Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,880 CVEs tracked 53,712 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,664 vendors 43,956 researchers
53,712 results Clear all
CVE-2024-5243 7.5 HIGH 2 PoCs Analysis EPSS 0.02
Tp-link Omada Er605 Firmware - Buffer Overflow
TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22523.
CWE-120 May 23, 2024
CVE-2024-45590 7.5 HIGH 2 PoCs Analysis EPSS 0.02
Openjsf Body-parser < 1.20.3 - Denial of Service
body-parser is Node.js body parsing middleware. body-parser <1.20.3 is vulnerable to denial of service when url encoding is enabled. A malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. This issue is patched in 1.20.3.
CWE-405 Sep 10, 2024
CVE-2024-8699 7.2 HIGH SSVC PoC 1 PoC Analysis EPSS 0.01
Z-Downloads WP <1.11.5 - Privilege Escalation
The Z-Downloads WordPress plugin before 1.11.5 does not properly validate files uploaded, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)
May 15, 2025
CVE-2024-13873 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
Wpjobportal WP Job Portal < 2.2.9 - IDOR
The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.8 via the deleteUserPhoto() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to remove profile photos from users accounts. Please note that this does not officially delete the file.
CWE-639 Feb 22, 2025
CVE-2024-13428 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
WP Job Portal <2.2.6 - Insecure Direct Object Reference
The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the deleteCompanyLogo() due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to delete arbitrary company logos.
CWE-639 Feb 01, 2025
CVE-2024-13425 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
WP Job Portal <2.2.6 - Insecure Direct Object Reference
The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the enforcedelete() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Employer-level access and above, to delete other users companies.
CWE-639 Feb 01, 2025
CVE-2024-13372 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
WP Job Portal <2.2.6 - Insecure Direct Object Reference
The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the getresumefiledownloadbyid() and getallresumefiles() functions due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to download users resumes without the appropriate authorization to do so.
CWE-639 Feb 01, 2025
CVE-2024-11270 8.8 HIGH 1 PoC Analysis EPSS 0.09
Webinarpress < 1.33.25 - Missing Authorization
The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the 'sync-import-imgs' function and missing file type validation in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files that can lead to remote code execution.
CWE-862 Jan 08, 2025
CVE-2024-12131 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
Wpjobportal WP Job Portal < 2.2.6 - IDOR
The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.5 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit resumes for other applicants when applying for jobs.
CWE-639 Jan 07, 2025
CVE-2024-12132 4.3 MEDIUM 1 PoC Analysis EPSS 0.01
Wpjobportal WP Job Portal < 2.2.5 - IDOR
The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.4 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create jobs for companies that are unaffiliated with the attacker.
CWE-639 Jan 03, 2025
CVE-2024-9224 6.5 MEDIUM 2 PoCs Analysis EPSS 0.51
Kau-boys Hello World < 2.2.0 - Path Traversal
The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-22 Oct 01, 2024
CVE-2024-8252 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.42
Clean Login <1.14.5 - Code Injection
The Clean Login plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.14.5 via the 'template' attribute of the clean-login-register shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-829 Aug 30, 2024
CVE-2024-38788 7.6 HIGH 1 PoC Analysis EPSS 0.03
Uipress Lite < 3.4.07 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bởi Admin 2020 UiPress lite allows SQL Injection.This issue affects UiPress lite: from n/a through 3.4.06.
CWE-89 Jul 22, 2024
CVE-2024-38755 8.5 HIGH 1 PoC Analysis EPSS 0.06
Designinvento DirectoryPress <3.6.10 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Designinvento DirectoryPress allows SQL Injection.This issue affects DirectoryPress: from n/a through 3.6.10.
CWE-89 Jul 22, 2024
CVE-2024-38692 7.6 HIGH 1 PoC Analysis EPSS 0.05
Spiffy Calendar <4.9.11 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spiffy Plugins Spiffy Calendar allows SQL Injection.This issue affects Spiffy Calendar: from n/a through 4.9.11.
CWE-89 Jul 22, 2024
CVE-2024-5637 7.5 HIGH 1 PoC Analysis EPSS 0.06
WordPress Market Exporter <2.0.19 - Info Disclosure
The Market Exporter plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'remove_files' function in all versions up to, and including, 2.0.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to use path traversal to delete arbitrary files on the server.
CWE-22 Jun 07, 2024
CVE-2024-34555 10.0 CRITICAL 1 PoC Analysis EPSS 0.08
URBAN BASE Z-Downloads <1.11.3 - Unrestricted Upload
Unrestricted Upload of File with Dangerous Type vulnerability in URBAN BASE Z-Downloads.This issue affects Z-Downloads: from n/a through 1.11.3.
CWE-434 May 14, 2024
CVE-2024-32139 8.5 HIGH 1 PoC Analysis EPSS 0.07
Podlove Podcast Publisher <4.0.12 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.0.12.
CWE-89 Apr 15, 2024
CVE-2024-50602 5.9 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Netapp Active IQ Unified Manager < 2.6.4 - Improper Condition Check
An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.
CWE-754 Oct 27, 2024
CVE-2024-34361 8.5 HIGH SSVC PoC 1 PoC Analysis EPSS 0.58
Pi-hole <5.18.3 - Command Injection
Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. A vulnerability in versions prior to 5.18.3 allows an authenticated user to make internal requests to the server via the `gravity_DownloadBlocklistFromUrl()` function. Depending on some circumstances, the vulnerability could lead to remote command execution. Version 5.18.3 contains a patch for this issue.
CWE-918 Jul 05, 2024