Critical Vulnerabilities with Public Exploits

Updated 18m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,101 results Clear all
CVE-2024-9680 9.8 CRITICAL KEV RANSOMWARE 3 PoCs Analysis EPSS 0.31
Mozilla Firefox < 115.16.1 - Use After Free
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.
CWE-416 Oct 09, 2024
CVE-2024-29943 9.8 CRITICAL 2 PoCs Analysis EPSS 0.54
Firefox < 124.0.1 - Memory Corruption
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1.
CWE-125 Mar 22, 2024
CVE-2024-12084 9.8 CRITICAL 3 PoCs Analysis EPSS 0.03
Samba Rsync < 24.11 - Out-of-Bounds Write
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
CWE-122 Jan 15, 2025
CVE-2024-22127 9.1 CRITICAL 1 PoC Analysis EPSS 0.02
SAP NetWeaver Administrator AS Java - Command Injection
SAP NetWeaver Administrator AS Java (Administrator Log Viewer plug-in) - version 7.50, allows an attacker with high privileges to upload potentially dangerous files which leads to command injection vulnerability. This would enable the attacker to run commands which can cause high impact on confidentiality, integrity and availability of the application.
CWE-77 Mar 12, 2024
CVE-2024-57045 9.8 CRITICAL 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.63
D-Link DIR-859 <A3 1.05 - Auth Bypass
A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page.
CWE-287 Feb 18, 2025
CVE-2024-35374 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
Mocodo Online < 4.2.6 - Command Injection
Mocodo Mocodo Online 4.2.6 and below does not properly sanitize the sql_case input field in /web/generate.php, allowing remote attackers to execute arbitrary commands and potentially command injection, leading to remote code execution (RCE) under certain conditions.
CWE-77 May 24, 2024
CVE-2024-47167 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Gradio - SSRF
Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to **Server-Side Request Forgery (SSRF)** in the `/queue/join` endpoint. Gradio’s `async_save_url_to_cache` function allows attackers to force the Gradio server to send HTTP requests to user-controlled URLs. This could enable attackers to target internal servers or services within a local network and possibly exfiltrate data or cause unwanted internal requests. Additionally, the content from these URLs is stored locally, making it easier for attackers to upload potentially malicious files to the server. This impacts users deploying Gradio servers that use components like the Video component which involve URL fetching. Users are advised to upgrade to `gradio>=5` to address this issue. As a workaround, users can disable or heavily restrict URL-based inputs in their Gradio applications to trusted domains only. Additionally, implementing stricter URL validation (such as allowinglist-based validation) and ensuring that local or internal network addresses cannot be requested via the `/queue/join` endpoint can help mitigate the risk of SSRF attacks.
CWE-918 Oct 10, 2024
CVE-2024-28231 9.6 CRITICAL 1 PoC Analysis EPSS 0.01
Eprosima Fast Dds < 2.6.8 - Out-of-Bounds Write
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8, manipulated DATA Submessage can cause a heap overflow error in the Fast-DDS process, causing the process to be terminated remotely. Additionally, the payload_size in the DATA Submessage packet is declared as uint32_t. When a negative number, such as -1, is input into this variable, it results in an Integer Overflow (for example, -1 gets converted to 0xFFFFFFFF). This eventually leads to a heap-buffer-overflow, causing the program to terminate. Versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8 contain a fix for this issue.
CWE-122 Mar 20, 2024
CVE-2024-44349 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.76
AnteeoWMS <4.7.34 - SQL Injection
A SQL injection vulnerability in login portal in AnteeoWMS before v4.7.34 allows unauthenticated attackers to execute arbitrary SQL commands via the username parameter and disclosure of some data in the underlying DB.
CWE-89 Oct 08, 2024
CVE-2024-28000 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.92
WordPress LiteSpeed Cache - Unauthenticated Privilege Escalation to Admin
Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache.This issue affects LiteSpeed Cache: from n/a through <= 6.3.0.1.
CWE-266 Aug 21, 2024
CVE-2024-46256 9.8 CRITICAL 3 PoCs Analysis EPSS 0.60
Jc21 Nginx Proxy Manager - Command Injection
A Command injection vulnerability in requestLetsEncryptSsl in NginxProxyManager 2.11.3 allows an attacker to RCE via Add Let's Encrypt Certificate.
CWE-77 Sep 27, 2024
CVE-2024-12641 9.6 CRITICAL 1 PoC Analysis EPSS 0.30
CHT Tenderdoctransfer < 0.41.157 - XSS
TenderDocTransfer from Chunghwa Telecom has a Reflected Cross-site scripting vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use specific APIs through phishing to execute arbitrary JavaScript code in the user’s browser. Since the web server set by the application supports Node.Js features, attackers can further leverage this to run OS commands.
CWE-79 Dec 16, 2024
CVE-2024-13513 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Oliver POS - Info Disclosure
The Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2.3 via the logging functionality. This makes it possible for unauthenticated attackers to extract sensitive data including the plugin's clientToken, which in turn can be used to change user account information including emails and account type. This allows attackers to then change account passwords resulting in a complete site takeover. Version 2.4.2.3 disabled logging but left sites with existing log files vulnerable.
CWE-862 Feb 15, 2025
CVE-2024-32444 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
InspiryThemes RealHomes <4.3.6 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes realhomes allows Privilege Escalation.This issue affects RealHomes: from n/a through <= 4.3.6.
CWE-266 Sep 03, 2025
CVE-2024-39309 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
NPM Parse-server < 6.5.7 - SQL Injection
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.
CWE-288 Jul 01, 2024
CVE-2024-32022 9.1 CRITICAL 1 PoC Analysis EPSS 0.03
Kohya_ss - Command Injection
Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable to command injection in basic_caption_gui.py. This vulnerability is fixed in 23.1.5.
CWE-77 Apr 16, 2024
CVE-2024-47051 9.1 CRITICAL 2 PoCs Analysis EPSS 0.01
Mautic <5.2.3 - RCE
This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users. * Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts. * Path Traversal File Deletion: A Path Traversal vulnerability exists in the upload validation process. Due to improper handling of path components, an authenticated user can manipulate the file deletion process to delete arbitrary files on the host system.
CWE-94 Feb 26, 2025
CVE-2024-4701 9.9 CRITICAL 2 PoCs Analysis EPSS 0.18
Com.netflix.genie Genie-web < 4.3.18 - Path Traversal
A path traversal issue potentially leading to remote code execution in Genie for all versions prior to 4.3.18
CWE-22 May 14, 2024
CVE-2024-47533 9.8 CRITICAL 5 PoCs Analysis NUCLEI EPSS 0.72
Cobbler <3.2.3, <3.3.7 - Auth Bypass
Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.
CWE-287 Nov 18, 2024
CVE-2024-47875 10.0 CRITICAL 2 PoCs Analysis EPSS 0.01
DOMPurify - XSS
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.
CWE-79 Oct 11, 2024