Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,101 results Clear all
CVE-2024-40446 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
Forkosh Mime Tex <1.77 - RCE
An issue in forkosh Mime Tex before v.1.77 allows an attacker to execute arbitrary code via a crafted script
CWE-94 Apr 22, 2025
CVE-2024-28752 9.3 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.46
Apache Cxf < 3.5.8 - SSRF
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.
CWE-918 Mar 15, 2024
CVE-2024-38475 9.1 CRITICAL KEV 5 PoCs Analysis NUCLEI EPSS 0.94
Apache HTTP Server <2.4.59 - RCE
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
CWE-116 Jul 01, 2024
CVE-2024-48590 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Inflectra Spirateam - SSRF
Inflectra SpiraTeam 7.2.00 is vulnerable to Server-Side Request Forgery (SSRF) via the NewsReaderService. This allows an attacker to escalate privileges and obtain sensitive information.
CWE-918 Mar 20, 2025
CVE-2024-21546 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Unisharp Laravel-filemanager < 2.9.1 - Code Injection
Versions of the package unisharp/laravel-filemanager before 2.9.1 are vulnerable to Remote Code Execution (RCE) through using a valid mimetype and inserting the . character after the php file extension. This allows the attacker to execute malicious code.
CWE-94 Dec 18, 2024
CVE-2024-8425 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.45
WooCommerce Ultimate Gift Card <2.6.0 - RCE
The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.9.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this may have been patched on an older version than 2.9.2, however, we do not have access to older versions of the software to confirm when the patch was added. The only patched version we have confirmed is 2.9.3.
CWE-434 Feb 28, 2025
CVE-2024-44541 9.8 CRITICAL 2 PoCs Analysis EPSS 0.03
evilnapsis Inventio Lite <v4 - SQL Injection
evilnapsis Inventio Lite Versions v4 and before is vulnerable to SQL Injection via the "username" parameter in "/?action=processlogin."
CWE-89 Sep 11, 2024
CVE-2024-48445 9.8 CRITICAL 1 PoC Analysis EPSS 0.12
compop.ca ONLINE MALL <3.5.3 - RCE
An issue in compop.ca ONLINE MALL v.3.5.3 allows a remote attacker to execute arbitrary code via the rid, tid, et, and ts parameters.
CWE-287 Feb 04, 2025
CVE-2024-48840 10.0 CRITICAL 1 PoC Analysis EPSS 0.05
ABB Aspect-ent-2 Firmware < 3.08.03 - Code Injection
Unauthorized Access vulnerabilities allow Remote Code Execution.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
CWE-94 Dec 05, 2024
CVE-2024-6516 9.0 CRITICAL 3 PoCs Analysis EPSS 0.01
ABB Aspect-ent-2 Firmware < 3.08.03 - XSS
Cross Site Scripting vulnerabilities where found providing a potential for malicious scripts to be injected into a client browser.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
CWE-79 Dec 05, 2024
CVE-2024-48845 9.4 CRITICAL 1 PoC Analysis EPSS 0.03
ABB ASPECT, NEXUS, and MATRIX Series <3.07.02 - Weak Password Reset Rules
Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.  Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02
CWE-521 Dec 05, 2024
CVE-2024-50672 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Adapt Learning Adapt Authoring Tool <= 0.11.3 - SQL Injection
A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the "Reset password" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application.
CWE-89 Nov 25, 2024
CVE-2024-41947 9.0 CRITICAL 1 PoC Analysis EPSS 0.13
Xwiki < 15.10.8 - Basic XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. By creating a conflict when another user with more rights is currently editing a page, it is possible to execute JavaScript snippets on the side of the other user, which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.8 and 16.3.0RC1.
CWE-80 Jul 31, 2024
CVE-2024-7971 9.6 CRITICAL KEV 1 PoC Analysis EPSS 0.01
Google Chrome < 128.0.6613.84 - Type Confusion
Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Aug 21, 2024
CVE-2024-53584 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Openpanel - OS Command Injection
OpenPanel v0.3.4 was discovered to contain an OS command injection vulnerability via the timezone parameter.
CWE-78 Jan 31, 2025
CVE-2024-53537 9.1 CRITICAL 1 PoC Analysis EPSS 0.06
Openpanel < 0.3.4 - Path Traversal
An issue in OpenPanel v0.3.4 to v0.2.1 allows attackers to execute a directory traversal in File Actions of File Manager.
CWE-22 Jan 31, 2025
CVE-2024-48760 9.8 CRITICAL 1 PoC Analysis EPSS 0.12
Gestioip - Unrestricted File Upload
An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.
CWE-434 Jan 14, 2025
CVE-2024-48852 9.4 CRITICAL 1 PoC Analysis EPSS 0.03
FLEXON <9.3.4 - Info Disclosure
Insertion of Sensitive Information into Log File vulnerability observed in FLEXON. Some information may be improperly disclosed through https access. This issue affects FLXEON through <= 9.3.4.
CWE-532 Jan 29, 2025
CVE-2024-48849 9.4 CRITICAL 1 PoC Analysis EPSS 0.00
FLXEON <= 9.3.4 - Info Disclosure
Missing Origin Validation in WebSockets vulnerability in FLXEON. Session management was not sufficient to prevent unauthorized HTTPS requests. This issue affects FLXEON: through <= 9.3.4.
CWE-1385 Jan 29, 2025
CVE-2024-48841 10.0 CRITICAL 2 PoCs Analysis EPSS 0.04
FLXEON <9.3.4 - Privilege Escalation
Network access can be used to execute arbitrary code with elevated privileges. This issue affects FLXEON 9.3.4 and older.
CWE-77 Jan 27, 2025