Latest Vulnerabilities with Public Exploits

Updated 47m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,905 CVEs tracked 53,713 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,668 vendors 43,959 researchers
53,713 results Clear all
CVE-2024-34361 8.5 HIGH SSVC PoC 1 PoC Analysis EPSS 0.58
Pi-hole <5.18.3 - Command Injection
Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. A vulnerability in versions prior to 5.18.3 allows an authenticated user to make internal requests to the server via the `gravity_DownloadBlocklistFromUrl()` function. Depending on some circumstances, the vulnerability could lead to remote command execution. Version 5.18.3 contains a patch for this issue.
CWE-918 Jul 05, 2024
CVE-2024-12227 5.5 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
MSI Dragon Center <2.0.146.0 - Null Pointer Dereference
A vulnerability, which was classified as problematic, was found in MSI Dragon Center up to 2.0.146.0. This affects the function MmUnMapIoSpace in the library NTIOLib_X64.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. Upgrading to version 2.0.148.0 is able to address this issue. It is recommended to upgrade the affected component.
CWE-404 Dec 05, 2024
CVE-2024-48139 7.5 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Blackbox AI <1.3.95 - Info Disclosure
A prompt injection vulnerability in the chatbox of Blackbox AI v1.3.95 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message.
CWE-77 Oct 24, 2024
CVE-2024-11467 7.8 HIGH 1 PoC Analysis EPSS 0.00
Omnissa Horizon Client - Privilege Escalation
Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.
CWE-269 Feb 04, 2025
CVE-2024-6651 6.1 MEDIUM SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.14
WordPress File Upload <4.24.8 - XSS
The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CWE-79 Aug 06, 2024
CVE-2024-9932 9.8 CRITICAL 4 PoCs Analysis EPSS 0.75
Wux Blog Editor <3.0.0 - File Upload
The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Oct 26, 2024
CVE-2024-50526 10.0 CRITICAL 1 PoC Analysis EPSS 0.01
Lindeni Multi Purpose Mail Form < 1.0.2 - Unrestricted File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in Lindeni Mahlalela Multi Purpose Mail Form multi-purpose-mail-form allows Upload a Web Shell to a Web Server.This issue affects Multi Purpose Mail Form: from n/a through <= 1.0.2.
CWE-434 Nov 04, 2024
CVE-2024-51791 10.0 CRITICAL 1 PoC Analysis EPSS 0.01
Made I.T. Forms <2.8.0 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms forms-by-made-it allows Upload a Web Shell to a Web Server.This issue affects Forms: from n/a through <= 2.8.0.
CWE-434 Nov 11, 2024
CVE-2024-51793 10.0 CRITICAL 5 PoCs Analysis EPSS 0.52
Webful Creations Computer Repair Shop <3.8115 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in Ateeq Rafeeq RepairBuddy computer-repair-shop allows Upload a Web Shell to a Web Server.This issue affects RepairBuddy: from n/a through <= 3.8115.
CWE-434 Nov 11, 2024
CVE-2024-38476 9.8 CRITICAL 2 PoCs Analysis EPSS 0.05
Apache HTTP Server <2.4.60 - Info Disclosure/SSRF
Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CWE-829 Jul 01, 2024
CVE-2024-58290 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.00
Xhibiter NFT Marketplace 1.10.2 - SQL Injection
Xhibiter NFT Marketplace 1.10.2 contains a SQL injection vulnerability in the collections endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can exploit boolean-based, time-based, and UNION-based SQL injection techniques to potentially extract or manipulate database information by sending crafted payloads to the collections page.
CWE-89 Dec 11, 2025
CVE-2024-43400 9.0 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.06
XWiki Platform - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript. This requires social engineer to trick a user to follow the URL. This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0.
CWE-79 Aug 19, 2024
CVE-2024-8465 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
SQL Injection - Info Disclosure
SQL injection vulnerability, by which an attacker could send a specially designed query through user_id parameter in /jobportal/admin/user/controller.php, and retrieve all the information stored in it.
CWE-89 Sep 05, 2024
CVE-2024-11635 9.8 CRITICAL 1 PoC Analysis EPSS 0.24
WordPress File Upload <4.24.12 - RCE
The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.
CWE-94 Jan 08, 2025
CVE-2024-46982 7.5 HIGH EXPLOITED 5 PoCs Analysis EPSS 0.49
Vercel Next.js < 13.5.7 - IDOR
Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.
CWE-639 Sep 17, 2024
CVE-2024-0692 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.78
SolarWinds Security Event Manager - RCE
The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
CWE-502 Mar 01, 2024
CVE-2024-47554 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
Apache Commons IO <2.14.0 - DoS
Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.
CWE-400 Oct 03, 2024
CVE-2024-38355 7.3 HIGH 1 PoC Analysis EPSS 0.00
Socket.IO <4.6.2 - DoS
Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `[email protected]` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
CWE-20 Jun 19, 2024
CVE-2024-0368 8.6 HIGH 1 PoC Analysis EPSS 0.02
Hustle - Email Marketing - Info Disclosure
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.8.3 via hardcoded API Keys. This makes it possible for unauthenticated attackers to extract sensitive data including PII.
CWE-522 Mar 13, 2024
CVE-2024-24401 9.8 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.58
Nagios XI - SQL Injection
SQL Injection vulnerability in Nagios XI 2024R1.01 allows a remote attacker to execute arbitrary code via a crafted payload to the monitoringwizard.php component.
CWE-89 Feb 26, 2024