Critical Vulnerabilities with Public Exploits

Updated 19m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,103 results Clear all
CVE-2023-27997 9.8 CRITICAL KEV RANSOMWARE 11 PoCs Analysis EPSS 0.91
Fortinet Fortiproxy < 1.1.6 - Out-of-Bounds Write
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
CWE-122 Jun 13, 2023
CVE-2023-25690 9.8 CRITICAL EXPLOITED 5 PoCs Analysis EPSS 0.68
Apache HTTP Server < 2.4.55 - HTTP Request Smuggling
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
CWE-444 Mar 07, 2023
CVE-2023-2163 10.0 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.00
Linux Kernel >=5.4 - Privilege Escalation
Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.
CWE-682 Sep 20, 2023
CVE-2023-43208 9.8 CRITICAL KEV RANSOMWARE 15 PoCs Analysis NUCLEI EPSS 0.94
NextGen Healthcare Mirth Connect <4.4.1 - RCE
NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679.
CWE-78 Oct 26, 2023
CVE-2023-21716 9.8 CRITICAL EXPLOITED 12 PoCs Analysis EPSS 0.91
Microsoft Word - RCE
Microsoft Word Remote Code Execution Vulnerability
CWE-190 Feb 14, 2023
CVE-2023-34362 9.8 CRITICAL KEV RANSOMWARE 15 PoCs Analysis NUCLEI EPSS 0.94
MOVEit SQL Injection vulnerability
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.
CWE-89 Jun 02, 2023
CVE-2023-50965 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.05
Starnight Micro HTTP Server - Out-of-Bounds Write
In MicroHttpServer (aka Micro HTTP Server) through 4398570, _ReadStaticFiles in lib/middleware.c allows a stack-based buffer overflow and potentially remote code execution via a long URI.
CWE-787 Dec 17, 2023
CVE-2023-6329 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Control iD iDSecure Authentication Bypass (CVE-2023-6329)
An authentication bypass vulnerability exists in Control iD iDSecure v4.7.32.0. The login routine used by iDS-Core.dll contains a "passwordCustom" option that allows an unauthenticated attacker to compute valid credentials that can be used to bypass authentication and act as an administrative user.
CWE-287 Nov 27, 2023
CVE-2023-27372 9.8 CRITICAL EXPLOITED 16 PoCs Analysis NUCLEI EPSS 0.93
Spip < 3.2.18 - Insecure Deserialization
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
CWE-502 Feb 28, 2023
CVE-2023-1177 9.3 CRITICAL EXPLOITED 8 PoCs Analysis NUCLEI EPSS 0.93
Lfprojects Mlflow < 2.2.1 - Path Traversal
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
CWE-29 Mar 24, 2023
CVE-2023-3452 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.87
Canto plugin for WordPress <=3.0.4 - RCE
The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
CWE-98 Aug 12, 2023
CVE-2023-51812 9.8 CRITICAL 1 PoC EPSS 0.03
Tenda AX3 <16.03.12.11 - RCE
Tenda AX3 v16.03.12.11 was discovered to contain a remote code execution (RCE) vulnerability via the list parameter at /goform/SetNetControlList.
CWE-77 Jan 04, 2024
CVE-2023-51154 9.8 CRITICAL 1 PoC EPSS 0.00
Jizhicms v2.5 - File Download
Jizhicms v2.5 was discovered to contain an arbitrary file download vulnerability via the component /admin/c/PluginsController.php.
CWE-200 Jan 04, 2024
CVE-2023-50578 9.8 CRITICAL 1 PoC NUCLEI EPSS 0.32
Mingsoft Mcms - SQL Injection
Mingsoft MCMS v5.2.9 was discovered to contain a SQL injection vulnerability via the categoryType parameter at /content/list.do.
CWE-89 Dec 30, 2023
CVE-2023-46886 9.1 CRITICAL 1 PoC EPSS 0.01
Dreamer CMS <4.0.1 - Path Traversal
Dreamer CMS before version 4.0.1 is vulnerable to Directory Traversal. Background template management allows arbitrary modification of the template file, allowing system sensitive files to be read.
CWE-22 Nov 29, 2023
CVE-2023-39016 9.8 CRITICAL 1 PoC EPSS 0.00
bboss-persistent <6.0.9 - Code Injection
bboss-persistent v6.0.9 and below was discovered to contain a code injection vulnerability in the component com.frameworkset.common.poolman.util.SQLManager.createPool. This vulnerability is exploited via passing an unchecked argument.
CWE-94 Jul 28, 2023
CVE-2023-30331 9.8 CRITICAL 1 PoC 1 Writeup EPSS 0.00
beetl <3.15.0 - Code Injection
An issue in the render function of beetl v3.15.0 allows attackers to execute server-side template injection (SSTI) via a crafted payload.
May 04, 2023
CVE-2023-42117 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Exim < 4.96.2 - Remote Code Execution
Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.
CWE-138 May 03, 2024
CVE-2023-31719 9.8 CRITICAL 2 PoCs Analysis EPSS 0.65
FUXA <= 1.1.12 - SQL Injection
FUXA <= 1.1.12 is vulnerable to SQL Injection via /api/signin.
CWE-89 Sep 22, 2023
CVE-2023-4966 9.4 CRITICAL KEV RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.94
Citrix Netscaler Application Delivery Controller - Memory Corruption
Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA  virtual server.
CWE-119 Oct 10, 2023