Latest Vulnerabilities with Public Exploits
Updated 47m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,713 results
Clear all
CVE-2024-34361
8.5
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.58
Pi-hole <5.18.3 - Command Injection
Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. A vulnerability in versions prior to 5.18.3 allows an authenticated user to make internal requests to the server via the `gravity_DownloadBlocklistFromUrl()` function. Depending on some circumstances, the vulnerability could lead to remote command execution. Version 5.18.3 contains a patch for this issue.
CWE-918
Jul 05, 2024
CVE-2024-12227
5.5
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
MSI Dragon Center <2.0.146.0 - Null Pointer Dereference
A vulnerability, which was classified as problematic, was found in MSI Dragon Center up to 2.0.146.0. This affects the function MmUnMapIoSpace in the library NTIOLib_X64.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. Upgrading to version 2.0.148.0 is able to address this issue. It is recommended to upgrade the affected component.
CWE-404
Dec 05, 2024
CVE-2024-48139
7.5
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Blackbox AI <1.3.95 - Info Disclosure
A prompt injection vulnerability in the chatbox of Blackbox AI v1.3.95 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message.
CWE-77
Oct 24, 2024
CVE-2024-11467
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Omnissa Horizon Client - Privilege Escalation
Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.
CWE-269
Feb 04, 2025
CVE-2024-6651
6.1
MEDIUM
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.14
WordPress File Upload <4.24.8 - XSS
The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CWE-79
Aug 06, 2024
CVE-2024-9932
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.75
Wux Blog Editor <3.0.0 - File Upload
The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Oct 26, 2024
CVE-2024-50526
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.01
Lindeni Multi Purpose Mail Form < 1.0.2 - Unrestricted File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in Lindeni Mahlalela Multi Purpose Mail Form multi-purpose-mail-form allows Upload a Web Shell to a Web Server.This issue affects Multi Purpose Mail Form: from n/a through <= 1.0.2.
CWE-434
Nov 04, 2024
CVE-2024-51791
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.01
Made I.T. Forms <2.8.0 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms forms-by-made-it allows Upload a Web Shell to a Web Server.This issue affects Forms: from n/a through <= 2.8.0.
CWE-434
Nov 11, 2024
CVE-2024-51793
10.0
CRITICAL
5 PoCs
Analysis
EPSS 0.52
Webful Creations Computer Repair Shop <3.8115 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in Ateeq Rafeeq RepairBuddy computer-repair-shop allows Upload a Web Shell to a Web Server.This issue affects RepairBuddy: from n/a through <= 3.8115.
CWE-434
Nov 11, 2024
CVE-2024-38476
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.05
Apache HTTP Server <2.4.60 - Info Disclosure/SSRF
Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CWE-829
Jul 01, 2024
CVE-2024-58290
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.00
Xhibiter NFT Marketplace 1.10.2 - SQL Injection
Xhibiter NFT Marketplace 1.10.2 contains a SQL injection vulnerability in the collections endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can exploit boolean-based, time-based, and UNION-based SQL injection techniques to potentially extract or manipulate database information by sending crafted payloads to the collections page.
CWE-89
Dec 11, 2025
CVE-2024-43400
9.0
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.06
XWiki Platform - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript. This requires social engineer to trick a user to follow the URL. This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0.
CWE-79
Aug 19, 2024
CVE-2024-8465
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
SQL Injection - Info Disclosure
SQL injection vulnerability, by which an attacker could send a specially designed query through user_id parameter in /jobportal/admin/user/controller.php, and retrieve all the information stored in it.
CWE-89
Sep 05, 2024
CVE-2024-11635
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.24
WordPress File Upload <4.24.12 - RCE
The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.
CWE-94
Jan 08, 2025
CVE-2024-46982
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
EPSS 0.49
Vercel Next.js < 13.5.7 - IDOR
Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.
CWE-639
Sep 17, 2024
CVE-2024-0692
8.8
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.78
SolarWinds Security Event Manager - RCE
The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
CWE-502
Mar 01, 2024
CVE-2024-47554
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
Apache Commons IO <2.14.0 - DoS
Uncontrolled Resource Consumption vulnerability in Apache Commons IO.
The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.
This issue affects Apache Commons IO: from 2.0 before 2.14.0.
Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.
CWE-400
Oct 03, 2024
CVE-2024-38355
7.3
HIGH
1 PoC
Analysis
EPSS 0.00
Socket.IO <4.6.2 - DoS
Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `[email protected]` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
CWE-20
Jun 19, 2024
CVE-2024-0368
8.6
HIGH
1 PoC
Analysis
EPSS 0.02
Hustle - Email Marketing - Info Disclosure
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.8.3 via hardcoded API Keys. This makes it possible for unauthenticated attackers to extract sensitive data including PII.
CWE-522
Mar 13, 2024
CVE-2024-24401
9.8
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.58
Nagios XI - SQL Injection
SQL Injection vulnerability in Nagios XI 2024R1.01 allows a remote attacker to execute arbitrary code via a crafted payload to the monitoringwizard.php component.
CWE-89
Feb 26, 2024