Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,482 CVEs tracked 53,635 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,335 vendors 43,883 researchers
4,103 results Clear all
CVE-2023-26785 9.8 CRITICAL 1 PoC Analysis EPSS 0.63
MariaDB <10.5 - RCE
MariaDB v10.5 was discovered to contain a remote code execution (RCE) vulnerability via UDF Code in a Shared Object File, followed by a "create function" statement. NOTE: this is disputed by the MariaDB Foundation because no privilege boundary is crossed.
CWE-94 Oct 17, 2024
CVE-2023-46371 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
TP-Link TL-WDR7660 <2.0.30 & TL-WR886N <2.0.12 - Buffer Overflow
TP-Link device TL-WDR7660 2.0.30 and TL-WR886N 2.0.12 has a stack overflow vulnerability via the function upgradeInfoJsonToBin.
CWE-787 Oct 25, 2023
CVE-2023-6319 9.1 CRITICAL 1 PoC Analysis EPSS 0.11
webOS <5.30.40, <6.3.3-442 - Command Injection
A command injection vulnerability exists in the getAudioMetadata method from the com.webos.service.attachedstoragemanager service on webOS version 4 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability. * webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA  * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA  * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB  * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA
CWE-78 Apr 09, 2024
CVE-2023-52268 9.1 CRITICAL 1 PoC Analysis EPSS 0.01
FreeScout End-User Portal <1.0.65 - Auth Bypass
The End-User Portal module before 1.0.65 for FreeScout sometimes allows an attacker to authenticate as an arbitrary user because a session token can be sent to the /auth endpoint. NOTE: this module is not part of freescout-helpdesk/freescout on GitHub.
CWE-384 Nov 12, 2024
CVE-2023-35854 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Zohocorp Manageengine Adselfservice Plus - Missing Authentication
Zoho ManageEngine ADSelfService Plus through 6113 has an authentication bypass that can be exploited to steal the domain controller session token for identity spoofing, thereby achieving the privileges of the domain controller administrator. NOTE: the vendor's perspective is that they have "found no evidence or detail of a security vulnerability."
CWE-306 Jun 20, 2023
CVE-2023-28753 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
netconsd <0.2 - Memory Corruption
netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data.
CWE-787 May 18, 2023
CVE-2023-50245 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Afichet Openexr Viewer < 0.6.1 - Buffer Overflow
OpenEXR-viewer is a viewer for OpenEXR files with detailed metadata probing. Versions prior to 0.6.1 have a memory overflow vulnerability. This issue is fixed in version 0.6.1.
CWE-120 Dec 11, 2023
CVE-2023-29384 10.0 CRITICAL 1 PoC Analysis EPSS 0.04
HM Plugin WordPress Job Board and Recruitment Plugin - Unrestricted Upload of File with Dangerous Type
Unrestricted Upload of File with Dangerous Type vulnerability in HM Plugin WordPress Job Board and Recruitment Plugin – JobWP.This issue affects WordPress Job Board and Recruitment Plugin – JobWP: from n/a through 2.0.
CWE-434 Dec 20, 2023
CVE-2023-42470 9.8 CRITICAL 1 PoC Analysis EPSS 0.13
Life < 6.8.0 - Code Injection
The Imou Life com.mm.android.smartlifeiot application through 6.8.0 for Android allows Remote Code Execution via a crafted intent to an exported component. This relates to the com.mm.android.easy4ip.MainActivity activity. JavaScript execution is enabled in the WebView, and direct web content loading occurs.
CWE-94 Sep 11, 2023
CVE-2023-48194 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Tenda Ac8 Firmware - Out-of-Bounds Write
Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \x0. After executing set_client_qos, control over the gp register can be obtained.
CWE-787 Jul 09, 2024
CVE-2023-50029 10.0 CRITICAL 1 PoC Analysis EPSS 0.01
PrestaAddons m4pdf <3.3.2 - Code Injection
PHP Injection vulnerability in the module "M4 PDF Extensions" (m4pdf) up to version 3.3.2 from PrestaAddons for PrestaShop allows attackers to run arbitrary code via the M4PDF::saveTemplate() method.
CWE-94 Jun 24, 2024
CVE-2023-26258 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.79
Arcserve UDP <9.0.6034 - Auth Bypass
Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
CWE-863 Jul 03, 2023
CVE-2023-30547 9.8 CRITICAL 4 PoCs Analysis EPSS 0.84
Vm2 < 3.9.16 - Injection
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
CWE-74 Apr 17, 2023
CVE-2023-51518 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Apache James <3.7.5, 3.8.0 - Privilege Escalation
Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation. Note that by default JMX endpoint is only bound locally. We recommend users to:  - Upgrade to a non-vulnerable Apache James version  - Run Apache James isolated from other processes (docker - dedicated virtual machine)  - If possible turn off JMX
CWE-502 Feb 27, 2024
CVE-2023-2024 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
Johnsoncontrols Openblue Enterprise M... - Authentication Bypass
Improper authentication in OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 allow access to an unauthorized user under certain circumstances.
CWE-287 May 18, 2023
CVE-2023-34152 9.8 CRITICAL 2 PoCs Analysis EPSS 0.75
ImageMagick - RCE
A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
CWE-78 May 30, 2023
CVE-2023-34992 10.0 CRITICAL 2 PoCs Analysis EPSS 0.76
Fortinet Fortisiem < 6.6.3 - OS Command Injection
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet allows attacker to execute unauthorized code or commands via crafted API requests.
CWE-78 Oct 10, 2023
CVE-2023-27100 9.8 CRITICAL 3 PoCs Analysis EPSS 0.03
Netgate pfSense Plus <v22.05.1 - Auth Bypass
Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests.
CWE-307 Mar 22, 2023
CVE-2023-45239 9.8 CRITICAL 1 PoC Analysis EPSS 0.29
Facebook Tac Plus < 2023-10-05 - Remote Code Execution
A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.
CWE-790 Oct 06, 2023
CVE-2023-49606 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.73
Tinyproxy - Use After Free
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
CWE-416 May 01, 2024