Vulnerabilities Exploited in the Wild with Public PoC

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
2,390 results Clear all
CVE-2023-48084 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.82
Nagios XI < 5.11.3 - SQL Injection
Nagios XI before version 5.11.3 was discovered to contain a SQL injection vulnerability via the bulk modification tool.
CWE-89 Dec 14, 2023
CVE-2023-4490 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.41
Wpjobportal WP Job Portal < 2.0.6 - SQL Injection
The WP Job Portal WordPress plugin before 2.0.6 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users
Sep 25, 2023
CVE-2023-45878 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
GibbonEdu Gibbon <25.0.1 - Arbitrary File Write
GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write because rubrics_visualise_saveAjax.phps does not require authentication. The endpoint accepts the img, path, and gibbonPersonID parameters. The img parameter is expected to be a base64 encoded image. If the path parameter is set, the defined path is used as the destination folder, concatenated with the absolute path of the installation directory. The content of the img parameter is base64 decoded and written to the defined file path. This allows creation of PHP files that permit Remote Code Execution (unauthenticated).
CWE-787 Nov 14, 2023
CVE-2023-36144 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Intelbras Switch SG 2404 MR - Auth Bypass
An authentication bypass in Intelbras Switch SG 2404 MR in firmware 1.00.54 allows an unauthenticated attacker to download the backup file of the device, exposing critical information about the device configuration.
CWE-862 Jun 30, 2023
CVE-2023-47248 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Apache Pyarrow < 14.0.0 - Insecure Deserialization
Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings. It is recommended that users of PyArrow upgrade to 14.0.1. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to PyArrow 14.0.1 or later. PyPI packages are already available, and we hope that conda-forge packages will be available soon. If it is not possible to upgrade, we provide a separate package `pyarrow-hotfix` that disables the vulnerability on older PyArrow versions. See https://pypi.org/project/pyarrow-hotfix/ for instructions.
CWE-502 Nov 09, 2023
CVE-2023-28218 7.0 HIGH EXPLOITED 1 PoC Analysis EPSS 0.30
Microsoft Windows 10 1507 < 10.0.10240.19869 - Heap Buffer Overflow
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CWE-122 Apr 11, 2023
CVE-2023-48795 5.9 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.59
OpenSSH <9.6 - Open Redirect
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CWE-354 Dec 18, 2023
CVE-2023-31059 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Repetier Server <1.4.10 - Path Traversal
Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
CWE-22 Apr 24, 2023
CVE-2023-31446 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Cassia Gateway firmware - Code Injection
In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
CWE-77 Jan 10, 2024
CVE-2023-3269 7.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.00
Linux Kernel < 6.1.37 - Use After Free
A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
CWE-416 Jul 11, 2023
CVE-2023-32233 7.8 HIGH EXPLOITED 5 PoCs Analysis EPSS 0.01
Linux Kernel < 4.14.315 - Use After Free
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
CWE-416 May 08, 2023
CVE-2023-22809 7.8 HIGH EXPLOITED 19 PoCs Analysis EPSS 0.49
Sudoedit Extra Arguments Priv Esc
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
CWE-269 Jan 18, 2023
CVE-2023-4220 8.1 HIGH EXPLOITED 32 PoCs Analysis NUCLEI EPSS 0.93
Chamilo v1.11.24 Unrestricted File Upload PHP Webshell
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
CWE-434 Nov 28, 2023
CVE-2023-28769 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.70
Zyxel DX5401-B0 - Buffer Overflow
The buffer overflow vulnerability in the library “libclinkc.so” of the web server “zhttpd” in Zyxel DX5401-B0 firmware versions prior to V5.17(ABYO.1)C0 could allow a remote unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device.
CWE-120 Apr 27, 2023
CVE-2023-47218 5.8 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Qnap Qts < 5.1.5.2645 - Command Injection
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later
CWE-78 Feb 13, 2024
CVE-2023-50386 8.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.85
Apache Solr Backup/Restore APIs RCE
Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. In the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API. When backing up Solr Collections, these configSet files would be saved to disk when using the LocalFileSystemRepository (the default for backups). If the backup was saved to a directory that Solr uses in its ClassPath/ClassLoaders, then the jar and class files would be available to use with any ConfigSet, trusted or untrusted. When Solr is run in a secure way (Authorization enabled), as is strongly suggested, this vulnerability is limited to extending the Backup permissions with the ability to add libraries. Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue. In these versions, the following protections have been added: * Users are no longer able to upload files to a configSet that could be executed via a Java ClassLoader. * The Backup API restricts saving backups to directories that are used in the ClassLoader.
CWE-434 Feb 09, 2024
CVE-2023-4542 6.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
D-Link DAR-8000-10 <20230809 - Code Injection
A vulnerability was found in D-Link DAR-8000-10 up to 20230809. It has been classified as critical. This affects an unknown part of the file /app/sys1.php. The manipulation of the argument cmd with the input id leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238047. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-78 Aug 25, 2023
CVE-2023-26469 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.93
Jorani 1.0.0 - Path Traversal
In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
CWE-22 Aug 17, 2023
CVE-2023-4166 5.5 MEDIUM EXPLOITED 2 PoCs Analysis EPSS 0.88
Tongda2000 Tongda Office Anywhere - SQL Injection
A vulnerability has been found in Tongda OA and classified as critical. This vulnerability affects unknown code of the file general/system/seal_manage/dianju/delete_log.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-236182 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-89 Aug 05, 2023
CVE-2023-34960 9.8 CRITICAL EXPLOITED 12 PoCs Analysis NUCLEI EPSS 0.94
Chamilo unauthenticated command injection in PowerPoint upload
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
CWE-77 Aug 01, 2023