Critical Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
4,103 results Clear all
CVE-2024-32459 9.8 CRITICAL 1 PoC Analysis EPSS 0.11
FreeRDP <3.5.0, <2.11.6 - Memory Corruption
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.
CWE-125 Apr 22, 2024
CVE-2024-33559 9.3 CRITICAL 2 PoCs Analysis EPSS 0.06
8theme XStore <9.3.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in 8theme XStore allows SQL Injection.This issue affects XStore: from n/a through 9.3.5.
CWE-89 Apr 29, 2024
CVE-2024-34226 9.4 CRITICAL 1 PoC Analysis EPSS 0.00
SourceCodester Visitor Management System 1.0 - SQL Injection
SQL injection vulnerability in /php-sqlite-vms/?page=manage_visitor&id=1 in SourceCodester Visitor Management System 1.0 allow attackers to execute arbitrary SQL commands via the id parameters.
CWE-89 May 14, 2024
CVE-2024-31848 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.94
CData API Server < 23.4.8844 - Path Traversal
A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application.
CWE-22 Apr 05, 2024
CVE-2024-32370 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
HSC Cybersecurity HC Mailinspector <5.2.18 - Info Disclosure
An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the id parameter in the mliSystemUsers.php component.
CWE-782 May 07, 2024
CVE-2024-33775 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Nagios XI - Improper Privilege Management
An issue with the Autodiscover component in Nagios XI 2024R1.01 allows a remote attacker to escalate privileges via a crafted Dashlet.
CWE-269 May 01, 2024
CVE-2024-24576 10.0 CRITICAL 8 PoCs Analysis EPSS 0.79
Rust <1.77.2 - Command Injection
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted. One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution. Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process. The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.
CWE-78 Apr 09, 2024
CVE-2024-32238 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.89
H3C ER8300G2-X - Info Disclosure
H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's management system can be accessed via the management system page login interface.
CWE-522 Apr 22, 2024
CVE-2024-34987 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Phpgurukul Online Fire Reporting System - SQL Injection
A SQL Injection vulnerability exists in the `ofrs/admin/index.php` script of PHPGurukul Online Fire Reporting System 1.2. The vulnerability allows attackers to bypass authentication and gain unauthorized access by injecting SQL commands into the username input field during the login process.
CWE-89 Jun 03, 2024
CVE-2024-2879 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.94
WordPress Plugin LayerSlider 7.9.11-7.10.0 - SQL Injection
The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Apr 03, 2024
CVE-2024-29375 9.8 CRITICAL 1 PoC Analysis EPSS 0.12
Addactis IBNRS <3.10.3.107 - Code Injection
CSV Injection vulnerability in Addactis IBNRS v.3.10.3.107 allows a remote attacker to execute arbitrary code via a crafted .ibnrs file to the Project Description, Identifiers, Custom Triangle Name (inside Input Triangles) and Yield Curve Name parameters.
CWE-1236 Apr 04, 2024
CVE-2024-24724 9.8 CRITICAL 1 PoC Analysis EPSS 0.45
Gibbon <26.0.00 - SSRF/RCE
Gibbon through 26.0.00 allows /modules/School%20Admin/messengerSettings.php Server Side Template Injection leading to Remote Code Execution because input is passed to the Twig template engine (messengerSettings.php) without sanitization.
CWE-1336 Apr 03, 2024
CVE-2024-24496 9.8 CRITICAL 1 PoC Analysis EPSS 0.34
Daily Habit Tracker <1.0 - RCE
An issue in Daily Habit Tracker v.1.0 allows a remote attacker to manipulate trackers via the home.php, add-tracker.php, delete-tracker.php, update-tracker.php components.
CWE-284 Feb 08, 2024
CVE-2024-24495 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Daily Habit Tracker 1.0 - SQL Injection
SQL Injection vulnerability in delete-tracker.php in Daily Habit Tracker v.1.0 allows a remote attacker to execute arbitrary code via crafted GET request.
CWE-89 Feb 08, 2024
CVE-2024-28515 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
CSAPP Lab <15-213 - Buffer Overflow
Buffer Overflow vulnerability in CSAPP_Lab CSAPP Lab3 15-213 Fall 20xx allows a remote attacker to execute arbitrary code via the lab3 of csapp,lab3/buflab-update.pl component.
CWE-125 Apr 03, 2024
CVE-2024-22638 9.8 CRITICAL 1 PoC Analysis EPSS 0.06
liveSite <2019.1 - RCE
liveSite v2019.1 was discovered to contain a remote code execution (RCE) vulenrabiity via the component /livesite/edit_designer_region.php or /livesite/add_email_campaign.php.
Jan 25, 2024
CVE-2024-25227 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
ABO.CMS <5.8 - SQL Injection
SQL Injection vulnerability in ABO.CMS version 5.8, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the tb_login parameter in admin login page.
CWE-89 Mar 15, 2024
CVE-2024-28595 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
Walterjnr1 Employee Management System - SQL Injection
SQL Injection vulnerability in Employee Management System v1.0 allows attackers to run arbitrary SQL commands via the admin_id parameter in update-admin.php.
CWE-89 Mar 19, 2024
CVE-2024-27747 9.8 CRITICAL 2 PoCs Analysis EPSS 0.17
Petrol Pump Mangement Software <1.0 - RCE
File Upload vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the email Image parameter in the profile.php component.
CWE-434 Mar 01, 2024
CVE-2024-27746 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
Petrol Pump Mangement Software <1.0 - SQL Injection
SQL Injection vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the email address parameter in the index.php component.
CWE-89 Mar 01, 2024