Critical Vulnerabilities with Public Exploits
Updated 18m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2024-9680
9.8
CRITICAL
KEV
RANSOMWARE
3 PoCs
Analysis
EPSS 0.31
Mozilla Firefox < 115.16.1 - Use After Free
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.
CWE-416
Oct 09, 2024
CVE-2024-29943
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.54
Firefox < 124.0.1 - Memory Corruption
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1.
CWE-125
Mar 22, 2024
CVE-2024-12084
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.03
Samba Rsync < 24.11 - Out-of-Bounds Write
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
CWE-122
Jan 15, 2025
CVE-2024-22127
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.02
SAP NetWeaver Administrator AS Java - Command Injection
SAP NetWeaver Administrator AS Java (Administrator Log Viewer plug-in) - version 7.50, allows an attacker with high privileges to upload potentially dangerous files which leads to command injection vulnerability. This would enable the attacker to run commands which can cause high impact on confidentiality, integrity and availability of the application.
CWE-77
Mar 12, 2024
CVE-2024-57045
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.63
D-Link DIR-859 <A3 1.05 - Auth Bypass
A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page.
CWE-287
Feb 18, 2025
CVE-2024-35374
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
Mocodo Online < 4.2.6 - Command Injection
Mocodo Mocodo Online 4.2.6 and below does not properly sanitize the sql_case input field in /web/generate.php, allowing remote attackers to execute arbitrary commands and potentially command injection, leading to remote code execution (RCE) under certain conditions.
CWE-77
May 24, 2024
CVE-2024-47167
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Gradio - SSRF
Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to **Server-Side Request Forgery (SSRF)** in the `/queue/join` endpoint. Gradio’s `async_save_url_to_cache` function allows attackers to force the Gradio server to send HTTP requests to user-controlled URLs. This could enable attackers to target internal servers or services within a local network and possibly exfiltrate data or cause unwanted internal requests. Additionally, the content from these URLs is stored locally, making it easier for attackers to upload potentially malicious files to the server. This impacts users deploying Gradio servers that use components like the Video component which involve URL fetching. Users are advised to upgrade to `gradio>=5` to address this issue. As a workaround, users can disable or heavily restrict URL-based inputs in their Gradio applications to trusted domains only. Additionally, implementing stricter URL validation (such as allowinglist-based validation) and ensuring that local or internal network addresses cannot be requested via the `/queue/join` endpoint can help mitigate the risk of SSRF attacks.
CWE-918
Oct 10, 2024
CVE-2024-28231
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.01
Eprosima Fast Dds < 2.6.8 - Out-of-Bounds Write
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8, manipulated DATA Submessage can cause a heap overflow error in the Fast-DDS process, causing the process to be terminated remotely. Additionally, the payload_size in the DATA Submessage packet is declared as uint32_t. When a negative number, such as -1, is input into this variable, it results in an Integer Overflow (for example, -1 gets converted to 0xFFFFFFFF). This eventually leads to a heap-buffer-overflow, causing the program to terminate. Versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8 contain a fix for this issue.
CWE-122
Mar 20, 2024
CVE-2024-44349
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.76
AnteeoWMS <4.7.34 - SQL Injection
A SQL injection vulnerability in login portal in AnteeoWMS before v4.7.34 allows unauthenticated attackers to execute arbitrary SQL commands via the username parameter and disclosure of some data in the underlying DB.
CWE-89
Oct 08, 2024
CVE-2024-28000
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.92
WordPress LiteSpeed Cache - Unauthenticated Privilege Escalation to Admin
Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache.This issue affects LiteSpeed Cache: from n/a through <= 6.3.0.1.
CWE-266
Aug 21, 2024
CVE-2024-46256
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.60
Jc21 Nginx Proxy Manager - Command Injection
A Command injection vulnerability in requestLetsEncryptSsl in NginxProxyManager 2.11.3 allows an attacker to RCE via Add Let's Encrypt Certificate.
CWE-77
Sep 27, 2024
CVE-2024-12641
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.30
CHT Tenderdoctransfer < 0.41.157 - XSS
TenderDocTransfer from Chunghwa Telecom has a Reflected Cross-site scripting vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use specific APIs through phishing to execute arbitrary JavaScript code in the user’s browser. Since the web server set by the application supports Node.Js features, attackers can further leverage this to run OS commands.
CWE-79
Dec 16, 2024
CVE-2024-13513
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Oliver POS - Info Disclosure
The Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2.3 via the logging functionality. This makes it possible for unauthenticated attackers to extract sensitive data including the plugin's clientToken, which in turn can be used to change user account information including emails and account type. This allows attackers to then change account passwords resulting in a complete site takeover. Version 2.4.2.3 disabled logging but left sites with existing log files vulnerable.
CWE-862
Feb 15, 2025
CVE-2024-32444
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
InspiryThemes RealHomes <4.3.6 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes realhomes allows Privilege Escalation.This issue affects RealHomes: from n/a through <= 4.3.6.
CWE-266
Sep 03, 2025
CVE-2024-39309
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
NPM Parse-server < 6.5.7 - SQL Injection
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.
CWE-288
Jul 01, 2024
CVE-2024-32022
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.03
Kohya_ss - Command Injection
Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable to command injection in basic_caption_gui.py. This vulnerability is fixed in 23.1.5.
CWE-77
Apr 16, 2024
CVE-2024-47051
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Mautic <5.2.3 - RCE
This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users.
* Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts.
* Path Traversal File Deletion: A Path Traversal vulnerability exists in the upload validation process. Due to improper handling of path components, an authenticated user can manipulate the file deletion process to delete arbitrary files on the host system.
CWE-94
Feb 26, 2025
CVE-2024-4701
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.18
Com.netflix.genie Genie-web < 4.3.18 - Path Traversal
A path traversal issue potentially leading to remote code execution in Genie for all versions prior to 4.3.18
CWE-22
May 14, 2024
CVE-2024-47533
9.8
CRITICAL
5 PoCs
Analysis
NUCLEI
EPSS 0.72
Cobbler <3.2.3, <3.3.7 - Auth Bypass
Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.
CWE-287
Nov 18, 2024
CVE-2024-47875
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.01
DOMPurify - XSS
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.
CWE-79
Oct 11, 2024