Critical Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2024-9290
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.62
Super Backup & Clone - Migrate <2.3.3 - RCE
The Super Backup & Clone - Migrate for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and a missing capability check on the ibk_restore_migrate_check() function in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Dec 13, 2024
CVE-2024-56337
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.11
Apache Tomcat < 9.0.98 - TOCTOU Race Condition
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may also be affected.
The mitigation for CVE-2024-50379 was incomplete.
Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation
parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:
- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)
- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)
- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)
Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
CWE-367
Dec 20, 2024
CVE-2024-39914
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Fogproject < 1.5.10.41 - Command Injection
FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34.
CWE-77
Jul 12, 2024
CVE-2024-41319
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.51
Totolink A6000r Firmware - Command Injection
TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the cmd parameter in the webcmd function.
CWE-77
Jul 23, 2024
CVE-2024-29671
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.55
NEXTU FLATA AX1500 Router <1.0.2 - Buffer Overflow
Buffer Overflow vulnerability in NEXTU FLATA AX1500 Router v.1.0.2 allows a remote attacker to execute arbitrary code via the POST request handler component.
CWE-120
Dec 16, 2024
CVE-2024-50510
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.33
Web and Print Design AR For Woocommerce <6.2 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in webandprint AR For Woocommerce ar-for-woocommerce allows Upload a Web Shell to a Web Server.This issue affects AR For Woocommerce: from n/a through <= 6.3.
CWE-434
Oct 30, 2024
CVE-2024-50507
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.22
DS.DownloadList <1.3 - Code Injection
Deserialization of Untrusted Data vulnerability in Daschmi DS.DownloadList dsdownloadlist allows Object Injection.This issue affects DS.DownloadList: from n/a through <= 1.3.
CWE-502
Oct 30, 2024
CVE-2024-6330
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.44
GEO my WP <4.5.0.2 - RCE
The GEO my WP WordPress plugin before 4.5.0.2 does not prevent unauthenticated attackers from including arbitrary files in PHP's execution context, which leads to Remote Code Execution.
Aug 19, 2024
CVE-2024-55875
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.05
Org.http4k Http4k-format-xml < 5.41.0.0 - Information Disclosure
http4k is a functional toolkit for Kotlin HTTP applications. Prior to version 5.41.0.0, there is a potential XXE (XML External Entity Injection) vulnerability when http4k handling malicious XML contents within requests, which might allow attackers to read local sensitive information on server, trigger Server-side Request Forgery and even execute code under some circumstances. Version 5.41.0.0 contains a patch for the issue.
CWE-200
Dec 12, 2024
CVE-2024-55099
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.17
Phpgurukul Online Nurse Hiring System - SQL Injection
A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter.
CWE-89
Dec 12, 2024
CVE-2024-35286
9.8
CRITICAL
EXPLOITED
1 PoC
NUCLEI
EPSS 0.64
Mitel Micollab < 9.8.0.33 - SQL Injection
A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations.
CWE-89
Oct 21, 2024
CVE-2024-42448
9.9
CRITICAL
EXPLOITED
RANSOMWARE
1 PoC
Analysis
EPSS 0.61
VSPC - RCE
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
CWE-94
Dec 12, 2024
CVE-2024-8672
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.78
Widget Options <4.0.7 - RCE
The Widget Options – The #1 WordPress Widget & Block Control Plugin plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.0.7 via the display logic functionality that extends several page builders. This is due to the plugin allowing users to supply input that will be passed through eval() without any filtering or capability checks. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server. Special note: We suggested the vendor implement an allowlist of functions and limit the ability to execute commands to just administrators, however, they did not take our advice. We are considering this patched, however, we believe it could still be further hardened and there may be residual risk with how the issue is currently patched.
CWE-94
Nov 28, 2024
CVE-2024-10470
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.48
Vibethemes Wordpress Learning Management System - Path Traversal
The WPLMS Learning Management System for WordPress, WordPress LMS theme for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation and permissions checks in the readfile and unlink functions in all versions up to, and including, 4.962. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The theme is vulnerable even when it is not activated.
CWE-22
Nov 09, 2024
CVE-2024-10542
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.41
Cleantalk Anti-spam < 6.44 - Missing Authorization
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
CWE-862
Nov 26, 2024
CVE-2024-52430
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.32
LIS Video Gallery < 0.2.1 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in bublick Lis Video Gallery lis-video-gallery allows Object Injection.This issue affects Lis Video Gallery: from n/a through <= 0.2.1.
CWE-502
Nov 18, 2024
CVE-2024-52475
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.29
Wawp <3.0.18 - Auth Bypass
Authentication Bypass Using an Alternate Path or Channel vulnerability in Information Technology Wawp automation-web-platform allows Authentication Bypass.This issue affects Wawp: from n/a through < 3.0.18.
CWE-288
Nov 28, 2024
CVE-2024-52429
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.41
Antonhoelstad WP Quick Setup < 2.0 - Unrestricted File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in AntonHoelstad WP Quick Setup wp-quick-setup allows Upload a Web Shell to a Web Server.This issue affects WP Quick Setup: from n/a through <= 2.0.
CWE-434
Nov 18, 2024
CVE-2024-52433
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.80
Mindstien MY Geo Posts Free < 1.2 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in Mindstien Technologies My Geo Posts Free my-geo-posts-free allows Object Injection.This issue affects My Geo Posts Free: from n/a through <= 1.2.
CWE-502
Nov 18, 2024
CVE-2024-52382
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.17
Matix Popup Builder <1.0.0 - Privilege Escalation
Missing Authorization vulnerability in medmatech Matix Popup Builder medma-matix allows Privilege Escalation.This issue affects Matix Popup Builder: from n/a through <= 1.0.0.
CWE-862
Nov 14, 2024