Latest Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,905 CVEs tracked 53,713 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,668 vendors 43,959 researchers
53,713 results Clear all
CVE-2024-29943 9.8 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.54
Firefox < 124.0.1 - Memory Corruption
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1.
CWE-125 Mar 22, 2024
CVE-2024-12084 9.8 CRITICAL SSVC PoC 3 PoCs Analysis EPSS 0.03
Samba Rsync < 24.11 - Out-of-Bounds Write
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
CWE-122 Jan 15, 2025
CVE-2024-58258 7.2 HIGH 2 PoCs Analysis EPSS 0.01
SugarCRM <13.0.4, <14.0.1 - SSRF
SugarCRM before 13.0.4 and 14.x before 14.0.1 allows SSRF in the API module because a limited type of code injection can occur.
CWE-94 Jul 13, 2025
CVE-2024-22127 9.1 CRITICAL 1 PoC Analysis EPSS 0.02
SAP NetWeaver Administrator AS Java - Command Injection
SAP NetWeaver Administrator AS Java (Administrator Log Viewer plug-in) - version 7.50, allows an attacker with high privileges to upload potentially dangerous files which leads to command injection vulnerability. This would enable the attacker to run commands which can cause high impact on confidentiality, integrity and availability of the application.
CWE-77 Mar 12, 2024
CVE-2024-57045 9.8 CRITICAL SSVC PoC 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.67
D-Link DIR-859 <A3 1.05 - Auth Bypass
A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page.
CWE-287 Feb 18, 2025
CVE-2024-35374 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
Mocodo Online < 4.2.6 - Command Injection
Mocodo Mocodo Online 4.2.6 and below does not properly sanitize the sql_case input field in /web/generate.php, allowing remote attackers to execute arbitrary commands and potentially command injection, leading to remote code execution (RCE) under certain conditions.
CWE-77 May 24, 2024
CVE-2024-26169 7.8 HIGH KEV SSVC ACTIVE RANSOMWARE 1 PoC Analysis EPSS 0.35
Microsoft Windows 10 1507 - Improper Privilege Management
Windows Error Reporting Service Elevation of Privilege Vulnerability
CWE-269 Mar 12, 2024
CVE-2024-47167 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Gradio - SSRF
Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to **Server-Side Request Forgery (SSRF)** in the `/queue/join` endpoint. Gradio’s `async_save_url_to_cache` function allows attackers to force the Gradio server to send HTTP requests to user-controlled URLs. This could enable attackers to target internal servers or services within a local network and possibly exfiltrate data or cause unwanted internal requests. Additionally, the content from these URLs is stored locally, making it easier for attackers to upload potentially malicious files to the server. This impacts users deploying Gradio servers that use components like the Video component which involve URL fetching. Users are advised to upgrade to `gradio>=5` to address this issue. As a workaround, users can disable or heavily restrict URL-based inputs in their Gradio applications to trusted domains only. Additionally, implementing stricter URL validation (such as allowinglist-based validation) and ensuring that local or internal network addresses cannot be requested via the `/queue/join` endpoint can help mitigate the risk of SSRF attacks.
CWE-918 Oct 10, 2024
CVE-2024-4890 4.9 MEDIUM SSVC PoC 1 PoC Analysis EPSS 0.00
Litellm - SQL Injection
A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by injecting malicious SQL commands through the 'user_id' parameter, leading to potential unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. The affected version is 1.27.14.
CWE-89 Jun 06, 2024
CVE-2024-28231 9.6 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.01
Eprosima Fast Dds < 2.6.8 - Out-of-Bounds Write
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8, manipulated DATA Submessage can cause a heap overflow error in the Fast-DDS process, causing the process to be terminated remotely. Additionally, the payload_size in the DATA Submessage packet is declared as uint32_t. When a negative number, such as -1, is input into this variable, it results in an Integer Overflow (for example, -1 gets converted to 0xFFFFFFFF). This eventually leads to a heap-buffer-overflow, causing the program to terminate. Versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8 contain a fix for this issue.
CWE-122 Mar 20, 2024
CVE-2024-44349 9.8 CRITICAL SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.76
AnteeoWMS <4.7.34 - SQL Injection
A SQL injection vulnerability in login portal in AnteeoWMS before v4.7.34 allows unauthenticated attackers to execute arbitrary SQL commands via the username parameter and disclosure of some data in the underlying DB.
CWE-89 Oct 08, 2024
CVE-2024-28000 9.8 CRITICAL EXPLOITED SSVC PoC 6 PoCs Analysis NUCLEI EPSS 0.92
WordPress LiteSpeed Cache - Unauthenticated Privilege Escalation to Admin
Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache.This issue affects LiteSpeed Cache: from n/a through <= 6.3.0.1.
CWE-266 Aug 21, 2024
CVE-2024-46256 9.8 CRITICAL SSVC PoC 3 PoCs Analysis EPSS 0.60
Jc21 Nginx Proxy Manager - Command Injection
A Command injection vulnerability in requestLetsEncryptSsl in NginxProxyManager 2.11.3 allows an attacker to RCE via Add Let's Encrypt Certificate.
CWE-77 Sep 27, 2024
CVE-2024-40815 7.5 HIGH 1 PoC Analysis EPSS 0.07
macOS Ventura <13.6.8 - Info Disclosure
A race condition was addressed with additional validation. This issue is fixed in iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, macOS Ventura 13.6.8, tvOS 17.6, watchOS 10.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
CWE-352 Jul 29, 2024
CVE-2024-12641 9.6 CRITICAL 1 PoC Analysis EPSS 0.30
CHT Tenderdoctransfer < 0.41.157 - XSS
TenderDocTransfer from Chunghwa Telecom has a Reflected Cross-site scripting vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use specific APIs through phishing to execute arbitrary JavaScript code in the user’s browser. Since the web server set by the application supports Node.Js features, attackers can further leverage this to run OS commands.
CWE-79 Dec 16, 2024
CVE-2024-56800 7.4 HIGH 1 PoC Analysis EPSS 0.00
Firecrawl <1.1.1 - SSRF
Firecrawl is a web scraper that allows users to extract the content of a webpage for a large language model. Versions prior to 1.1.1 contain a server-side request forgery (SSRF) vulnerability. The scraping engine could be exploited by crafting a malicious site that redirects to a local IP address. This allowed exfiltration of local network resources through the API. The cloud service was patched on December 27th, 2024, and the maintainers have checked that no user data was exposed by this vulnerability. Scraping engines used in the open sourced version of Firecrawl were patched on December 29th, 2024, except for the playwright services which the maintainers have determined to be un-patchable. All users of open-source software (OSS) Firecrawl should upgrade to v1.1.1. As a workaround, OSS Firecrawl users should supply the playwright services with a secure proxy. A proxy can be specified through the `PROXY_SERVER` env in the environment variables. Please refer to the documentation for instructions. Ensure that the proxy server one is using is setup to block all traffic going to link-local IP addresses.
CWE-918 Dec 30, 2024
CVE-2024-39713 8.6 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
Rocket.chat < 6.10.1 - SSRF
A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1.
CWE-918 Aug 05, 2024
CVE-2024-39840 8.8 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Factorio <1.1.101 - RCE
Factorio before 1.1.101 allows a crafted server to execute arbitrary code on clients via a custom map that leverages the ability of certain Lua base module functions to execute bytecode and generate fake objects.
CWE-787 Jun 29, 2024
CVE-2024-13513 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Oliver POS - Info Disclosure
The Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2.3 via the logging functionality. This makes it possible for unauthenticated attackers to extract sensitive data including the plugin's clientToken, which in turn can be used to change user account information including emails and account type. This allows attackers to then change account passwords resulting in a complete site takeover. Version 2.4.2.3 disabled logging but left sites with existing log files vulnerable.
CWE-862 Feb 15, 2025
CVE-2024-58239 5.5 MEDIUM 2 PoCs Analysis EPSS 0.00
Linux Kernel - Use After Free
In the Linux kernel, the following vulnerability has been resolved: tls: stop recv() if initial process_rx_list gave us non-DATA If we have a non-DATA record on the rx_list and another record of the same type still on the queue, we will end up merging them: - process_rx_list copies the non-DATA record - we start the loop and process the first available record since it's of the same type - we break out of the loop since the record was not DATA Just check the record type and jump to the end in case process_rx_list did some work.
Aug 22, 2025