Critical Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,103 results
Clear all
CVE-2023-3076
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.29
WordPress MStore API <3.9.9 - Privilege Escalation
The MStore API WordPress plugin before 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features.
CWE-862
Jul 10, 2023
CVE-2023-36109
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.20
JerryScript 3.0 - RCE
Buffer Overflow vulnerability in JerryScript version 3.0, allows remote attackers to execute arbitrary code via ecma_stringbuilder_append_raw component at /jerry-core/ecma/base/ecma-helpers-string.c.
CWE-120
Sep 20, 2023
CVE-2023-2986
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
Tychesoftwares Abandoned Cart Lite Fo... - Authentication Bypass
The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.14.2. This is due to insufficient encryption on the user being supplied during the abandoned cart link decode through the plugin. This allows unauthenticated attackers to log in as users who have abandoned the cart, who are typically customers. Further security hardening was introduced in version 5.15.1 that ensures sites are no longer vulnerable through historical check-out links, and additional hardening was introduced in version 5.15.2 that ensured null key values wouldn't permit the authentication bypass.
CWE-288
Jun 08, 2023
CVE-2023-37756
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
I-doit pro <25 - Info Disclosure
I-doit pro 25 and below and I-doit open 25 and below employ weak password requirements for Administrator account creation. Attackers are able to easily guess users' passwords via a bruteforce attack.
CWE-521
Sep 14, 2023
CVE-2023-37755
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
I-doit < 25 - Hard-coded Credentials
i-doit pro 25 and below and I-doit open 25 and below are configured with insecure default administrator credentials, and there is no warning or prompt to ask users to change the default password and account name. Unauthenticated attackers can exploit this vulnerability to obtain Administrator privileges, resulting in them being able to perform arbitrary system operations or cause a Denial of Service (DoS).
CWE-798
Sep 14, 2023
CVE-2023-53874
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
GOM Player <2.3.90.5360 - Buffer Overflow
GOM Player 2.3.90.5360 contains a buffer overflow vulnerability in the equalizer preset name input field that allows attackers to crash the application. Attackers can overwrite the preset name with 260 'A' characters to trigger a buffer overflow and cause application instability.
CWE-120
Dec 15, 2025
CVE-2023-53871
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Soosyze 2.0.0 - Code Injection
Soosyze 2.0.0 contains a file upload vulnerability that allows attackers to upload arbitrary HTML files with embedded PHP code to the application. Attackers can exploit the broken file upload mechanism to potentially view sensitive file paths and execute malicious PHP scripts on the server.
CWE-434
Dec 15, 2025
CVE-2023-41508
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
Super Store Finder <3.6 - Info Disclosure
A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
CWE-798
Sep 05, 2023
CVE-2023-41507
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Super Store Finder <3.6 - SQL Injection
Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters.
CWE-89
Sep 05, 2023
CVE-2023-22884
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.76
Apache Airflow < 2.5.1 - Command Injection
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow, Apache Software Foundation Apache Airflow MySQL Provider.This issue affects Apache Airflow: before 2.5.1; Apache Airflow MySQL Provider: before 4.0.0.
CWE-77
Jan 21, 2023
CVE-2023-34600
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.58
Adiscon Loganalyzer < 4.1.13 - SQL Injection
Adiscon LogAnalyzer v4.1.13 and before is vulnerable to SQL Injection.
CWE-89
Jun 20, 2023
CVE-2023-53877
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Bus Reservation System 1.1 - SQL Injection
Bus Reservation System 1.1 contains a SQL injection vulnerability in the pickup_id parameter that allows attackers to manipulate database queries. Attackers can exploit boolean-based, error-based, and time-based blind SQL injection techniques to steal information from the database.
CWE-89
Dec 15, 2025
CVE-2023-29300
9.8
CRITICAL
KEV
RANSOMWARE
1 PoC
NUCLEI
EPSS 0.94
Adobe ColdFusion <2018u16, <2021u6, <2023.0.0.330468 - Code Injection
Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
CWE-502
Jul 12, 2023
CVE-2023-22463
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
NUCLEI
EPSS 0.92
Fit2cloud Kubepi < 1.6.3 - Hard-coded Credentials
KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code. The vulnerability has been fixed in 1.6.3. In the patch, JWT key is specified in app.yml. If the user leaves it blank, a random key will be used. There are no workarounds aside from upgrading.
CWE-798
Jan 04, 2023
CVE-2023-4696
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Memos < 0.13.2 - Improper Access Control
Improper Access Control in GitHub repository usememos/memos prior to 0.13.2.
CWE-284
Sep 01, 2023
CVE-2023-36281
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.62
langchain <0.0.171 - RCE
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via a JSON file to load_prompt. This is related to __subclasses__ or a template.
CWE-94
Aug 22, 2023
CVE-2023-41265
9.6
CRITICAL
KEV
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.92
Qlik Sense - HTTP Request Smuggling
An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
CWE-444
Aug 29, 2023
CVE-2023-35885
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
CloudPanel 2 <2.3.1 - Auth Bypass
CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
CWE-565
Jun 20, 2023
CVE-2023-2868
9.4
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.91
Barracuda Email Security Gateway <9.2.0.006 - Command Injection
A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.
CWE-20
May 24, 2023
CVE-2023-40852
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Phpgurukul <3.0 - SQL Injection
SQL Injection vulnerability in Phpgurukul User Registration & Login and User Management System With admin panel 3.0 allows attackers to obtain sensitive information via crafted string in the admin user name field on the admin log in page.
CWE-89
Oct 16, 2023