Critical Vulnerabilities with Public Exploits

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,102 results Clear all
CVE-2024-50485 9.8 CRITICAL 1 PoC Analysis EPSS 0.22
Udit Rawat Exam Matrix <1.5 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in Udit Rawat Exam Matrix exam-matrix allows Privilege Escalation.This issue affects Exam Matrix: from n/a through <= 1.5.
CWE-266 Oct 29, 2024
CVE-2024-50490 9.8 CRITICAL 1 PoC Analysis EPSS 0.52
PegaPoll <1.0.2 - Info Disclosure
Missing Authorization vulnerability in lowcage PegaPoll pegapoll allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects PegaPoll: from n/a through <= 1.0.2.
CWE-862 Oct 29, 2024
CVE-2024-50475 9.8 CRITICAL 1 PoC Analysis EPSS 0.32
Scott Gamon Signup Page <1.0 - Privilege Escalation
Missing Authorization vulnerability in Scott Gamon Signup Page signup-page allows Privilege Escalation.This issue affects Signup Page: from n/a through <= 1.0.
CWE-862 Oct 29, 2024
CVE-2024-50476 9.8 CRITICAL 1 PoC Analysis EPSS 0.25
GRÜN spendino Spendenformular <1.0.1 - Privilege Escalation
Missing Authorization vulnerability in GRÜN Software Group GmbH GRÜN spendino Spendenformular spendino allows Privilege Escalation.This issue affects GRÜN spendino Spendenformular: from n/a through <= 1.0.1.
CWE-862 Oct 29, 2024
CVE-2024-51358 9.8 CRITICAL 1 PoC Analysis EPSS 0.39
Linux Server Heimdall <2.6.1 - RCE
An issue in Linux Server Heimdall v.2.6.1 allows a remote attacker to execute arbitrary code via a crafted script to the Add new application.
CWE-918 Nov 05, 2024
CVE-2024-7456 9.8 CRITICAL 1 PoC Analysis EPSS 0.29
Lunary - SQL Injection
A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption.
CWE-89 Nov 01, 2024
CVE-2024-40457 9.1 CRITICAL 1 PoC Analysis EPSS 0.03
No-IP DUC v3.x - Info Disclosure
No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior.
CWE-312 Sep 12, 2024
CVE-2024-48359 9.8 CRITICAL 1 PoC Analysis EPSS 0.38
Qualitor - Code Injection
Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter.
CWE-94 Oct 31, 2024
CVE-2024-48914 9.1 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Vendure Asset-server-plugin < 2.3.3 - Path Traversal
Vendure is an open-source headless commerce platform. Prior to versions 3.0.5 and 2.3.3, a vulnerability in Vendure's asset server plugin allows an attacker to craft a request which is able to traverse the server file system and retrieve the contents of arbitrary files, including sensitive data such as configuration files, environment variables, and other critical data stored on the server. In the same code path is an additional vector for crashing the server via a malformed URI. Patches are available in versions 3.0.5 and 2.3.3. Some workarounds are also available. One may use object storage rather than the local file system, e.g. MinIO or S3, or define middleware which detects and blocks requests with urls containing `/../`.
CWE-20 Oct 15, 2024
CVE-2024-46483 9.8 CRITICAL 1 PoC Analysis EPSS 0.14
Xlight FTP Server <3.9.4.3 - Buffer Overflow
Xlight FTP Server <3.9.4.3 has an integer overflow vulnerability in the packet parsing logic of the SFTP server, which can lead to a heap overflow with attacker-controlled content.
CWE-190 Oct 22, 2024
CVE-2024-40711 9.8 CRITICAL KEV RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.68
Veeam Backup & Replication 12.0.0.1420 through 12.2.0.334 - Deserialization RCE
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
CWE-502 Sep 07, 2024
CVE-2024-4406 9.6 CRITICAL 1 PoC Analysis EPSS 0.68
Xiaomi Pro 13 - XSS/RCE
Xiaomi Pro 13 GetApps integral-dialog-page Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xiaomi Pro 13 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the integral-dialog-page.html file. When parsing the integralInfo parameter, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22332.
CWE-79 May 02, 2024
CVE-2024-46532 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
OpenHIS 1.0 - SQL Injection
SQL Injection vulnerability in OpenHIS v.1.0 allows an attacker to execute arbitrary code via the refund function in the PayController.class.php component.
CWE-89 Oct 11, 2024
CVE-2024-8529 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.70
WordPress LearnPress Unauthenticated SQLi (CVE-2024-8522, CVE-2024-8529)
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_fields' parameter of the /wp-json/lp/v1/courses/archive-course REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Sep 12, 2024
CVE-2024-9822 9.8 CRITICAL 1 PoC Analysis EPSS 0.15
Pedalo Connector < 2.0.5 - Authentication Bypass
The Pedalo Connector plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.5. This is due to insufficient restriction on the 'login_admin_user' function. This makes it possible for unauthenticated attackers to log to the first user, who is usually the administrator, or if it does not exist, then to the first administrator.
CWE-288 Oct 11, 2024
CVE-2024-1207 9.8 CRITICAL 1 PoC Analysis EPSS 0.79
Wpbookingcalendar Booking Calendar < 9.9.1 - SQL Injection
The WP Booking Calendar plugin for WordPress is vulnerable to SQL Injection via the 'calendar_request_params[dates_ddmmyy_csv]' parameter in all versions up to, and including, 9.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 08, 2024
CVE-2024-8309 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
langchain-ai/langchain <0.2.5 - SQL Injection
A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. This vulnerability can lead to unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database.
CWE-74 Oct 29, 2024
CVE-2024-38474 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Apache HTTP Server <2.4.59 - RCE
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
CWE-116 Jul 01, 2024
CVE-2024-7854 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.80
Sjhoo Woo Inquiry - SQL Injection
The Woo Inquiry plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 0.1 due to insufficient escaping on the user supplied parameter 'dbid' and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Aug 21, 2024
CVE-2024-9106 9.8 CRITICAL 1 PoC Analysis EPSS 0.41
Wechat Social login plugin <1.3.0 - Auth Bypass
The Wechat Social login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.3.0. This is due to insufficient verification on the user being supplied during the social login. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This is only exploitable if the app secret is not set, so it has a default empty value.
CWE-288 Oct 01, 2024