Vulnerabilities Exploited in the Wild with Public PoC

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
2,390 results Clear all
CVE-2023-36542 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.01
Apache NiFi <1.22.0 - Authenticated RCE
Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.
CWE-94 Jul 29, 2023
CVE-2023-30799 9.1 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.00
Mikrotik Routeros < 6.48.7 - Improper Privilege Management
MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
CWE-269 Jul 19, 2023
CVE-2023-37582 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Apache RocketMQ - Remote Command Execution
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.
CWE-94 Jul 12, 2023
CVE-2023-34598 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Gibbon - Path Traversal
Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response.
CWE-22 Jun 29, 2023
CVE-2023-35885 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
CloudPanel 2 <2.3.1 - Auth Bypass
CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
CWE-565 Jun 20, 2023
CVE-2023-35843 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Nocodb < 0.106.1 - Path Traversal
NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information.
CWE-22 Jun 19, 2023
CVE-2023-25690 9.8 CRITICAL EXPLOITED 5 PoCs Analysis EPSS 0.68
Apache HTTP Server < 2.4.55 - HTTP Request Smuggling
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
CWE-444 Mar 07, 2023
CVE-2023-23333 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.94
Contec Solarview Compact Firmware < 6.00 - Command Injection
There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.
CWE-77 Feb 06, 2023
CVE-2023-5222 6.3 MEDIUM EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.90
Viessmann Vitogate 300 <2.1.3.0 - Hard-Coded Password
A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Sep 27, 2023
CVE-2023-0656 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.31
Sonicwall Sonicos < 7.0.1-5111 - Out-of-Bounds Write
A Stack-based buffer overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash.
CWE-121 Mar 02, 2023
CVE-2023-38817 7.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.01
Inspect Element Ltd Echo.ac <5.2.1.0 - Privilege Escalation
An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
CWE-269 Oct 11, 2023
CVE-2023-2640 7.8 HIGH EXPLOITED 14 PoCs Analysis NUCLEI EPSS 0.91
GameOver(lay) Privilege Escalation and Container Escape
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
CWE-863 Jul 26, 2023
CVE-2023-4450 6.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Jeecg Jimureport < 1.6.1 - Injection
A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-237571.
CWE-74 Aug 21, 2023
CVE-2023-45249 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.93
Acronis Cyber Infrastructure <5.0.1-61, <5.1.1-71, <5.2.1-69, <5.3....
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
CWE-1393 Jul 24, 2024
CVE-2023-32784 7.5 HIGH EXPLOITED 14 PoCs Analysis EPSS 0.76
Keepass < 2.54 - Cleartext Transmission
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
CWE-319 May 15, 2023
CVE-2023-38743 7.2 HIGH EXPLOITED 1 PoC Analysis EPSS 0.21
Zoho ManageEngine ADManager Plus <Build 7200 - Command Injection
Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine.
Sep 11, 2023
CVE-2023-2215 6.3 MEDIUM EXPLOITED 1 PoC Analysis EPSS 0.04
Coffee Shop Pos System - SQL Injection
A vulnerability classified as critical has been found in Campcodes Coffee Shop POS System 1.0. Affected is an unknown function of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226980.
CWE-89 Apr 21, 2023
CVE-2023-27034 9.8 CRITICAL EXPLOITED 1 PoC NUCLEI EPSS 0.90
PrestaShop jmsblog 2.5.5 - SQL Injection
PrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability.
CWE-89 Mar 23, 2023
CVE-2023-38646 9.8 CRITICAL EXPLOITED 43 PoCs Analysis NUCLEI EPSS 0.94
Metabase <0.46.6.1-1.46.6.1 - RCE
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
Jul 21, 2023
CVE-2023-36745 8.0 HIGH EXPLOITED 1 PoC Analysis EPSS 0.74
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502 Sep 12, 2023