Critical Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,103 results
Clear all
CVE-2024-25291
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.16
Deskfiler <1.2.3 - RCE
Deskfiler v1.2.3 allows attackers to execute arbitrary code via uploading a crafted plugin.
CWE-94
Feb 29, 2024
CVE-2024-22891
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.39
Nteract <0.28.0 - RCE
Nteract v.0.28.0 was discovered to contain a remote code execution (RCE) vulnerability via the Markdown link.
CWE-601
Mar 01, 2024
CVE-2024-25293
9.3
CRITICAL
1 PoC
Analysis
EPSS 0.20
mjml-app <3.1.0-beta - RCE
mjml-app versions 3.0.4 and 3.1.0-beta were discovered to contain a remote code execution (RCE) via the href attribute.
CWE-94
Mar 01, 2024
CVE-2024-23998
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.12
Goanother Another Redis Desktop Manager < 1.6.1 - XSS
goanother Another Redis Desktop Manager =<1.6.1 is vulnerable to Cross Site Scripting (XSS) via src/components/Setting.vue.
CWE-79
Jul 05, 2024
CVE-2024-23997
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.05
Lukasbach Yana < 1.0.16 - XSS
Lukas Bach yana =<1.0.16 is vulnerable to Cross Site Scripting (XSS) via src/electron-main.ts.
CWE-79
Jul 05, 2024
CVE-2024-5274
9.6
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.04
Google Chrome < 125.0.6422.112 - Type Confusion
Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE-843
May 28, 2024
CVE-2024-45265
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
SkySystem Arfa-CMS <5.1.3124 - SQL Injection
A SQL injection vulnerability in the poll component in SkySystem Arfa-CMS before 5.1.3124 allows remote attackers to execute arbitrary SQL commands via the psid parameter.
CWE-79
Aug 26, 2024
CVE-2024-7094
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.72
JS Help Desk & Support Plugin <2.8.7 - RCE
The JS Help Desk – The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.8.6 via the 'storeTheme' function. This is due to a lack of sanitization on user-supplied values, which replace values in the style.php file, along with missing capability checks. This makes it possible for unauthenticated attackers to execute code on the server. This issue was partially patched in 2.8.6 when the code injection issue was resolved, and fully patched in 2.8.7 when the missing authorization and cross-site request forgery protection was added. CVE-2024-43274 is likely a duplicate of this issue.
CWE-94
Aug 13, 2024
CVE-2024-33644
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.17
WPCustomify Customify Site Library <0.0.9 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in WPCustomify Customify Site Library allows Code Injection.This issue affects Customify Site Library: from n/a through 0.0.9.
CWE-94
May 17, 2024
CVE-2024-42919
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.10
eScan Management Console <14.0.1400.2281 - Privilege Escalation
eScan Management Console 14.0.1400.2281 is vulnerable to Incorrect Access Control via acteScanAVReport.
CWE-284
Aug 20, 2024
CVE-2024-6205
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
PayPlus Payment Gateway <6.6.9 - SQL Injection
The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
CWE-89
Jul 19, 2024
CVE-2024-42658
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.14
Wishnet Nepstech Wifi Router <1.0 - Info Disclosure
An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookie's parameter
CWE-200
Aug 19, 2024
CVE-2024-42850
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.50
Silverpeas <6.4.2 - Auth Bypass
An issue in the password change function of Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements.
CWE-521
Aug 16, 2024
CVE-2024-34833
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.42
Oretnom23 Payroll Management System - Unrestricted File Upload
Sourcecodester Payroll Management System v1.0 is vulnerable to File Upload. Users can upload images via the "save_settings" page. An unauthenticated attacker can leverage this functionality to upload a malicious PHP file instead. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as the user running the web server.
CWE-434
Jun 17, 2024
CVE-2024-3105
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.58
AdSense Ads <2.5.0 - Authenticated RCE
The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.5.0 via the 'insert_php' shortcode. This is due to the plugin not restricting the usage of the functionality to high level authorized users. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server.
CWE-94
Jun 15, 2024
CVE-2024-25897
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
Churchcrm - SQL Injection
ChurchCRM 5.5.0 FRCatalog.php is vulnerable to Blind SQL Injection (Time-based) via the CurrentFundraiser GET parameter.
CWE-89
Feb 21, 2024
CVE-2024-4320
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.64
Lollms Web UI - Path Traversal
A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuilder().build_extension()` method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a malicious `name` parameter that causes the server to load and execute a `__init__.py` file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode.
CWE-29
Jun 06, 2024
CVE-2024-42461
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.03
Elliptic <6.5.6 - Info Disclosure
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
CWE-347
Aug 02, 2024
CVE-2024-40422
9.1
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.91
stitionai devika v1 - Path Traversal
The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system.
CWE-22
Jul 24, 2024
CVE-2024-32700
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.62
Kognetiks Chatbot for WordPress <2.0.0 - Unrestricted File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in Kognetiks Kognetiks Chatbot for WordPress.This issue affects Kognetiks Chatbot for WordPress: from n/a through 2.0.0.
CWE-434
May 14, 2024