Critical Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,103 results
Clear all
CVE-2024-36539
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.14
Contour <1.28.3 - Privilege Escalation
Insecure permissions in contour v1.28.3 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token.
CWE-277
Jul 24, 2024
CVE-2024-41276
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.14
Kaiten <57.131.12 - Auth Bypass
A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application.
CWE-307
Oct 01, 2024
CVE-2024-39700
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.04
Jupyterlab < 4.3.0 - Code Injection
JupyterLab extension template is a `copier` template for JupyterLab extensions. Repositories created using this template with `test` option include `update-integration-tests.yml` workflow which has an RCE vulnerability. Extension authors hosting their code on GitHub are urged to upgrade the template to the latest version. Users who made changes to `update-integration-tests.yml`, accept overwriting of this file and re-apply your changes later. Users may wish to temporarily disable GitHub Actions while working on the upgrade. We recommend rebasing all open pull requests from untrusted users as actions may run using the version from the `main` branch at the time when the pull request was created. Users who are upgrading from template version prior to 4.3.0 may wish to leave out proposed changes to the release workflow for now as it requires additional configuration.
CWE-94
Jul 16, 2024
CVE-2024-34144
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.50
Jenkins Script Security Plugin <=1335.vf07d9ce377a_e - Sandbox Bypass
A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
CWE-693
May 02, 2024
CVE-2024-40498
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
PuneethReddyHC Online Shopping <1.0 - SQL Injection
SQL Injection vulnerability in PuneethReddyHC Online Shopping sysstem advanced v.1.0 allows an attacker to execute arbitrary code via the register.php
CWE-89
Aug 05, 2024
CVE-2024-41110
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.04
Docker < 23.0.15 - HTTP Request Smuggling
Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.
Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.
A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.
Docker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.
docker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.
CWE-187
Jul 24, 2024
CVE-2024-31989
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.09
Argo CD - Info Disclosure
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10.
CWE-327
May 21, 2024
CVE-2024-39250
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.85
Efrotech Timetrax - SQL Injection
EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface.
CWE-89
Jul 22, 2024
CVE-2024-34313
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.25
VPL Jail System <4.0.2 - Path Traversal
An issue in VPL Jail System up to v4.0.2 allows attackers to execute a directory traversal via a crafted request to a public endpoint.
CWE-22
Jun 24, 2024
CVE-2024-3596
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.14
RADIUS Protocol - Forgery
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
CWE-924
Jul 09, 2024
CVE-2024-37770
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.11
B1ackc4t 14finger - Code Injection
14Finger v1.1 was discovered to contain a remote command execution (RCE) vulnerability in the fingerprint function. This vulnerability allows attackers to execute arbitrary commands via a crafted payload.
CWE-94
Jul 10, 2024
CVE-2024-4885
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Progress Whatsup Gold < 23.1.3 - Path Traversal
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The
WhatsUp.ExportUtilities.Export.GetFileWithoutZip
allows execution of commands with iisapppool\nmconsole privileges.
CWE-22
Jun 25, 2024
CVE-2024-4883
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.92
Progress Whatsup Gold < 23.1.3 - Command Injection
In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe.
CWE-78
Jun 25, 2024
CVE-2024-39844
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.37
ZNC <1.9.1 - RCE
In ZNC before 1.9.1, remote code execution can occur in modtcl via a KICK.
CWE-94
Jul 03, 2024
CVE-2024-38366
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.58
trunk.cocoapods.org - Command Injection
trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. The part of trunk which verifies whether a user has a real email address on signup used a rfc-822 library which executes a shell command to validate the email domain MX records validity. It works via an DNS MX. This lookup could be manipulated to also execute a command on the trunk server, effectively giving root access to the server and the infrastructure. This issue was patched server-side with commit 001cc3a430e75a16307f5fd6cdff1363ad2f40f3 in September 2023. This RCE triggered a full user-session reset, as an attacker could have used this method to write to any Podspec in trunk.
CWE-74
Jul 01, 2024
CVE-2024-37762
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.28
Machform < 21 - Unrestricted File Upload
MachForm up to version 21 is affected by an authenticated unrestricted file upload which leads to a remote code execution.
CWE-434
Jul 01, 2024
CVE-2024-29974
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.48
Zyxel NAS326 <V5.21(AAZF.17)C0 - RCE
** UNSUPPORTED WHEN ASSIGNED **
The remote code execution vulnerability in the CGI program “file_upload-cgi” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute arbitrary code by uploading a crafted configuration file to a vulnerable device.
CWE-434
Jun 04, 2024
CVE-2024-29972
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Zyxel NAS326 <V5.21(AAZF.17)C0 - Command Injection
** UNSUPPORTED WHEN ASSIGNED **
The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
CWE-78
Jun 04, 2024
CVE-2024-22853
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.87
D-LINK Go-RT-AC750 - Code Injection
D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session.
CWE-798
Feb 06, 2024
CVE-2024-29868
9.1
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.78
Apache StreamPipes <0.95.0 - Info Disclosure
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.
This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.
This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.
Users are recommended to upgrade to version 0.95.0, which fixes the issue.
CWE-338
Jun 24, 2024