Critical Vulnerabilities with Public Exploits

Updated 18m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,101 results Clear all
CVE-2024-51568 10.0 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.93
CyberPanel <2.3.5 - Command Injection
CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters.
CWE-78 Oct 29, 2024
CVE-2024-12877 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.28
Givewp < 3.19.2 - Insecure Deserialization
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.2 via deserialization of untrusted input from the donation form like 'firstName'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server that makes remote code execution possible. Please note this was only partially patched in 3.19.3, a fully sufficient patch was not released until 3.19.4. However, another CVE was assigned by another CNA for version 3.19.3 so we will leave this as affecting 3.19.2 and before. We have recommended the vendor use JSON encoding to prevent any further deserialization vulnerabilities from being present.
CWE-502 Jan 11, 2025
CVE-2024-49369 9.8 CRITICAL 1 PoC Analysis EPSS 0.23
Icinga < 2.11.12 - Improper Certificate Validation
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.
CWE-295 Nov 12, 2024
CVE-2024-36042 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Silverpeas <6.3.5 - Auth Bypass
Silverpeas before 6.3.5 allows authentication bypass by omitting the Password field to AuthenticationServlet, often providing an unauthenticated user with superadmin access.
CWE-288 Jun 03, 2024
CVE-2024-3660 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Keras < 2.13.1 - Code Injection
A arbitrary code injection vulnerability in TensorFlow's Keras framework (<2.13) allows attackers to execute arbitrary code with the same permissions as the application using a model that allow arbitrary code irrespective of the application.
CWE-94 Apr 16, 2024
CVE-2024-53924 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Pycel <1.0b30 - RCE
Pycel through 1.0b30, when operating on an untrusted spreadsheet, allows code execution via a crafted formula in a cell, such as one beginning with the =IF(A1=200, eval("__import__('os').system( substring.
CWE-94 Apr 17, 2025
CVE-2024-2771 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.27
Contact Form Plugin by Fluent Forms < 5.1.17 - Unauthenticated Limited Privilege Escalation
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint in all versions up to, and including, 5.1.16. This makes it possible for unauthenticated attackers to grant users with Fluent Form management permissions which gives them access to all of the plugin's settings and features. This also makes it possible for unauthenticated attackers to delete manager accounts.
CWE-862 May 18, 2024
CVE-2024-3552 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.93
Web Directory Free WP <1.7.0 - SQL Injection
The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
CWE-89 Jun 13, 2024
CVE-2024-23346 9.3 CRITICAL 6 PoCs Analysis EPSS 0.48
Materialsvirtuallab Pymatgen < 2024.2.20 - Command Injection
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analysis. A critical security vulnerability exists in the `JonesFaithfulTransformation.from_transformation_str()` method within the `pymatgen` library prior to version 2024.2.20. This method insecurely utilizes `eval()` for processing input, enabling execution of arbitrary code when parsing untrusted input. Version 2024.2.20 fixes this issue.
CWE-77 Feb 21, 2024
CVE-2024-40453 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
squirrellyjs <9.0.0 - Code Injection
squirrellyjs squirrelly v9.0.0 and fixed in v.9.0.1 was discovered to contain a code injection vulnerability via the component options.varName.
CWE-94 Aug 21, 2024
CVE-2024-48061 9.8 CRITICAL 1 PoC Analysis EPSS 0.14
Langflow < 1.0.18 - Code Injection
langflow <=1.0.18 is vulnerable to Remote Code Execution (RCE) as any component provided the code functionality and the components run on the local machine rather than in a sandbox.
CWE-94 Nov 04, 2024
CVE-2024-9014 9.9 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Pgadmin 4 < 8.12 - Insufficiently Protected Credentials
pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.
CWE-522 Sep 23, 2024
CVE-2024-42640 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.86
angular-base64-upload <v0.1.21 - RCE
angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-434 Oct 11, 2024
CVE-2024-3568 9.6 CRITICAL 1 PoC Analysis EPSS 0.20
huggingface/transformers - Code Injection
The huggingface/transformers library is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_repo_checkpoint()` function of the `TFPreTrainedModel()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine.
CWE-502 Apr 10, 2024
CVE-2024-42008 9.3 CRITICAL 3 PoCs Analysis EPSS 0.57
Roundcube Webmail < 1.5.8 - XSS
A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.
CWE-79 Aug 05, 2024
CVE-2024-50477 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.82
Stacksmarket Stacks Mobile App Builder - Missing Authentication
Authentication Bypass Using an Alternate Path or Channel vulnerability in Stacks Stacks Mobile App Builder stacks-mobile-app-builder allows Authentication Bypass.This issue affects Stacks Mobile App Builder: from n/a through <= 5.2.3.
CWE-288 Oct 28, 2024
CVE-2024-42049 9.1 CRITICAL 2 PoCs Analysis EPSS 0.06
TightVNC <2.8.84 - RCE
TightVNC (Server for Windows) before 2.8.84 allows attackers to connect to the control pipe via a network connection.
CWE-200 Jul 28, 2024
CVE-2024-3272 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Dlink Dns-320l Firmware - Hard-coded Credentials
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
CWE-798 Apr 04, 2024
CVE-2024-12583 9.9 CRITICAL 1 PoC Analysis EPSS 0.09
Dynamics 365 Integration plugin - RCE
The Dynamics 365 Integration plugin for WordPress is vulnerable to Remote Code Execution and Arbitrary File Read in all versions up to, and including, 1.3.23 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
CWE-1336 Jan 04, 2025
CVE-2024-53591 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Seclore - Missing Authorization
An issue in the login page of Seclore v3.27.5.0 allows attackers to bypass authentication via a brute force attack.
CWE-862 Apr 18, 2025