <2.15 - Auth Bypass
The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.18. This is due to a limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
CWE-288
Oct 29, 2024
CVE-2024-50498
10.0
CRITICAL
EXPLOITED
SSVC PoC
7 PoCs
Analysis
NUCLEI
EPSS 0.92
Lubus WP Query Console < 1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Ajit Bohra WP Query Console wp-query-console allows Code Injection.This issue affects WP Query Console: from n/a through <= 1.0.
CWE-94
Oct 28, 2024
CVE-2024-50623
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Cleo Harmony < 5.8.0.21 - Unrestricted File Upload
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution.
CWE-434
Oct 28, 2024
CVE-2024-9047
9.8
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Iptanus Wordpress File Upload < 4.24.12 - Path Traversal
The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
CWE-22
Oct 12, 2024
CVE-2024-9707
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.90
Themehunk Hunk Companion < 1.8.5 - Missing Authorization
The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
CWE-862
Oct 11, 2024
CVE-2024-8963
9.4
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Endpoint Manager Cloud Services Appliance - Path Traversal
Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality.
CWE-22
Sep 19, 2024
CVE-2024-45591
5.3
MEDIUM
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.86
Xwiki < 15.10.9 - Missing Authorization
XWiki Platform is a generic wiki platform. The REST API exposes the history of any page in XWiki of which the attacker knows the name. The exposed information includes for each modification of the page the time of the modification, the version number, the author of the modification (both username and displayed name) and the version comment. This information is exposed regardless of the rights setup, and even when the wiki is configured to be fully private. On a private wiki, this can be tested by accessing /xwiki/rest/wikis/xwiki/spaces/Main/pages/WebHome/history, if this shows the history of the main page then the installation is vulnerable. This has been patched in XWiki 15.10.9 and XWiki 16.3.0RC1.
CWE-359
Sep 10, 2024
CVE-2024-3673
9.1
CRITICAL
SSVC PoC
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Web Directory Free <1.7.3 - Code Injection
The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.
Aug 30, 2024
CVE-2024-43360
9.8
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.63
Zoneminder < 1.36.34 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.
CWE-89
Aug 12, 2024
CVE-2024-11003
7.8
HIGH
2 PoCs
Analysis
EPSS 0.08
Needrestart < 3.8 - OS Command Injection
Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.
CWE-78
Nov 19, 2024
CVE-2024-5153
9.1
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.05
Startklar Elementor Addons <1.7.15 - Path Traversal
The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory.
CWE-22
Jun 06, 2024
CVE-2024-45440
5.3
MEDIUM
3 PoCs
Analysis
NUCLEI
EPSS 0.87
Drupal 11.x-dev - Info Disclosure
core/authorize.php in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of hash_salt is file_get_contents of a file that does not exist.
CWE-209
Aug 29, 2024
CVE-2024-6386
9.9
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.74
WPML <4.6.12 - RCE
The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
CWE-1336
Aug 21, 2024
CVE-2024-23296
7.8
HIGH
KEV
SSVC ACTIVE
1 PoC
Analysis
EPSS 0.00
Apple Ipados < 16.7.8 - Out-of-Bounds Write
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.4 and iPadOS 17.4, macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.7, tvOS 17.4, visionOS 1.1, watchOS 10.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
CWE-787
Mar 05, 2024
CVE-2024-54001
5.5
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Kanboard - XSS
Kanboard is project management software that focuses on the Kanban methodology. HTML can be injected and stored into the application settings section. The fields application_language, application_date_format,application_timezone and application_time_format allow arbirary user input which is reflected. The vulnerability can become xss if the user input is javascript code that bypass CSP. This vulnerability is fixed in 1.2.41.
CWE-80
Dec 05, 2024
CVE-2024-6297
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.04
WordPress Plugins - RCE
Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
Jun 25, 2024