Critical Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,103 results
Clear all
CVE-2023-26785
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.63
MariaDB <10.5 - RCE
MariaDB v10.5 was discovered to contain a remote code execution (RCE) vulnerability via UDF Code in a Shared Object File, followed by a "create function" statement. NOTE: this is disputed by the MariaDB Foundation because no privilege boundary is crossed.
CWE-94
Oct 17, 2024
CVE-2023-46371
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
TP-Link TL-WDR7660 <2.0.30 & TL-WR886N <2.0.12 - Buffer Overflow
TP-Link device TL-WDR7660 2.0.30 and TL-WR886N 2.0.12 has a stack overflow vulnerability via the function upgradeInfoJsonToBin.
CWE-787
Oct 25, 2023
CVE-2023-6319
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.11
webOS <5.30.40, <6.3.3-442 - Command Injection
A command injection vulnerability exists in the getAudioMetadata method from the com.webos.service.attachedstoragemanager service on webOS version 4 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.
* webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA
* webOS 5.5.0 - 04.50.51 running on OLED55CXPUA
* webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB
* webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA
CWE-78
Apr 09, 2024
CVE-2023-52268
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.01
FreeScout End-User Portal <1.0.65 - Auth Bypass
The End-User Portal module before 1.0.65 for FreeScout sometimes allows an attacker to authenticate as an arbitrary user because a session token can be sent to the /auth endpoint. NOTE: this module is not part of freescout-helpdesk/freescout on GitHub.
CWE-384
Nov 12, 2024
CVE-2023-35854
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Zohocorp Manageengine Adselfservice Plus - Missing Authentication
Zoho ManageEngine ADSelfService Plus through 6113 has an authentication bypass that can be exploited to steal the domain controller session token for identity spoofing, thereby achieving the privileges of the domain controller administrator. NOTE: the vendor's perspective is that they have "found no evidence or detail of a security vulnerability."
CWE-306
Jun 20, 2023
CVE-2023-28753
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
netconsd <0.2 - Memory Corruption
netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data.
CWE-787
May 18, 2023
CVE-2023-50245
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Afichet Openexr Viewer < 0.6.1 - Buffer Overflow
OpenEXR-viewer is a viewer for OpenEXR files with detailed metadata probing. Versions prior to 0.6.1 have a memory overflow vulnerability. This issue is fixed in version 0.6.1.
CWE-120
Dec 11, 2023
CVE-2023-29384
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.04
HM Plugin WordPress Job Board and Recruitment Plugin - Unrestricted Upload of File with Dangerous Type
Unrestricted Upload of File with Dangerous Type vulnerability in HM Plugin WordPress Job Board and Recruitment Plugin – JobWP.This issue affects WordPress Job Board and Recruitment Plugin – JobWP: from n/a through 2.0.
CWE-434
Dec 20, 2023
CVE-2023-42470
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.13
Life < 6.8.0 - Code Injection
The Imou Life com.mm.android.smartlifeiot application through 6.8.0 for Android allows Remote Code Execution via a crafted intent to an exported component. This relates to the com.mm.android.easy4ip.MainActivity activity. JavaScript execution is enabled in the WebView, and direct web content loading occurs.
CWE-94
Sep 11, 2023
CVE-2023-48194
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Tenda Ac8 Firmware - Out-of-Bounds Write
Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \x0. After executing set_client_qos, control over the gp register can be obtained.
CWE-787
Jul 09, 2024
CVE-2023-50029
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.01
PrestaAddons m4pdf <3.3.2 - Code Injection
PHP Injection vulnerability in the module "M4 PDF Extensions" (m4pdf) up to version 3.3.2 from PrestaAddons for PrestaShop allows attackers to run arbitrary code via the M4PDF::saveTemplate() method.
CWE-94
Jun 24, 2024
CVE-2023-26258
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.79
Arcserve UDP <9.0.6034 - Auth Bypass
Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
CWE-863
Jul 03, 2023
CVE-2023-30547
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.84
Vm2 < 3.9.16 - Injection
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
CWE-74
Apr 17, 2023
CVE-2023-51518
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Apache James <3.7.5, 3.8.0 - Privilege Escalation
Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data.
Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation.
Note that by default JMX endpoint is only bound locally.
We recommend users to:
- Upgrade to a non-vulnerable Apache James version
- Run Apache James isolated from other processes (docker - dedicated virtual machine)
- If possible turn off JMX
CWE-502
Feb 27, 2024
CVE-2023-2024
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.00
Johnsoncontrols Openblue Enterprise M... - Authentication Bypass
Improper authentication in OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 allow access to an unauthorized user under certain circumstances.
CWE-287
May 18, 2023
CVE-2023-34152
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.75
ImageMagick - RCE
A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
CWE-78
May 30, 2023
CVE-2023-34992
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.76
Fortinet Fortisiem < 6.6.3 - OS Command Injection
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet allows attacker to execute unauthorized code or commands via crafted API requests.
CWE-78
Oct 10, 2023
CVE-2023-27100
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.03
Netgate pfSense Plus <v22.05.1 - Auth Bypass
Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests.
CWE-307
Mar 22, 2023
CVE-2023-45239
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.29
Facebook Tac Plus < 2023-10-05 - Remote Code Execution
A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.
CWE-790
Oct 06, 2023
CVE-2023-49606
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.73
Tinyproxy - Use After Free
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
CWE-416
May 01, 2024