Vulnerabilities Exploited in the Wild with Public PoC
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2023-29324
6.5
MEDIUM
EXPLOITED
1 PoC
Analysis
EPSS 0.02
Windows MSHTML < - Privilege Escalation
Windows MSHTML Platform Security Feature Bypass Vulnerability
CWE-73
May 09, 2023
CVE-2023-6700
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.30
Cookieinformation Wp-gdpr-compliance < 2.0.22 - Missing Authorization
The Cookie Information | Free GDPR Consent Solution plugin for WordPress is vulnerable to arbitrary option updates due to a missing capability check on its AJAX request handler in versions up to, and including, 2.0.22. This makes it possible for authenticated attackers, with subscriber-level access or higher, to edit arbitrary site options which can be used to create administrator accounts.
CWE-862
Feb 05, 2024
CVE-2023-6933
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Wpengine Better Search Replace < 1.4.5 - Insecure Deserialization
The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502
Feb 05, 2024
CVE-2023-22527
9.8
CRITICAL
KEV
RANSOMWARE
27 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Confluence SSTI Injection
A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.
Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
CWE-74
Jan 16, 2024
CVE-2023-2796
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.72
Eventon < 2.1.2 - Missing Authorization
The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.
CWE-862
Jul 10, 2023
CVE-2023-35813
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Sitecore Experience Commerce < 10.3 - Code Injection
Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3.
CWE-94
Jun 17, 2023
CVE-2023-27587
7.4
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.87
Readtomyshoe < 2023-03-13 - Error Information Exposure
ReadtoMyShoe, a web app that lets users upload articles and listen to them later, generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, then it will include the full URL of the request. The request URL contains the Google Cloud API key. This has been patched in commit 8533b01. Upgrading should be accompanied by deleting the current GCP API key and issuing a new one. There are no known workarounds.
CWE-209
Mar 13, 2023
CVE-2023-0297
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.93
pyLoad js2py Python Execution
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
CWE-94
Jan 14, 2023
CVE-2023-30258
9.8
CRITICAL
EXPLOITED
14 PoCs
Analysis
NUCLEI
EPSS 0.93
Magnussolution Magnusbilling < 7.3.0 - Command Injection
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
CWE-78
Jun 23, 2023
CVE-2023-35082
9.8
CRITICAL
KEV
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.94
Ivanti Endpoint Manager Mobile < 11.11.0 - Authentication Bypass
An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier.
CWE-287
Aug 15, 2023
CVE-2023-6548
5.5
MEDIUM
KEV
1 PoC
EPSS 0.08
NetScaler ADC & NetScaler Gateway - Code Injection
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
CWE-94
Jan 17, 2024
CVE-2023-51409
10.0
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.93
Meowapps AI Engine < 1.9.99 - Unrestricted File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot.This issue affects AI Engine: ChatGPT Chatbot: from n/a through 1.9.98.
CWE-434
Apr 12, 2024
CVE-2023-46805
8.2
HIGH
KEV
RANSOMWARE
13 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Connect Secure Unauthenticated Remote Code Execution
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
CWE-287
Jan 12, 2024
CVE-2023-6875
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Wordpress POST SMTP Account Takeover
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover. CVE-2023-52233 appears to be a duplicate of this issue.
CWE-639
Jan 11, 2024
CVE-2023-6000
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.69
Sygnoos Popup Builder < 4.2.3 - XSS
The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks.
CWE-79
Jan 01, 2024
CVE-2023-29357
9.8
CRITICAL
KEV
RANSOMWARE
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Sharepoint Dynamic Proxy Generator Unauth RCE
Microsoft SharePoint Server Elevation of Privilege Vulnerability
CWE-303
Jun 14, 2023
CVE-2023-29300
9.8
CRITICAL
KEV
RANSOMWARE
1 PoC
NUCLEI
EPSS 0.94
Adobe ColdFusion <2018u16, <2021u6, <2023.0.0.330468 - Code Injection
Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
CWE-502
Jul 12, 2023
CVE-2023-27524
8.9
HIGH
KEV
20 PoCs
Analysis
NUCLEI
EPSS 0.84
Apache Superset Signed Cookie Priv Esc
Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.
All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database.
Add a strong SECRET_KEY to your `superset_config.py` file like:
SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY>
Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.
CWE-1188
Apr 24, 2023
CVE-2023-23752
5.3
MEDIUM
KEV
57 PoCs
Analysis
NUCLEI
EPSS 0.95
Joomla! < 4.2.8 - Improper Access Control
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
CWE-284
Feb 16, 2023
CVE-2023-6634
8.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
LearnPress <4.2.5.7 - Command Injection
The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
CWE-77
Jan 11, 2024