Vulnerabilities Exploited in the Wild with Public PoC

Updated 54m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
2,390 results Clear all
CVE-2024-0352 7.3 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Likeshop < 2.5.7.20210311 - Unrestricted File Upload
A vulnerability classified as critical was found in Likeshop up to 2.5.7.20210311. This vulnerability affects the function FileServer::userFormImage of the file server/application/api/controller/File.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250120.
CWE-434 Jan 09, 2024
CVE-2024-0519 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.00
Google Chrome <120.0.6099.224 - Memory Corruption
Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-125 Jan 16, 2024
CVE-2024-22145 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.49
InstaWP Connect <0.1.0.8 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in InstaWP InstaWP Connect instawp-connect.This issue affects InstaWP Connect: from n/a through <= 0.1.0.8.
CWE-266 May 17, 2024
CVE-2024-21887 9.1 CRITICAL KEV RANSOMWARE 15 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) - Command Injection
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
CWE-77 Jan 12, 2024
CVE-2024-12847 9.8 CRITICAL EXPLOITED 3 PoCs Analysis EPSS 0.69
Netgear Dgn1000 Firmware < 1.1.00.48 - Missing Authentication
NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been observed to be exploited in the wild since at least 2017 and specifically by the Shadowserver Foundation on 2025-02-06 UTC.
CWE-78 Jan 10, 2025
CVE-2023-36424 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.07
Windows Common Log File System Driver - Privilege Escalation
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE-125 Nov 14, 2023
CVE-2023-21529 8.8 HIGH KEV 1 PoC EPSS 0.26
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502 Feb 14, 2023
CVE-2023-49606 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.73
Tinyproxy - Use After Free
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
CWE-416 May 01, 2024
CVE-2023-22621 7.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Strapi < 4.5.6 - Injection
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
CWE-74 Apr 19, 2023
CVE-2023-40600 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.60
EWWW Image Optimizer <7.2.0 - Info Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Exactly WWW EWWW Image Optimizer. It works only when debug.log is turned on.This issue affects EWWW Image Optimizer: from n/a through 7.2.0.
CWE-200 Nov 30, 2023
CVE-2023-36899 8.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.70
ASP.NET - Privilege Escalation
ASP.NET Elevation of Privilege Vulnerability
CWE-20 Aug 08, 2023
CVE-2023-47253 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Qualitor < 8.20 - Command Injection
Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.
CWE-77 Nov 06, 2023
CVE-2023-41974 7.8 HIGH KEV 1 PoC Analysis EPSS 0.00
Apple Ipados < 17.0 - Use After Free
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, iOS 15.8.7 and iPadOS 15.8.7. An app may be able to execute arbitrary code with kernel privileges.
CWE-416 Jan 10, 2024
CVE-2023-6895 6.3 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Hikvision Intercom Broadcast System < 4.1.0 - OS Command Injection
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.
CWE-78 Dec 17, 2023
CVE-2023-32117 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.88
SoftLab Integrate Google Drive - Info Disclosure
Missing Authorization vulnerability in princeahmed Integrate Google Drive integrate-google-drive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integrate Google Drive: from n/a through <= 1.1.99.
CWE-862 Dec 09, 2024
CVE-2023-6360 8.6 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.88
WordPress My Calendar <3.4.22 - SQL Injection
The 'My Calendar' WordPress Plugin, version < 3.4.22 is affected by an unauthenticated SQL injection vulnerability in the 'from' and 'to' parameters in the '/my-calendar/v1/events' rest route.
CWE-89 Nov 30, 2023
CVE-2023-52076 8.5 HIGH EXPLOITED 1 PoC 1 Writeup Analysis EPSS 0.11
Atril Document Viewer <1.26.2 - Path Traversal
Atril Document Viewer is the default document reader of the MATE desktop environment for Linux. A path traversal and arbitrary file write vulnerability exists in versions of Atril prior to 1.26.2. This vulnerability is capable of writing arbitrary files anywhere on the filesystem to which the user opening a crafted document has access. The only limitation is that this vulnerability cannot be exploited to overwrite existing files, but that doesn't stop an attacker from achieving Remote Command Execution on the target system. Version 1.26.2 of Atril contains a patch for this vulnerability.
CWE-22 Jan 25, 2024
CVE-2023-52251 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Kafka UI Unauthenticated Remote Command Execution via the Groovy Filter option.
An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.
CWE-94 Jan 25, 2024
CVE-2023-43654 10.0 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
TorchServe <0.8.1 - RCE
TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-918 Sep 28, 2023
CVE-2023-6329 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Control iD iDSecure Authentication Bypass (CVE-2023-6329)
An authentication bypass vulnerability exists in Control iD iDSecure v4.7.32.0. The login routine used by iDS-Core.dll contains a "passwordCustom" option that allows an unauthenticated attacker to compute valid credentials that can be used to bypass authentication and act as an administrative user.
CWE-287 Nov 27, 2023