Critical Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2024-39930
9.9
CRITICAL
5 PoCs
Analysis
EPSS 0.12
Gogs < 0.13.0 - Remote Code Execution
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
CWE-88
Jul 04, 2024
CVE-2024-51978
9.8
CRITICAL
EXPLOITED
1 PoC
2 Writeups
Analysis
NUCLEI
EPSS 0.54
Unknown Device - Info Disclosure
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
CWE-1391
Jun 25, 2025
CVE-2024-53544
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
NovaCHRON Smart Time Plus <8.6 - SQL Injection
NovaCHRON Zeitsysteme GmbH & Co. KG Smart Time Plus v8.x to v8.6 was discovered to contain a SQL injection vulnerability via the getCookieNames method in the smarttimeplus/MySQLConnection endpoint.
CWE-89
Feb 24, 2025
CVE-2024-51818
9.3
CRITICAL
2 PoCs
Analysis
EPSS 0.19
Fancy Product Designer <6.4.3 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in radykal Fancy Product Designer fancy-product-designer.This issue affects Fancy Product Designer: from n/a through <= 6.4.3.
CWE-89
Jan 21, 2025
CVE-2024-42327
9.9
CRITICAL
11 PoCs
Analysis
EPSS 0.91
Zabbix < 6.0.32 - SQL Injection
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
CWE-89
Nov 27, 2024
CVE-2024-52295
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.01
DataEase <2.10.2 - Auth Bypass
DataEase is an open source data visualization analysis tool. Prior to 2.10.2, DataEase allows attackers to forge jwt and take over services. The JWT secret is hardcoded in the code, and the UID and OID are hardcoded. The vulnerability has been fixed in v2.10.2.
CWE-798
Nov 13, 2024
CVE-2024-48307
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Jeecg Boot - SQL Injection
JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.
CWE-89
Oct 31, 2024
CVE-2024-9989
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.93
WordPress Crypto <2.15 - Auth Bypass
The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.18. This is due to a limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
CWE-288
Oct 29, 2024
CVE-2024-50498
10.0
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.92
Lubus WP Query Console < 1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Ajit Bohra WP Query Console wp-query-console allows Code Injection.This issue affects WP Query Console: from n/a through <= 1.0.
CWE-94
Oct 28, 2024
CVE-2024-50623
9.8
CRITICAL
KEV
RANSOMWARE
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Cleo Harmony < 5.8.0.21 - Unrestricted File Upload
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution.
CWE-434
Oct 28, 2024
CVE-2024-9047
9.8
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Iptanus Wordpress File Upload < 4.24.12 - Path Traversal
The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
CWE-22
Oct 12, 2024
CVE-2024-9707
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.90
Themehunk Hunk Companion < 1.8.5 - Missing Authorization
The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
CWE-862
Oct 11, 2024
CVE-2024-8963
9.4
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Endpoint Manager Cloud Services Appliance - Path Traversal
Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality.
CWE-22
Sep 19, 2024
CVE-2024-3673
9.1
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Web Directory Free <1.7.3 - Code Injection
The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.
Aug 30, 2024
CVE-2024-43360
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.63
Zoneminder < 1.36.34 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.
CWE-89
Aug 12, 2024
CVE-2024-5153
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.05
Startklar Elementor Addons <1.7.15 - Path Traversal
The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory.
CWE-22
Jun 06, 2024
CVE-2024-6386
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.74
WPML <4.6.12 - RCE
The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
CWE-1336
Aug 21, 2024
CVE-2024-6297
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.04
WordPress Plugins - RCE
Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
Jun 25, 2024
CVE-2024-34555
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.08
URBAN BASE Z-Downloads <1.11.3 - Unrestricted Upload
Unrestricted Upload of File with Dangerous Type vulnerability in URBAN BASE Z-Downloads.This issue affects Z-Downloads: from n/a through 1.11.3.
CWE-434
May 14, 2024
CVE-2024-9932
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.75
Wux Blog Editor <3.0.0 - File Upload
The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Oct 26, 2024