Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,905 CVEs tracked 53,713 with exploits 4,860 exploited in wild 1,585 CISA KEV 4,078 Nuclei templates 53,668 vendors 43,959 researchers
53,713 results Clear all
CVE-2024-36971 7.8 HIGH KEV SSVC ACTIVE 1 PoC Analysis EPSS 0.00
Debian Linux < 4.19.316 - Use After Free
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets.
CWE-416 Jun 10, 2024
CVE-2024-32444 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
InspiryThemes RealHomes <4.3.6 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes realhomes allows Privilege Escalation.This issue affects RealHomes: from n/a through <= 4.3.6.
CWE-266 Sep 03, 2025
CVE-2024-39929 5.4 MEDIUM SSVC PoC 2 PoCs Analysis EPSS 0.60
Exim <4.97.1 - Info Disclosure
Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.
CWE-116 Jul 04, 2024
CVE-2024-57378 7.3 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Wazuh SIEM <4.8.2 - Privilege Escalation
Wazuh SIEM version 4.8.2 is affected by a broken access control vulnerability. This issue allows the unauthorized creation of internal users without assigning any existing user role, potentially leading to privilege escalation or unauthorized access to sensitive resources.
CWE-284 Feb 13, 2025
CVE-2024-7627 8.1 HIGH 2 PoCs Analysis EPSS 0.29
Bitapps File Manager < 6.5.6 - Race Condition
The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the 'checkSyntax' function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.
CWE-362 Sep 05, 2024
CVE-2024-21262 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Oracle Mysql - Incorrect Authorization
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/ODBC). Supported versions that are affected are 9.0.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).
CWE-863 Oct 15, 2024
CVE-2024-55211 8.4 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Think Router Tk-Rt-Wr135G V3.0.2-X000 - Auth Bypass
An issue in Think Router Tk-Rt-Wr135G V3.0.2-X000 allows attackers to bypass authentication via a crafted cookie.
CWE-565 Apr 17, 2025
CVE-2024-34740 7.8 HIGH 1 PoC Analysis EPSS 0.00
Google Android - Integer Overflow
In attributeBytesBase64 and attributeBytesHex of BinaryXmlSerializer.java, there is a possible arbitrary XML injection due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-190 Aug 15, 2024
CVE-2024-39309 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
NPM Parse-server < 6.5.7 - SQL Injection
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.
CWE-288 Jul 01, 2024
CVE-2024-38820 3.1 LOW 1 PoC Analysis EPSS 0.02
DataBinder - Info Disclosure
The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.
CWE-178 Oct 18, 2024
CVE-2024-28157 8.0 HIGH 1 PoC Analysis EPSS 0.04
Jenkins Gitbucket < 0.8 - XSS
Jenkins GitBucket Plugin 0.8 and earlier does not sanitize Gitbucket URLs on build views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.
CWE-79 Mar 06, 2024
CVE-2024-32022 9.1 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.03
Kohya_ss - Command Injection
Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable to command injection in basic_caption_gui.py. This vulnerability is fixed in 23.1.5.
CWE-77 Apr 16, 2024
CVE-2024-47051 9.1 CRITICAL 2 PoCs Analysis EPSS 0.01
Mautic <5.2.3 - RCE
This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users. * Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts. * Path Traversal File Deletion: A Path Traversal vulnerability exists in the upload validation process. Due to improper handling of path components, an authenticated user can manipulate the file deletion process to delete arbitrary files on the host system.
CWE-94 Feb 26, 2025
CVE-2024-38399 8.4 HIGH 1 PoC Analysis EPSS 0.00
Product <Version - Memory Corruption
Memory corruption while processing user packets to generate page faults.
CWE-416 Oct 07, 2024
CVE-2024-56903 8.1 HIGH SSVC PoC 1 PoC Analysis EPSS 0.00
Geovision GV-ASWeb <6.1.1.0 - CSRF
Geovision GV-ASWeb with the version 6.1.1.0 or less allows attackers to modify POST request method with the GET against critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.
CWE-352 Feb 03, 2025
CVE-2024-56901 8.8 HIGH SSVC PoC 3 PoCs Analysis EPSS 0.01
Geovision GV-ASWeb <=6.1.1.0 - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASWeb application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Administrator accounts via a crafted GET request method. This vulnerability is used in chain with CVE-2024-56903 for a successful CSRF attack.
CWE-352 Feb 03, 2025
CVE-2024-43630 7.8 HIGH 1 PoC Analysis EPSS 0.04
Microsoft Windows 10 21h2 < 10.0.19044.5131 - Stack Buffer Overflow
Windows Kernel Elevation of Privilege Vulnerability
CWE-121 Nov 12, 2024
CVE-2024-4157 7.5 HIGH 1 PoC Analysis EPSS 0.00
Fluentforms Contact Form < 5.1.16 - Insecure Deserialization
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.1.15 via deserialization of untrusted input in the extractDynamicValues function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. Successful exploitation requires the attacker to have "View Form" and "Manage Form" permissions, which must be explicitly set by an administrator. However, this requirement can be bypassed when this vulnerability is chained with CVE-2024-2771.
CWE-502 May 22, 2024
CVE-2024-4701 9.9 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.18
Com.netflix.genie Genie-web < 4.3.18 - Path Traversal
A path traversal issue potentially leading to remote code execution in Genie for all versions prior to 4.3.18
CWE-22 May 14, 2024
CVE-2024-45712 2.6 LOW 1 PoC Analysis EPSS 0.00
Solarwinds Serv-u < 15.5.1 - XSS
SolarWinds Serv-U is vulnerable to a client-side cross-site scripting (XSS) vulnerability. The vulnerability can only be performed by an authenticated account, on the local machine, from the local browser session. Therefore the risk is very low.
CWE-79 Apr 15, 2025