Vulnerabilities Exploited in the Wild with Public PoC
Updated 54m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2024-0352
7.3
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.92
Likeshop < 2.5.7.20210311 - Unrestricted File Upload
A vulnerability classified as critical was found in Likeshop up to 2.5.7.20210311. This vulnerability affects the function FileServer::userFormImage of the file server/application/api/controller/File.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250120.
CWE-434
Jan 09, 2024
CVE-2024-0519
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.00
Google Chrome <120.0.6099.224 - Memory Corruption
Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-125
Jan 16, 2024
CVE-2024-22145
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.49
InstaWP Connect <0.1.0.8 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in InstaWP InstaWP Connect instawp-connect.This issue affects InstaWP Connect: from n/a through <= 0.1.0.8.
CWE-266
May 17, 2024
CVE-2024-21887
9.1
CRITICAL
KEV
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) - Command Injection
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
CWE-77
Jan 12, 2024
CVE-2024-12847
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
EPSS 0.69
Netgear Dgn1000 Firmware < 1.1.00.48 - Missing Authentication
NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been observed to be exploited in the wild since at least 2017 and specifically by the Shadowserver Foundation on 2025-02-06 UTC.
CWE-78
Jan 10, 2025
CVE-2023-36424
7.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.07
Windows Common Log File System Driver - Privilege Escalation
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE-125
Nov 14, 2023
CVE-2023-21529
8.8
HIGH
KEV
1 PoC
EPSS 0.26
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502
Feb 14, 2023
CVE-2023-49606
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.73
Tinyproxy - Use After Free
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
CWE-416
May 01, 2024
CVE-2023-22621
7.2
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Strapi < 4.5.6 - Injection
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
CWE-74
Apr 19, 2023
CVE-2023-40600
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.60
EWWW Image Optimizer <7.2.0 - Info Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Exactly WWW EWWW Image Optimizer. It works only when debug.log is turned on.This issue affects EWWW Image Optimizer: from n/a through 7.2.0.
CWE-200
Nov 30, 2023
CVE-2023-36899
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.70
ASP.NET - Privilege Escalation
ASP.NET Elevation of Privilege Vulnerability
CWE-20
Aug 08, 2023
CVE-2023-47253
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Qualitor < 8.20 - Command Injection
Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.
CWE-77
Nov 06, 2023
CVE-2023-41974
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.00
Apple Ipados < 17.0 - Use After Free
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, iOS 15.8.7 and iPadOS 15.8.7. An app may be able to execute arbitrary code with kernel privileges.
CWE-416
Jan 10, 2024
CVE-2023-6895
6.3
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Hikvision Intercom Broadcast System < 4.1.0 - OS Command Injection
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.
CWE-78
Dec 17, 2023
CVE-2023-32117
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.88
SoftLab Integrate Google Drive - Info Disclosure
Missing Authorization vulnerability in princeahmed Integrate Google Drive integrate-google-drive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integrate Google Drive: from n/a through <= 1.1.99.
CWE-862
Dec 09, 2024
CVE-2023-6360
8.6
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.88
WordPress My Calendar <3.4.22 - SQL Injection
The 'My Calendar' WordPress Plugin, version < 3.4.22 is affected by an unauthenticated SQL injection vulnerability in the 'from' and 'to' parameters in the '/my-calendar/v1/events' rest route.
CWE-89
Nov 30, 2023
CVE-2023-52076
8.5
HIGH
EXPLOITED
1 PoC
1 Writeup
Analysis
EPSS 0.11
Atril Document Viewer <1.26.2 - Path Traversal
Atril Document Viewer is the default document reader of the MATE desktop environment for Linux. A path traversal and arbitrary file write vulnerability exists in versions of Atril prior to 1.26.2. This vulnerability is capable of writing arbitrary files anywhere on the filesystem to which the user opening a crafted document has access. The only limitation is that this vulnerability cannot be exploited to overwrite existing files, but that doesn't stop an attacker from achieving Remote Command Execution on the target system. Version 1.26.2 of Atril contains a patch for this vulnerability.
CWE-22
Jan 25, 2024
CVE-2023-52251
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Kafka UI Unauthenticated Remote Command Execution via the Groovy Filter option.
An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.
CWE-94
Jan 25, 2024
CVE-2023-43654
10.0
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
TorchServe <0.8.1 - RCE
TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-918
Sep 28, 2023
CVE-2023-6329
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Control iD iDSecure Authentication Bypass (CVE-2023-6329)
An authentication bypass vulnerability exists in Control iD iDSecure v4.7.32.0. The login routine used by iDS-Core.dll contains a "passwordCustom" option that allows an unauthenticated attacker to compute valid credentials that can be used to bypass authentication and act as an administrative user.
CWE-287
Nov 27, 2023