Critical Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,103 results
Clear all
CVE-2024-37759
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.81
Datagear < 5.0.0 - Injection
DataGear v5.0.0 and earlier was discovered to contain a SpEL (Spring Expression Language) expression injection vulnerability via the Data Viewing interface.
CWE-74
Jun 24, 2024
CVE-2024-29275
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.68
SeaCMS <12.9 - SQL Injection
SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticated attackers to execute arbitrary code and obtain sensitive information via the id parameter in class.php.
CWE-89
Mar 22, 2024
CVE-2024-2257
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.04
Digisol Router <3.2.02 - Info Disclosure
This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.
Successful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats.
CWE-20
May 14, 2024
CVE-2024-37843
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.89
Craftcms Craft Cms < 3.7.31 - SQL Injection
Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.
CWE-89
Jun 25, 2024
CVE-2024-29855
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.19
Veeam Recovery Orchestrator - Auth Bypass
Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator
CWE-798
Jun 11, 2024
CVE-2024-36104
9.1
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Apache OFBiz <18.12.14 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14.
Users are recommended to upgrade to version 18.12.14, which fixes the issue.
CWE-22
Jun 04, 2024
CVE-2024-38396
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.11
iTerm2 <3.5.2 - Code Injection
An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
CWE-94
Jun 16, 2024
CVE-2024-38395
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.09
iTerm2 <3.5.2 - RCE
In iTerm2 before 3.5.2, the "Terminal may report window title" setting is not honored, and thus remote code execution might occur but "is not trivially exploitable."
CWE-94
Jun 16, 2024
CVE-2024-27173
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.45
Remote Command - RCE
Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
CWE-22
Jun 14, 2024
CVE-2024-37051
9.3
CRITICAL
2 PoCs
Analysis
EPSS 0.06
Jetbrains Aqua < 2024.1.2 - Insufficiently Protected Credentials
GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
CWE-522
Jun 10, 2024
CVE-2024-29849
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.54
Veeam Backup Enterprise Manager - Auth Bypass
Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.
CWE-287
May 22, 2024
CVE-2024-3922
10.0
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.89
Dokan Pro Plugin < 3.11.0 - SQL Injection
The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Jun 13, 2024
CVE-2024-34832
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
Cubecart < 6.5.5 - Path Traversal
Directory Traversal vulnerability in CubeCart v.6.5.5 and before allows an attacker to execute arbitrary code via a crafted file uploaded to the _g and node parameters.
CWE-22
Jun 06, 2024
CVE-2024-35469
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Oretnom23 Human Resource Management System - SQL Injection
A SQL injection vulnerability in /hrm/user/ in SourceCodester Human Resource Management System 1.0 allows attackers to execute arbitrary SQL commands via the password parameter.
CWE-89
May 30, 2024
CVE-2024-0039
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.20
Google Android - Out-of-Bounds Write
In attp_build_value_cmd of att_protocol.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-787
Mar 11, 2024
CVE-2024-23108
10.0
CRITICAL
EXPLOITED
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.90
Fortinet FortiSIEM - OS Command Injection
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet allows attacker to execute unauthorized code or commands via via crafted API requests.
CWE-78
Feb 05, 2024
CVE-2024-4443
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Business Directory Plugin - WordPress <6.4.2 - SQL Injection
The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘listingfields’ parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
May 22, 2024
CVE-2024-30998
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.13
Phpgurukul Men Salon Management System - SQL Injection
SQL Injection vulnerability in PHPGurukul Men Salon Management System v.2.0, allows remote attackers to execute arbitrary code and obtain sensitive information via the email parameter in the index.php component.
CWE-89
Apr 03, 2024
CVE-2024-31351
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.54
Copymatic < 1.7 - Unrestricted File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in Copymatic Copymatic – AI Content Writer & Generator.This issue affects Copymatic – AI Content Writer & Generator: from n/a through 1.6.
CWE-434
May 17, 2024
CVE-2024-4323
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.85
Treasuredata Fluent Bit < 2.2.3 - Out-of-Bounds Write
A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution.
CWE-122
May 20, 2024