Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,880 CVEs tracked 53,712 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,664 vendors 43,956 researchers
53,712 results Clear all
CVE-2024-11305 6.3 MEDIUM EXPLOITED SSVC PoC 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.46
Altenergy Power Control Software <20241108 - SQL Injection
A vulnerability classified as critical was found in Altenergy Power Control Software up to 20241108. This vulnerability affects the function get_status_zigbee of the file /index.php/display/status_zigbee. The manipulation of the argument date leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-74 Nov 18, 2024
CVE-2024-9935 7.5 HIGH 5 PoCs Analysis NUCLEI EPSS 0.94
PDF Generator Addon - Path Traversal
The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.0.0 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. CVE-2025-24569 may be a duplicate of this issue.
CWE-22 Nov 16, 2024
CVE-2024-52295 9.8 CRITICAL SSVC PoC 1 PoC 1 Writeup Analysis EPSS 0.01
DataEase <2.10.2 - Auth Bypass
DataEase is an open source data visualization analysis tool. Prior to 2.10.2, DataEase allows attackers to forge jwt and take over services. The JWT secret is hardcoded in the code, and the UID and OID are hardcoded. The vulnerability has been fixed in v2.10.2.
CWE-798 Nov 13, 2024
CVE-2024-48307 9.8 CRITICAL EXPLOITED SSVC PoC 2 PoCs Analysis NUCLEI EPSS 0.92
Jeecg Boot - SQL Injection
JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.
CWE-89 Oct 31, 2024
CVE-2024-9989 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.93
WordPress Crypto <2.15 - Auth Bypass
The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.18. This is due to a limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
CWE-288 Oct 29, 2024
CVE-2024-50498 10.0 CRITICAL EXPLOITED SSVC PoC 7 PoCs Analysis NUCLEI EPSS 0.92
Lubus WP Query Console < 1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Ajit Bohra WP Query Console wp-query-console allows Code Injection.This issue affects WP Query Console: from n/a through <= 1.0.
CWE-94 Oct 28, 2024
CVE-2024-50623 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 5 PoCs Analysis NUCLEI EPSS 0.94
Cleo Harmony < 5.8.0.21 - Unrestricted File Upload
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution.
CWE-434 Oct 28, 2024
CVE-2024-9047 9.8 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.94
Iptanus Wordpress File Upload < 4.24.12 - Path Traversal
The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
CWE-22 Oct 12, 2024
CVE-2024-9707 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.90
Themehunk Hunk Companion < 1.8.5 - Missing Authorization
The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
CWE-862 Oct 11, 2024
CVE-2024-8963 9.4 CRITICAL KEV SSVC ACTIVE 3 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Endpoint Manager Cloud Services Appliance - Path Traversal
Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality.
CWE-22 Sep 19, 2024
CVE-2024-45591 5.3 MEDIUM 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.86
Xwiki < 15.10.9 - Missing Authorization
XWiki Platform is a generic wiki platform. The REST API exposes the history of any page in XWiki of which the attacker knows the name. The exposed information includes for each modification of the page the time of the modification, the version number, the author of the modification (both username and displayed name) and the version comment. This information is exposed regardless of the rights setup, and even when the wiki is configured to be fully private. On a private wiki, this can be tested by accessing /xwiki/rest/wikis/xwiki/spaces/Main/pages/WebHome/history, if this shows the history of the main page then the installation is vulnerable. This has been patched in XWiki 15.10.9 and XWiki 16.3.0RC1.
CWE-359 Sep 10, 2024
CVE-2024-3673 9.1 CRITICAL SSVC PoC 3 PoCs Analysis NUCLEI EPSS 0.92
Web Directory Free <1.7.3 - Code Injection
The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.
Aug 30, 2024
CVE-2024-43360 9.8 CRITICAL EXPLOITED SSVC PoC 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.63
Zoneminder < 1.36.34 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.
CWE-89 Aug 12, 2024
CVE-2024-11003 7.8 HIGH 2 PoCs Analysis EPSS 0.08
Needrestart < 3.8 - OS Command Injection
Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.
CWE-78 Nov 19, 2024
CVE-2024-5153 9.1 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.05
Startklar Elementor Addons <1.7.15 - Path Traversal
The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory.
CWE-22 Jun 06, 2024
CVE-2024-45440 5.3 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.87
Drupal 11.x-dev - Info Disclosure
core/authorize.php in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of hash_salt is file_get_contents of a file that does not exist.
CWE-209 Aug 29, 2024
CVE-2024-6386 9.9 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.74
WPML <4.6.12 - RCE
The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
CWE-1336 Aug 21, 2024
CVE-2024-23296 7.8 HIGH KEV SSVC ACTIVE 1 PoC Analysis EPSS 0.00
Apple Ipados < 16.7.8 - Out-of-Bounds Write
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.4 and iPadOS 17.4, macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.7, tvOS 17.4, visionOS 1.1, watchOS 10.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
CWE-787 Mar 05, 2024
CVE-2024-54001 5.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Kanboard - XSS
Kanboard is project management software that focuses on the Kanban methodology. HTML can be injected and stored into the application settings section. The fields application_language, application_date_format,application_timezone and application_time_format allow arbirary user input which is reflected. The vulnerability can become xss if the user input is javascript code that bypass CSP. This vulnerability is fixed in 1.2.41.
CWE-80 Dec 05, 2024
CVE-2024-6297 10.0 CRITICAL 1 PoC Analysis EPSS 0.04
WordPress Plugins - RCE
Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
Jun 25, 2024