Latest Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,713 results
Clear all
CVE-2024-36971
7.8
HIGH
KEV
SSVC ACTIVE
1 PoC
Analysis
EPSS 0.00
Debian Linux < 4.19.316 - Use After Free
In the Linux kernel, the following vulnerability has been resolved:
net: fix __dst_negative_advice() race
__dst_negative_advice() does not enforce proper RCU rules when
sk->dst_cache must be cleared, leading to possible UAF.
RCU rules are that we must first clear sk->sk_dst_cache,
then call dst_release(old_dst).
Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.
Given that ip6_negative_advice() has special logic
against RTF_CACHE, this means each of the three ->negative_advice()
existing methods must perform the sk_dst_reset() themselves.
Note the check against NULL dst is centralized in
__dst_negative_advice(), there is no need to duplicate
it in various callbacks.
Many thanks to Clement Lecigne for tracking this issue.
This old bug became visible after the blamed commit, using UDP sockets.
CWE-416
Jun 10, 2024
CVE-2024-32444
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
InspiryThemes RealHomes <4.3.6 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes realhomes allows Privilege Escalation.This issue affects RealHomes: from n/a through <= 4.3.6.
CWE-266
Sep 03, 2025
CVE-2024-39929
5.4
MEDIUM
SSVC PoC
2 PoCs
Analysis
EPSS 0.60
Exim <4.97.1 - Info Disclosure
Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.
CWE-116
Jul 04, 2024
CVE-2024-57378
7.3
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Wazuh SIEM <4.8.2 - Privilege Escalation
Wazuh SIEM version 4.8.2 is affected by a broken access control vulnerability. This issue allows the unauthorized creation of internal users without assigning any existing user role, potentially leading to privilege escalation or unauthorized access to sensitive resources.
CWE-284
Feb 13, 2025
CVE-2024-7627
8.1
HIGH
2 PoCs
Analysis
EPSS 0.29
Bitapps File Manager < 6.5.6 - Race Condition
The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the 'checkSyntax' function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.
CWE-362
Sep 05, 2024
CVE-2024-21262
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Oracle Mysql - Incorrect Authorization
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/ODBC). Supported versions that are affected are 9.0.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).
CWE-863
Oct 15, 2024
CVE-2024-55211
8.4
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Think Router Tk-Rt-Wr135G V3.0.2-X000 - Auth Bypass
An issue in Think Router Tk-Rt-Wr135G V3.0.2-X000 allows attackers to bypass authentication via a crafted cookie.
CWE-565
Apr 17, 2025
CVE-2024-34740
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Google Android - Integer Overflow
In attributeBytesBase64 and attributeBytesHex of BinaryXmlSerializer.java, there is a possible arbitrary XML injection due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-190
Aug 15, 2024
CVE-2024-39309
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
NPM Parse-server < 6.5.7 - SQL Injection
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.
CWE-288
Jul 01, 2024
CVE-2024-38820
3.1
LOW
1 PoC
Analysis
EPSS 0.02
DataBinder - Info Disclosure
The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.
CWE-178
Oct 18, 2024
CVE-2024-28157
8.0
HIGH
1 PoC
Analysis
EPSS 0.04
Jenkins Gitbucket < 0.8 - XSS
Jenkins GitBucket Plugin 0.8 and earlier does not sanitize Gitbucket URLs on build views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.
CWE-79
Mar 06, 2024
CVE-2024-32022
9.1
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.03
Kohya_ss - Command Injection
Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable to command injection in basic_caption_gui.py. This vulnerability is fixed in 23.1.5.
CWE-77
Apr 16, 2024
CVE-2024-47051
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Mautic <5.2.3 - RCE
This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users.
* Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts.
* Path Traversal File Deletion: A Path Traversal vulnerability exists in the upload validation process. Due to improper handling of path components, an authenticated user can manipulate the file deletion process to delete arbitrary files on the host system.
CWE-94
Feb 26, 2025
CVE-2024-38399
8.4
HIGH
1 PoC
Analysis
EPSS 0.00
Product <Version - Memory Corruption
Memory corruption while processing user packets to generate page faults.
CWE-416
Oct 07, 2024
CVE-2024-56903
8.1
HIGH
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Geovision GV-ASWeb <6.1.1.0 - CSRF
Geovision GV-ASWeb with the version 6.1.1.0 or less allows attackers to modify POST request method with the GET against critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.
CWE-352
Feb 03, 2025
CVE-2024-56901
8.8
HIGH
SSVC PoC
3 PoCs
Analysis
EPSS 0.01
Geovision GV-ASWeb <=6.1.1.0 - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASWeb application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Administrator accounts via a crafted GET request method. This vulnerability is used in chain with CVE-2024-56903 for a successful CSRF attack.
CWE-352
Feb 03, 2025
CVE-2024-43630
7.8
HIGH
1 PoC
Analysis
EPSS 0.04
Microsoft Windows 10 21h2 < 10.0.19044.5131 - Stack Buffer Overflow
Windows Kernel Elevation of Privilege Vulnerability
CWE-121
Nov 12, 2024
CVE-2024-4157
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Fluentforms Contact Form < 5.1.16 - Insecure Deserialization
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.1.15 via deserialization of untrusted input in the extractDynamicValues function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. Successful exploitation requires the attacker to have "View Form" and "Manage Form" permissions, which must be explicitly set by an administrator. However, this requirement can be bypassed when this vulnerability is chained with CVE-2024-2771.
CWE-502
May 22, 2024
CVE-2024-4701
9.9
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.18
Com.netflix.genie Genie-web < 4.3.18 - Path Traversal
A path traversal issue potentially leading to remote code execution in Genie for all versions prior to 4.3.18
CWE-22
May 14, 2024
CVE-2024-45712
2.6
LOW
1 PoC
Analysis
EPSS 0.00
Solarwinds Serv-u < 15.5.1 - XSS
SolarWinds Serv-U is vulnerable to a client-side cross-site scripting (XSS) vulnerability. The vulnerability can only be performed by an authenticated account, on the local machine, from the local browser session. Therefore the risk is very low.
CWE-79
Apr 15, 2025