Vulnerabilities Exploited in the Wild with Public PoC
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2023-41992
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.01
Apple Ipados < 16.7 - Improper Condition Check
The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, macOS Ventura 13.6. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
CWE-754
Sep 21, 2023
CVE-2023-41991
5.5
MEDIUM
KEV
3 PoCs
Analysis
EPSS 0.03
Apple Ipados < 16.7 - Improper Certificate Validation
A certificate validation issue was addressed. This issue is fixed in macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7. A malicious app may be able to bypass signature validation. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
CWE-295
Sep 21, 2023
CVE-2023-28434
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.52
Minio <RELEASE.2023-03-20T20-16-18Z - Auth Bypass
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
CWE-269
Mar 22, 2023
CVE-2023-21746
7.8
HIGH
EXPLOITED
4 PoCs
Analysis
EPSS 0.54
Windows NTLM - Privilege Escalation
Windows NTLM Elevation of Privilege Vulnerability
Jan 10, 2023
CVE-2023-4863
8.8
HIGH
KEV
11 PoCs
Analysis
EPSS 0.94
Google Chrome <116.0.5845.187 - Buffer Overflow
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
CWE-787
Sep 12, 2023
CVE-2023-35674
7.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.00
Google Android - Improper Privilege Management
In onCreate of WindowState.java, there is a possible way to launch a background activity due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-269
Sep 11, 2023
CVE-2023-36802
7.8
HIGH
KEV
5 PoCs
Analysis
EPSS 0.75
Microsoft Streaming Service Proxy - Privilege Escalation
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
CWE-416
Sep 12, 2023
CVE-2023-41064
7.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.86
iOS <16.6.1- Ventura <13.5.2 - Buffer Overflow
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-120
Sep 07, 2023
CVE-2023-33246
9.8
CRITICAL
KEV
16 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache RocketMQ update config RCE
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.
Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.
To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
CWE-94
May 24, 2023
CVE-2023-4596
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.91
Forminator <1.24.6 - File Upload
The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Aug 30, 2023
CVE-2023-38831
7.8
HIGH
KEV
RANSOMWARE
61 PoCs
Analysis
EPSS 0.94
WinRAR CVE-2023-38831 Exploit
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
CWE-345
Aug 23, 2023
CVE-2023-32315
8.6
HIGH
KEV
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
Openfire authentication bypass with RCE plugin
Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isn’t available for a specific release, or isn’t quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice.
CWE-22
May 26, 2023
CVE-2023-38389
9.8
CRITICAL
EXPLOITED
1 PoC
EPSS 0.12
Artbees JupiterX Core <3.3.8 - Privilege Escalation
Incorrect Authorization vulnerability in Artbees JupiterX Core allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JupiterX Core: from n/a through 3.3.8.
CWE-863
Jun 21, 2024
CVE-2023-38035
9.8
CRITICAL
KEV
RANSOMWARE
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Sentry MICSLogService Auth Bypass resulting in RCE (CVE-2023-38035)
A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.
CWE-863
Aug 21, 2023
CVE-2023-27532
7.5
HIGH
KEV
RANSOMWARE
4 PoCs
Analysis
EPSS 0.84
Veeam Backup & Replication < 11.0.1.1261 - Missing Authentication
Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts.
CWE-306
Mar 10, 2023
CVE-2023-3722
8.6
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.55
Avaya Aura Device Services < 8.1.4.0 - Unrestricted File Upload
An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier.
CWE-434
Jul 19, 2023
CVE-2023-24489
9.8
CRITICAL
KEV
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
ShareFile - RCE
A vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller.
CWE-284
Jul 10, 2023
CVE-2023-39910
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
EPSS 0.00
Libbitcoin Explorer <3.6.0 - Info Disclosure
The cryptocurrency wallet entropy seeding mechanism used in Libbitcoin Explorer 3.0.0 through 3.6.0 is weak, aka the Milk Sad issue. The use of an mt19937 Mersenne Twister PRNG restricts the internal entropy to 32 bits regardless of settings. This allows remote attackers to recover any wallet private keys generated from "bx seed" entropy output and steal funds. (Affected users need to move funds to a secure new cryptocurrency wallet.) NOTE: the vendor's position is that there was sufficient documentation advising against "bx seed" but others disagree. NOTE: this was exploited in the wild in June and July 2023.
CWE-338
Aug 09, 2023
CVE-2023-34478
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.00
Apache Shiro < 1.12.0 - Path Traversal
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.
Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
CWE-22
Jul 24, 2023
CVE-2023-38408
9.8
CRITICAL
EXPLOITED
11 PoCs
Analysis
EPSS 0.64
OpenSSH <9.3p2 - RCE
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CWE-428
Jul 20, 2023