Latest Vulnerabilities with Public Exploits
Updated 47m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,713 results
Clear all
CVE-2024-54385
7.2
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.78
SoftLab Radio Player <2.0.82 - SSRF
Server-Side Request Forgery (SSRF) vulnerability in princeahmed Radio Player radio-player allows Server Side Request Forgery.This issue affects Radio Player: from n/a through <= 2.0.83.
CWE-918
Dec 16, 2024
CVE-2024-36412
10.0
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.94
SuiteCRM <7.14.4-8.6.1 - SQL Injection
SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
CWE-89
Jun 10, 2024
CVE-2024-5230
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.41
EnvaySoft FleetCart <4.1.1 - Info Disclosure
A vulnerability has been found in EnvaySoft FleetCart up to 4.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument razorpayKeyId leads to information disclosure. The attack can be launched remotely. It is recommended to upgrade the affected component. The identifier VDB-265981 was assigned to this vulnerability.
CWE-200
May 23, 2024
CVE-2024-4348
4.3
MEDIUM
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.16
osCommerce 4 - XSS
A vulnerability, which was classified as problematic, was found in osCommerce 4. Affected is an unknown function of the file /catalog/all-products. The manipulation of the argument cat leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-262488. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-79
Apr 30, 2024
CVE-2024-33575
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.05
User Meta <3.0 - Info Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
CWE-200
Apr 29, 2024
CVE-2024-0881
5.4
MEDIUM
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.13
WordPress Plugin <2.2.76 - Info Disclosure
The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel WordPress plugin before 2.2.76 does not have proper authorization, resulting in password protected posts to be displayed in the result of some unauthenticated AJAX actions, allowing unauthenticated users to read such posts
Apr 11, 2024
CVE-2024-3378
4.3
MEDIUM
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.03
iboss Secure Web Gateway <10.1 - XSS
A vulnerability has been found in iboss Secure Web Gateway up to 10.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login of the component Login Portal. The manipulation of the argument redirectUrl leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.2.0.160 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-259501 was assigned to this vulnerability.
CWE-79
Apr 06, 2024
CVE-2024-0337
6.1
MEDIUM
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.01
Travelpayouts < 1.1.17 - Open Redirect
The Travelpayouts: All Travel Brands in One Place WordPress plugin through 1.1.15 is vulnerable to Open Redirect due to insufficient validation on the travelpayouts_redirect variable. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
CWE-601
Mar 20, 2024
CVE-2024-28734
6.1
MEDIUM
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.11
Coda v.2024Q1 - Cross-Site Scripting
Cross Site Scripting vulnerability in Unit4 Financials by Coda prior to 2023Q4 allows a remote attacker to run arbitrary code via a crafted GET request using the cols parameter.
CWE-79
Mar 19, 2024
CVE-2024-0250
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.21
Deconf Analytics Insights < 6.3 - Open Redirect
The Analytics Insights for Google Analytics 4 (AIWP) WordPress plugin before 6.3 is vulnerable to Open Redirect due to insufficient validation on the redirect oauth2callback.php file. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
CWE-601
Feb 12, 2024
CVE-2024-43202
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
Apache DolphinScheduler <3.2.2 - RCE
Exposure of Remote Code Execution in Apache Dolphinscheduler.
This issue affects Apache DolphinScheduler: before 3.2.2.
We recommend users to upgrade Apache DolphinScheduler to version 3.2.2, which fixes the issue.
CWE-94
Aug 20, 2024
CVE-2024-37726
6.8
MEDIUM
SSVC PoC
2 PoCs
Analysis
EPSS 0.08
MSI Center <2.0.36.0 - Privilege Escalation
Insecure Permissions vulnerability in Micro-Star International Co., Ltd MSI Center v.2.0.36.0 allows a local attacker to escalate privileges via the Export System Info function in MSI.CentralServer.exe
CWE-269
Jul 03, 2024
CVE-2024-41997
6.6
MEDIUM
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Warp Terminal <2024.07.18 - Command Injection
An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine.
CWE-94
Oct 14, 2024
CVE-2024-55374
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
Vanderbilt Redcap - Information Disclosure
REDCap 14.3.13 allows an attacker to enumerate usernames due to an observable discrepancy between login attempts.
CWE-203
Jan 02, 2026
CVE-2024-52005
8.8
HIGH
1 PoC
Analysis
EPSS 0.00
Git - Info Disclosure
Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.
CWE-116
Jan 15, 2025
CVE-2024-44762
5.3
MEDIUM
SSVC PoC
3 PoCs
Analysis
NUCLEI
EPSS 0.15
Webmin Usermin <2.100 - Info Disclosure
A discrepancy in error messages for invalid login attempts in Webmin Usermin v2.100 allows attackers to enumerate valid user accounts.
CWE-209
Oct 16, 2024
CVE-2024-3553
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Tutor LMS - Info Disclosure
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the hide_notices function in all versions up to, and including, 2.6.2. This makes it possible for unauthenticated attackers to enable user registration on sites that may have it disabled.
CWE-862
May 02, 2024
CVE-2024-48910
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.03
Cure53 Dompurify < 2.4.2 - Prototype Pollution
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify was vulnerable to prototype pollution. This vulnerability is fixed in 2.4.2.
CWE-1321
Oct 31, 2024
CVE-2024-40110
9.8
CRITICAL
SSVC PoC
3 PoCs
Analysis
EPSS 0.32
Sourcecodester Poultry Farm Management System v1.0 - RCE
Sourcecodester Poultry Farm Management System v1.0 contains an Unauthenticated Remote Code Execution (RCE) vulnerability via the productimage parameter at /farm/product.php.
CWE-77
Jul 12, 2024
CVE-2024-39205
9.8
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.84
pyload-ng <0.5.0b3.dev85 - RCE
An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request.
Oct 28, 2024