Vulnerabilities Exploited in the Wild with Public PoC
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2023-36542
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.01
Apache NiFi <1.22.0 - Authenticated RCE
Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.
CWE-94
Jul 29, 2023
CVE-2023-30799
9.1
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.00
Mikrotik Routeros < 6.48.7 - Improper Privilege Management
MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
CWE-269
Jul 19, 2023
CVE-2023-37582
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache RocketMQ - Remote Command Execution
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1.
When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as.
It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.
CWE-94
Jul 12, 2023
CVE-2023-34598
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Gibbon - Path Traversal
Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response.
CWE-22
Jun 29, 2023
CVE-2023-35885
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
CloudPanel 2 <2.3.1 - Auth Bypass
CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
CWE-565
Jun 20, 2023
CVE-2023-35843
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Nocodb < 0.106.1 - Path Traversal
NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information.
CWE-22
Jun 19, 2023
CVE-2023-25690
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
EPSS 0.68
Apache HTTP Server < 2.4.55 - HTTP Request Smuggling
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.
Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
or ProxyPassMatch in which a non-specific pattern matches
some portion of the user-supplied request-target (URL) data and is then
re-inserted into the proxied request-target using variable
substitution. For example, something like:
RewriteEngine on
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ http://example.com:8080/
Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
CWE-444
Mar 07, 2023
CVE-2023-23333
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Contec Solarview Compact Firmware < 6.00 - Command Injection
There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.
CWE-77
Feb 06, 2023
CVE-2023-5222
6.3
MEDIUM
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.90
Viessmann Vitogate 300 <2.1.3.0 - Hard-Coded Password
A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259
Sep 27, 2023
CVE-2023-0656
7.5
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.31
Sonicwall Sonicos < 7.0.1-5111 - Out-of-Bounds Write
A Stack-based buffer overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash.
CWE-121
Mar 02, 2023
CVE-2023-38817
7.8
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.01
Inspect Element Ltd Echo.ac <5.2.1.0 - Privilege Escalation
An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
CWE-269
Oct 11, 2023
CVE-2023-2640
7.8
HIGH
EXPLOITED
14 PoCs
Analysis
NUCLEI
EPSS 0.91
GameOver(lay) Privilege Escalation and Container Escape
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
CWE-863
Jul 26, 2023
CVE-2023-4450
6.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Jeecg Jimureport < 1.6.1 - Injection
A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-237571.
CWE-74
Aug 21, 2023
CVE-2023-45249
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.93
Acronis Cyber Infrastructure <5.0.1-61, <5.1.1-71, <5.2.1-69, <5.3....
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
CWE-1393
Jul 24, 2024
CVE-2023-32784
7.5
HIGH
EXPLOITED
14 PoCs
Analysis
EPSS 0.76
Keepass < 2.54 - Cleartext Transmission
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
CWE-319
May 15, 2023
CVE-2023-38743
7.2
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.21
Zoho ManageEngine ADManager Plus <Build 7200 - Command Injection
Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine.
Sep 11, 2023
CVE-2023-2215
6.3
MEDIUM
EXPLOITED
1 PoC
Analysis
EPSS 0.04
Coffee Shop Pos System - SQL Injection
A vulnerability classified as critical has been found in Campcodes Coffee Shop POS System 1.0. Affected is an unknown function of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226980.
CWE-89
Apr 21, 2023
CVE-2023-27034
9.8
CRITICAL
EXPLOITED
1 PoC
NUCLEI
EPSS 0.90
PrestaShop jmsblog 2.5.5 - SQL Injection
PrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability.
CWE-89
Mar 23, 2023
CVE-2023-38646
9.8
CRITICAL
EXPLOITED
43 PoCs
Analysis
NUCLEI
EPSS 0.94
Metabase <0.46.6.1-1.46.6.1 - RCE
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
Jul 21, 2023
CVE-2023-36745
8.0
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.74
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502
Sep 12, 2023