Critical Vulnerabilities with Public Exploits

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,102 results Clear all
CVE-2024-45410 9.8 CRITICAL 1 PoC Analysis EPSS 0.14
Traefik - SSRF
Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value of these headers, security implications might arise, if they can be modified. For HTTP/1.1, however, it was found that some of theses custom headers can indeed be removed and in certain cases manipulated. The attack relies on the HTTP/1.1 behavior, that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been addressed in release versions 2.11.9 and 3.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-345 Sep 19, 2024
CVE-2024-46627 9.1 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
BECN DATAGERRY v2.2 - RCE
Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests.
CWE-284 Sep 26, 2024
CVE-2024-47066 9.0 CRITICAL 1 PoC Analysis EPSS 0.06
Lobe Chat <1.19.13 - SSRF
Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.19.13, server-side request forgery protection implemented in `src/app/api/proxy/route.ts` does not consider redirect and could be bypassed when attacker provides an external malicious URL which redirects to internal resources like a private network or loopback address. Version 1.19.13 contains an improved fix for the issue.
CWE-918 Sep 23, 2024
CVE-2024-43918 10.0 CRITICAL 1 PoC Analysis EPSS 0.49
Woobewoo Product Table < 1.9.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WBW WBW Product Table PRO allows SQL Injection.This issue affects WBW Product Table PRO: from n/a through 1.9.4.
CWE-89 Aug 29, 2024
CVE-2024-46377 9.8 CRITICAL 1 PoC Analysis EPSS 0.22
Mayurik Best House Rental Management System - Unrestricted File Upload
Best House Rental Management System 1.0 contains an arbitrary file upload vulnerability in the save_settings() function of the file rental/admin_class.php.
CWE-434 Sep 18, 2024
CVE-2024-46451 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
Totolink T8 Firmware - Buffer Overflow
TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWiFiAclRules function via the desc parameter.
CWE-120 Sep 16, 2024
CVE-2024-46986 9.9 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
Tuzitio Camaleon Cms < 2.8.2 - Path Traversal
Camaleon CMS is a dynamic and advanced content management system based on Ruby on Rails. An arbitrary file write vulnerability accessible via the upload method of the MediaController allows authenticated users to write arbitrary files to any location on the web server Camaleon CMS is running on (depending on the permissions of the underlying filesystem). E.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. This issue has been addressed in release version 2.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-22 Sep 18, 2024
CVE-2024-1874 9.4 CRITICAL 2 PoCs Analysis EPSS 0.63
PHP <8.1.28, 8.2.*<8.2.18, 8.3.*<8.3.5 - Command Injection
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
CWE-116 Apr 29, 2024
CVE-2024-6592 9.1 CRITICAL 1 PoC Analysis EPSS 0.03
WatchGuard - Auth Bypass
Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue affects the Authentication Gateway: through 12.10.2; Windows Single Sign-On Client: through 12.7; MacOS Single Sign-On Client: through 12.5.4.
CWE-306 Sep 25, 2024
CVE-2024-43160 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.84
BerqWP <1.7.6 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in BerqWP allows Code Injection.This issue affects BerqWP: from n/a through 1.7.6.
CWE-434 Aug 13, 2024
CVE-2024-44623 9.8 CRITICAL 1 PoC Analysis EPSS 0.39
TuomoKu SPx-GC <1.3.0 - RCE
An issue in TuomoKu SPx-GC v.1.3.0 and before allows a remote attacker to execute arbitrary code via the child_process.js function.
CWE-94 Sep 16, 2024
CVE-2024-44542 9.8 CRITICAL 1 PoC Analysis EPSS 0.28
Todesk 1.1 - SQL Injection
SQL Injection vulnerability in todesk v.1.1 allows a remote attacker to execute arbitrary code via the /todesk.com/news.html parameter.
CWE-89 Sep 18, 2024
CVE-2024-8277 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.52
WooCommerce Photo Reviews Premium <1.3.13.2 - Auth Bypass
The WooCommerce Photo Reviews Premium plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.3.13.2. This is due to the plugin not properly validating what user transient is being used in the login() function and not properly verifying the user's identity. This makes it possible for unauthenticated attackers to log in as user that has dismissed an admin notice in the past 30 days, which is often an administrator. Alternatively, a user can log in as any user with any transient that has a valid user_id as the value, though it would be more difficult to exploit this successfully.
CWE-306 Sep 11, 2024
CVE-2024-31666 9.8 CRITICAL 1 PoC Analysis EPSS 0.27
flusity-CMS <2.33 - RCE
An issue in flusity-CMS v.2.33 allows a remote attacker to execute arbitrary code via a crafted script to the edit_addon_post.php component.
CWE-94 Apr 22, 2024
CVE-2024-45507 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Apache OFBiz <18.12.16 - SSRF/Code Injection
Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.16. Users are recommended to upgrade to version 18.12.16, which fixes the issue.
CWE-918 Sep 04, 2024
CVE-2024-44849 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Qualitor <8.24 - RCE
Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php.
CWE-434 Sep 09, 2024
CVE-2024-31777 9.8 CRITICAL 2 PoCs Analysis EPSS 0.30
openeclass <3.15 - RCE
File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint.
CWE-434 Jun 13, 2024
CVE-2024-20017 9.8 CRITICAL 1 PoC Analysis EPSS 0.68
Wlan Service - RCE
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
CWE-20 Mar 04, 2024
CVE-2024-44812 9.8 CRITICAL 1 PoC Analysis EPSS 0.19
Online Complaint Site <1.0 - Privilege Escalation
SQL Injection vulnerability in Online Complaint Site v.1.0 allows a remote attacker to escalate privileges via the username and password parameters in the /admin.index.php component.
CWE-89 Oct 22, 2024
CVE-2024-25291 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
Deskfiler <1.2.3 - RCE
Deskfiler v1.2.3 allows attackers to execute arbitrary code via uploading a crafted plugin.
CWE-94 Feb 29, 2024