Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,103 results Clear all
CVE-2023-33443 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
BES-6024PB-I50H1 VideoPlayTool <2.0.1.0 - Command Injection
Incorrect access control in the administrative functionalities of BES--6024PB-I50H1 VideoPlayTool v2.0.1.0 allow attackers to execute arbitrary administrative commands via a crafted payload sent to the desired endpoints.
CWE-346 Jun 08, 2023
CVE-2023-38545 9.8 CRITICAL 10 PoCs Analysis EPSS 0.27
curl - Buffer Overflow
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.
CWE-787 Oct 18, 2023
CVE-2023-50164 9.8 CRITICAL EXPLOITED 19 PoCs Analysis EPSS 0.93
Apache Struts < 2.5.33 - Remote Code Execution
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
CWE-552 Dec 07, 2023
CVE-2023-46295 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Teledyne FLIR M300 <2.00-19 - RCE
An issue was discovered in Teledyne FLIR M300 2.00-19. Unauthenticated remote code execution can occur in the web server. An attacker can exploit this by sending a POST request to the vulnerable PHP page. An attacker can elevate to root permissions with Sudo.
CWE-918 May 01, 2024
CVE-2023-5360 9.8 CRITICAL EXPLOITED 12 PoCs Analysis NUCLEI EPSS 0.93
WordPress Royal Elementor Addons RCE
The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.
CWE-434 Oct 31, 2023
CVE-2023-43364 9.8 CRITICAL 2 PoCs Analysis EPSS 0.30
Searchor <2.4.2 - Code Injection
main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution.
CWE-74 Dec 12, 2023
CVE-2023-7028 10.0 CRITICAL KEV 19 PoCs Analysis NUCLEI EPSS 0.93
GitLab Password Reset Account Takeover
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
CWE-640 Jan 12, 2024
CVE-2023-6875 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
Wordpress POST SMTP Account Takeover
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover. CVE-2023-52233 appears to be a duplicate of this issue.
CWE-639 Jan 11, 2024
CVE-2023-2917 9.8 CRITICAL 1 PoC Analysis EPSS 0.41
ThinManager Path Traversal (CVE-2023-2917) Arbitrary File Upload
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability.  Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed.  A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities.
CWE-22 Aug 17, 2023
CVE-2023-27855 9.8 CRITICAL 1 PoC Analysis EPSS 0.72
ThinManager Path Traversal (CVE-2023-27855) Arbitrary File Upload
In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.
CWE-22 Mar 22, 2023
CVE-2023-28121 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
Automattic Woocommerce Payments < 4.8.2 - Authentication Bypass
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
CWE-287 Apr 12, 2023
CVE-2023-21554 9.8 CRITICAL 6 PoCs Analysis EPSS 0.92
CVE-2023-21554 - QueueJumper - MSMQ RCE Check
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CWE-20 Apr 11, 2023
CVE-2023-49103 10.0 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.94
ownCloud Phpinfo Reader
An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure.
CWE-200 Nov 21, 2023
CVE-2023-5350 9.1 CRITICAL 1 PoC Analysis EPSS 0.15
Salesagility Suitecrm < 7.14.1 - SQL Injection
SQL Injection in GitHub repository salesagility/suitecrm prior to 7.14.1.
CWE-89 Oct 03, 2023
CVE-2023-2825 10.0 CRITICAL 8 PoCs Analysis NUCLEI EPSS 0.92
GitLab Authenticated File Read
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
CWE-22 May 26, 2023
CVE-2023-43177 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.77
CrushFTP Unauthenticated RCE
CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes.
CWE-913 Nov 18, 2023
CVE-2023-22518 9.8 CRITICAL KEV RANSOMWARE 9 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Confluence Unauth JSON setup-restore Improper Authorization leading to RCE (CVE-2023-22518)
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
CWE-863 Oct 31, 2023
CVE-2023-43654 10.0 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
TorchServe <0.8.1 - RCE
TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-918 Sep 28, 2023
CVE-2023-42793 9.8 CRITICAL KEV RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.93
Jetbrains Teamcity < 2023.05.4 - Missing Authentication
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
CWE-306 Sep 19, 2023
CVE-2023-26469 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.93
Jorani 1.0.0 - Path Traversal
In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
CWE-22 Aug 17, 2023