Critical Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2024-40446
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
Forkosh Mime Tex <1.77 - RCE
An issue in forkosh Mime Tex before v.1.77 allows an attacker to execute arbitrary code via a crafted script
CWE-94
Apr 22, 2025
CVE-2024-28752
9.3
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.46
Apache Cxf < 3.5.8 - SSRF
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.
CWE-918
Mar 15, 2024
CVE-2024-38475
9.1
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache HTTP Server <2.4.59 - RCE
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.
Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
CWE-116
Jul 01, 2024
CVE-2024-48590
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Inflectra Spirateam - SSRF
Inflectra SpiraTeam 7.2.00 is vulnerable to Server-Side Request Forgery (SSRF) via the NewsReaderService. This allows an attacker to escalate privileges and obtain sensitive information.
CWE-918
Mar 20, 2025
CVE-2024-21546
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Unisharp Laravel-filemanager < 2.9.1 - Code Injection
Versions of the package unisharp/laravel-filemanager before 2.9.1 are vulnerable to Remote Code Execution (RCE) through using a valid mimetype and inserting the . character after the php file extension. This allows the attacker to execute malicious code.
CWE-94
Dec 18, 2024
CVE-2024-8425
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.45
WooCommerce Ultimate Gift Card <2.6.0 - RCE
The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.9.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this may have been patched on an older version than 2.9.2, however, we do not have access to older versions of the software to confirm when the patch was added. The only patched version we have confirmed is 2.9.3.
CWE-434
Feb 28, 2025
CVE-2024-44541
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.03
evilnapsis Inventio Lite <v4 - SQL Injection
evilnapsis Inventio Lite Versions v4 and before is vulnerable to SQL Injection via the "username" parameter in "/?action=processlogin."
CWE-89
Sep 11, 2024
CVE-2024-48445
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
compop.ca ONLINE MALL <3.5.3 - RCE
An issue in compop.ca ONLINE MALL v.3.5.3 allows a remote attacker to execute arbitrary code via the rid, tid, et, and ts parameters.
CWE-287
Feb 04, 2025
CVE-2024-48840
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.05
ABB Aspect-ent-2 Firmware < 3.08.03 - Code Injection
Unauthorized Access vulnerabilities allow Remote Code Execution.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02
CWE-94
Dec 05, 2024
CVE-2024-6516
9.0
CRITICAL
3 PoCs
Analysis
EPSS 0.01
ABB Aspect-ent-2 Firmware < 3.08.03 - XSS
Cross Site Scripting vulnerabilities where found providing a potential for malicious scripts to be injected into a client browser.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02
CWE-79
Dec 05, 2024
CVE-2024-48845
9.4
CRITICAL
1 PoC
Analysis
EPSS 0.03
ABB ASPECT, NEXUS, and MATRIX Series <3.07.02 - Weak Password Reset Rules
Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.
Affected products:
ABB ASPECT - Enterprise v3.07.02;
NEXUS Series v3.07.02;
MATRIX Series v3.07.02
CWE-521
Dec 05, 2024
CVE-2024-50672
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Adapt Learning Adapt Authoring Tool <= 0.11.3 - SQL Injection
A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the "Reset password" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application.
CWE-89
Nov 25, 2024
CVE-2024-41947
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.13
Xwiki < 15.10.8 - Basic XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. By creating a conflict when another user with more rights is currently editing a page, it is possible to execute JavaScript snippets on the side of the other user, which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.8 and 16.3.0RC1.
CWE-80
Jul 31, 2024
CVE-2024-7971
9.6
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.01
Google Chrome < 128.0.6613.84 - Type Confusion
Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843
Aug 21, 2024
CVE-2024-53584
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Openpanel - OS Command Injection
OpenPanel v0.3.4 was discovered to contain an OS command injection vulnerability via the timezone parameter.
CWE-78
Jan 31, 2025
CVE-2024-53537
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.06
Openpanel < 0.3.4 - Path Traversal
An issue in OpenPanel v0.3.4 to v0.2.1 allows attackers to execute a directory traversal in File Actions of File Manager.
CWE-22
Jan 31, 2025
CVE-2024-48760
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
Gestioip - Unrestricted File Upload
An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.
CWE-434
Jan 14, 2025
CVE-2024-48852
9.4
CRITICAL
1 PoC
Analysis
EPSS 0.03
FLEXON <9.3.4 - Info Disclosure
Insertion of Sensitive Information into Log File vulnerability observed in FLEXON. Some information may be improperly disclosed through https access.
This issue affects FLXEON through <= 9.3.4.
CWE-532
Jan 29, 2025
CVE-2024-48849
9.4
CRITICAL
1 PoC
Analysis
EPSS 0.00
FLXEON <= 9.3.4 - Info Disclosure
Missing Origin Validation in WebSockets vulnerability in FLXEON. Session management was not sufficient to prevent unauthorized HTTPS requests. This issue affects FLXEON: through <= 9.3.4.
CWE-1385
Jan 29, 2025
CVE-2024-48841
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.04
FLXEON <9.3.4 - Privilege Escalation
Network access can be used to execute arbitrary code with elevated privileges.
This
issue affects FLXEON 9.3.4 and older.
CWE-77
Jan 27, 2025