Critical Vulnerabilities with Public Exploits

Updated 38m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,534 CVEs tracked 53,639 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,342 vendors 43,887 researchers
4,103 results Clear all
CVE-2023-54330 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Inbit Messenger < 4.9.0 - Out-of-Bounds Write
Inbit Messenger versions 4.6.0 to 4.9.0 contain a remote stack-based buffer overflow vulnerability that allows unauthenticated attackers to execute arbitrary code by sending malformed network packets. Attackers can craft a specially designed payload targeting the messenger's network handler to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems.
CWE-787 Jan 13, 2026
CVE-2023-54329 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Inbit Messenger < 4.9.0 - Out-of-Bounds Write
Inbit Messenger 4.6.0 - 4.9.0 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by exploiting a stack overflow in the messenger's protocol. Attackers can send specially crafted XML packets to port 10883 with a malicious payload to trigger the vulnerability and execute commands with system privileges.
CWE-787 Jan 13, 2026
CVE-2023-1665 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
linagora/twake <0.0.0. - Auth Bypass
Improper Restriction of Excessive Authentication Attempts in GitHub repository linagora/twake prior to 0.0.0.
CWE-307 Mar 27, 2023
CVE-2023-54339 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Webgrind < 1.1 - OS Command Injection
Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter, such as using payload '0%27%26calc.exe%26%27' to execute commands on the target system.
CWE-78 Jan 13, 2026
CVE-2023-54337 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Sysax Multi Server - Denial of Service
Sysax Multi Server 6.95 contains a denial of service vulnerability in the administrative password field that allows attackers to crash the application. Attackers can overwrite the password field with 800 bytes of repeated characters to trigger an application crash and disrupt server functionality.
CWE-1284 Jan 13, 2026
CVE-2023-54335 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Extplorer < 2.1.14 - Missing Authentication
eXtplorer 2.1.14 contains an authentication bypass vulnerability that allows attackers to login without a password by manipulating the login request. Attackers can exploit this flaw to upload malicious PHP files and execute remote commands on the vulnerable file management system.
CWE-306 Jan 13, 2026
CVE-2023-54334 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Explorerplusplus Explorer++ - Out-of-Bounds Write
Explorer32++ 1.3.5.531 contains a buffer overflow vulnerability in Structured Exception Handler (SEH) records that allows attackers to execute arbitrary code. Attackers can exploit the vulnerability by providing a long file name argument over 396 characters to corrupt the SEH chain and potentially execute malicious code.
CWE-787 Jan 13, 2026
CVE-2023-53774 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
MiniDVBLinux 5.4 - RCE
MiniDVBLinux 5.4 contains a remote code execution vulnerability in the SVDRP protocol that allows remote attackers to send commands to manipulate TV systems. Attackers can send crafted SVDRP commands through the svdrpsend.sh script to execute messages and potentially control the video disk recorder remotely.
CWE-306 Dec 09, 2025
CVE-2023-53771 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
MiniDVBLinux 5.4 - Auth Bypass
MiniDVBLinux 5.4 contains an authentication bypass vulnerability that allows remote attackers to change the root password without authentication. Attackers can send crafted POST requests to the system setup endpoint with modified SYSTEM_PASSWORD parameters to reset root credentials.
CWE-306 Dec 09, 2025
CVE-2023-31903 9.8 CRITICAL 1 PoC Analysis EPSS 0.06
GuppY CMS 6.00.10 - RCE
GuppY CMS 6.00.10 is vulnerable to Unrestricted File Upload which allows remote attackers to execute arbitrary code by uploading a php file.
CWE-434 May 17, 2023
CVE-2023-23279 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Canteen Management System - SQL Injection
Canteen Management System 1.0 is vulnerable to SQL Injection via /php_action/getOrderReport.php.
CWE-89 Feb 17, 2023
CVE-2023-23924 10.0 CRITICAL 1 PoC Analysis EPSS 0.51
Dompdf <2.0.1 - SSRF
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.
CWE-551 Feb 01, 2023
CVE-2023-27040 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
Simple Image Gallery v1.0 - RCE
Simple Image Gallery v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the username parameter.
CWE-74 Mar 16, 2023
CVE-2023-37734 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Ezsoftmagic Mp3 Audio Converter - Buffer Overflow
EZ softmagic MP3 Audio Converter 2.7.3.700 was discovered to contain a buffer overflow.
CWE-120 Aug 10, 2023
CVE-2022-29078 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
ejs 3.1.6 - Code Injection
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
CWE-94 Apr 25, 2022
CVE-2022-46364 9.8 CRITICAL 6 PoCs Analysis EPSS 0.00
Apache CXF <3.5.5, <3.4.10 - SSRF
A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. 
CWE-918 Dec 13, 2022
CVE-2022-46169 9.8 CRITICAL KEV 44 PoCs Analysis NUCLEI EPSS 0.94
Cacti 1.2.22 unauthenticated command injection
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: <TARGETIP>`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`. This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch.
CWE-78 Dec 05, 2022
CVE-2022-40684 9.8 CRITICAL KEV RANSOMWARE 33 PoCs Analysis NUCLEI EPSS 0.94
Fortinet Fortiproxy < 7.0.7 - Authentication Bypass
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
CWE-287 Oct 18, 2022
CVE-2022-22947 10.0 CRITICAL KEV 66 PoCs Analysis NUCLEI EPSS 0.94
Spring Cloud Gateway Remote Code Execution
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
CWE-917 Mar 03, 2022
CVE-2022-42889 9.8 CRITICAL EXPLOITED 62 PoCs Analysis NUCLEI EPSS 0.94
Apache Commons Text < 1.10.0 - Code Injection
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
CWE-94 Oct 13, 2022