Critical Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2024-22533
9.8
CRITICAL
1 PoC
EPSS 0.01
Before Beetl <3.15.12 - Code Injection
Before Beetl v3.15.12, the rendering template has a server-side template injection (SSTI) vulnerability. When the incoming template is controllable, it will be filtered by the DefaultNativeSecurityManager blacklist. Because blacklist filtering is not strict, the blacklist can be bypassed, leading to arbitrary code execution.
CWE-94
Feb 02, 2024
CVE-2024-40542
9.8
CRITICAL
1 PoC
EPSS 0.00
my-springsecurity-plus <2024.07.03 - SQL Injection
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/role?offset.
CWE-89
Jul 12, 2024
CVE-2024-40541
9.8
CRITICAL
1 PoC
EPSS 0.00
my-springsecurity-plus <2024.07.03 - SQL Injection
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept/build.
CWE-89
Jul 12, 2024
CVE-2024-40540
9.8
CRITICAL
1 PoC
EPSS 0.00
my-springsecurity-plus <2024.07.03 - SQL Injection
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept.
CWE-89
Jul 12, 2024
CVE-2024-40539
9.8
CRITICAL
1 PoC
EPSS 0.00
my-springsecurity-plus <2024.07.03 - SQL Injection
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/user.
CWE-89
Jul 12, 2024
CVE-2024-57521
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Ruoyi < 4.7.9 - SQL Injection
SQL Injection vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the createTable function in SqlUtil.java.
CWE-89
Dec 23, 2025
CVE-2024-52786
9.8
CRITICAL
1 PoC
EPSS 0.01
Anji-plus AJ-Report <1.4.2 - Auth Bypass
An authentication bypass vulnerability in anji-plus AJ-Report up to v1.4.2 allows unauthenticated attackers to execute arbitrary code via a crafted URL.
CWE-287
Aug 22, 2025
CVE-2024-50645
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
MallChat v1.0-SNAPSHOT - Auth Bypass
MallChat v1.0-SNAPSHOT has an authentication bypass vulnerability. An attacker can exploit this vulnerability to access API without any token.
CWE-287
Aug 22, 2025
CVE-2024-50644
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
zhisheng17 blog 3.0.1-SNAPSHOT - Auth Bypass
zhisheng17 blog 3.0.1-SNAPSHOT has an authentication bypass vulnerability. An attacker can exploit this vulnerability to access API without any token.
CWE-287
Aug 22, 2025
CVE-2024-57768
9.8
CRITICAL
1 PoC
EPSS 0.00
Jfinaloa < 2025-01-01 - SQL Injection
JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component validRoleKey?sysRole.key.
CWE-89
Jan 16, 2025
CVE-2024-57766
9.1
CRITICAL
1 PoC
EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/editField.
CWE-502
Jan 15, 2025
CVE-2024-57764
9.1
CRITICAL
1 PoC
EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/add.
CWE-502
Jan 15, 2025
CVE-2024-57763
9.1
CRITICAL
1 PoC
EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/addField.
CWE-502
Jan 15, 2025
CVE-2024-55461
9.8
CRITICAL
1 PoC
EPSS 0.01
Seacms < 13.0 - Command Injection
SeaCMS <=13.0 is vulnerable to command execution in phome.php via the function Ebak_RepPathFiletext().
CWE-77
Dec 18, 2024
CVE-2024-46535
9.8
CRITICAL
1 PoC
EPSS 0.01
Ketr Jepaas - SQL Injection
Jepaas v7.2.8 was discovered to contain a SQL injection vulnerability via the orderSQL parameter at /homePortal/loadUserMsg.
CWE-89
Oct 14, 2024
CVE-2024-31866
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Apache Zeppelin <0.11.1 - RCE
Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.
The attackers can execute shell scripts or malicious code by overriding configuration like ZEPPELIN_INTP_CLASSPATH_OVERRIDES.
This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.
Users are recommended to upgrade to version 0.11.1, which fixes the issue.
CWE-116
Apr 09, 2024
CVE-2024-45409
10.0
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.42
Ruby-SAML <=1.16.0 - Auth Bypass
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
CWE-347
Sep 10, 2024
CVE-2024-37288
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.02
Elastic Kibana - Insecure Deserialization
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
CWE-502
Sep 09, 2024
CVE-2024-55879
9.1
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.16
Xwiki < 15.10.9 - Missing Authorization
XWiki Platform is a generic wiki platform. Starting in version 2.3 and prior to versions 15.10.9, 16.3.0, any user with script rights can perform arbitrary remote code execution by adding instances of `XWiki.ConfigurableClass` to any page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.9 and 16.3.0. No known workarounds are available except upgrading.
CWE-862
Dec 12, 2024
CVE-2024-23692
9.8
CRITICAL
KEV
RANSOMWARE
17 PoCs
Analysis
NUCLEI
EPSS 0.94
Rejetto HTTP File Server - Template injection
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
CWE-1336
May 31, 2024