Critical Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
4,101 results Clear all
CVE-2024-22533 9.8 CRITICAL 1 PoC EPSS 0.01
Before Beetl <3.15.12 - Code Injection
Before Beetl v3.15.12, the rendering template has a server-side template injection (SSTI) vulnerability. When the incoming template is controllable, it will be filtered by the DefaultNativeSecurityManager blacklist. Because blacklist filtering is not strict, the blacklist can be bypassed, leading to arbitrary code execution.
CWE-94 Feb 02, 2024
CVE-2024-40542 9.8 CRITICAL 1 PoC EPSS 0.00
my-springsecurity-plus <2024.07.03 - SQL Injection
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/role?offset.
CWE-89 Jul 12, 2024
CVE-2024-40541 9.8 CRITICAL 1 PoC EPSS 0.00
my-springsecurity-plus <2024.07.03 - SQL Injection
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept/build.
CWE-89 Jul 12, 2024
CVE-2024-40540 9.8 CRITICAL 1 PoC EPSS 0.00
my-springsecurity-plus <2024.07.03 - SQL Injection
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept.
CWE-89 Jul 12, 2024
CVE-2024-40539 9.8 CRITICAL 1 PoC EPSS 0.00
my-springsecurity-plus <2024.07.03 - SQL Injection
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/user.
CWE-89 Jul 12, 2024
CVE-2024-57521 10.0 CRITICAL 2 PoCs Analysis EPSS 0.01
Ruoyi < 4.7.9 - SQL Injection
SQL Injection vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the createTable function in SqlUtil.java.
CWE-89 Dec 23, 2025
CVE-2024-52786 9.8 CRITICAL 1 PoC EPSS 0.01
Anji-plus AJ-Report <1.4.2 - Auth Bypass
An authentication bypass vulnerability in anji-plus AJ-Report up to v1.4.2 allows unauthenticated attackers to execute arbitrary code via a crafted URL.
CWE-287 Aug 22, 2025
CVE-2024-50645 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
MallChat v1.0-SNAPSHOT - Auth Bypass
MallChat v1.0-SNAPSHOT has an authentication bypass vulnerability. An attacker can exploit this vulnerability to access API without any token.
CWE-287 Aug 22, 2025
CVE-2024-50644 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
zhisheng17 blog 3.0.1-SNAPSHOT - Auth Bypass
zhisheng17 blog 3.0.1-SNAPSHOT has an authentication bypass vulnerability. An attacker can exploit this vulnerability to access API without any token.
CWE-287 Aug 22, 2025
CVE-2024-57768 9.8 CRITICAL 1 PoC EPSS 0.00
Jfinaloa < 2025-01-01 - SQL Injection
JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component validRoleKey?sysRole.key.
CWE-89 Jan 16, 2025
CVE-2024-57766 9.1 CRITICAL 1 PoC EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/editField.
CWE-502 Jan 15, 2025
CVE-2024-57764 9.1 CRITICAL 1 PoC EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/add.
CWE-502 Jan 15, 2025
CVE-2024-57763 9.1 CRITICAL 1 PoC EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/addField.
CWE-502 Jan 15, 2025
CVE-2024-55461 9.8 CRITICAL 1 PoC EPSS 0.01
Seacms < 13.0 - Command Injection
SeaCMS <=13.0 is vulnerable to command execution in phome.php via the function Ebak_RepPathFiletext().
CWE-77 Dec 18, 2024
CVE-2024-46535 9.8 CRITICAL 1 PoC EPSS 0.01
Ketr Jepaas - SQL Injection
Jepaas v7.2.8 was discovered to contain a SQL injection vulnerability via the orderSQL parameter at /homePortal/loadUserMsg.
CWE-89 Oct 14, 2024
CVE-2024-31866 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Apache Zeppelin <0.11.1 - RCE
Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin. The attackers can execute shell scripts or malicious code by overriding configuration like ZEPPELIN_INTP_CLASSPATH_OVERRIDES. This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1. Users are recommended to upgrade to version 0.11.1, which fixes the issue.
CWE-116 Apr 09, 2024
CVE-2024-45409 10.0 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.42
Ruby-SAML <=1.16.0 - Auth Bypass
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
CWE-347 Sep 10, 2024
CVE-2024-37288 9.9 CRITICAL 1 PoC Analysis EPSS 0.02
Elastic Kibana - Insecure Deserialization
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
CWE-502 Sep 09, 2024
CVE-2024-55879 9.1 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.16
Xwiki < 15.10.9 - Missing Authorization
XWiki Platform is a generic wiki platform. Starting in version 2.3 and prior to versions 15.10.9, 16.3.0, any user with script rights can perform arbitrary remote code execution by adding instances of `XWiki.ConfigurableClass` to any page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.9 and 16.3.0. No known workarounds are available except upgrading.
CWE-862 Dec 12, 2024
CVE-2024-23692 9.8 CRITICAL KEV RANSOMWARE 17 PoCs Analysis NUCLEI EPSS 0.94
Rejetto HTTP File Server - Template injection
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
CWE-1336 May 31, 2024