Vulnerabilities Exploited in the Wild with Public PoC
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2023-35078
9.8
CRITICAL
KEV
RANSOMWARE
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Endpoint Manager Mobile < 11.8.1.1 - Authentication Bypass
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
CWE-287
Jul 25, 2023
CVE-2023-3519
9.8
CRITICAL
KEV
RANSOMWARE
17 PoCs
Analysis
NUCLEI
EPSS 0.94
Unspecified Product <Version> - RCE
Unauthenticated remote code execution
CWE-94
Jul 19, 2023
CVE-2023-28121
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Automattic Woocommerce Payments < 4.8.2 - Authentication Bypass
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
CWE-287
Apr 12, 2023
CVE-2023-26256
7.5
HIGH
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.92
STAGIL Navigation for Jira <2.0.52 - Path Traversal
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.
CWE-22
Feb 28, 2023
CVE-2023-26255
7.5
HIGH
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
STAGIL Navigation for Jira <2.0.52 - Path Traversal
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.
CWE-22
Feb 28, 2023
CVE-2023-36884
7.5
HIGH
KEV
RANSOMWARE
9 PoCs
Analysis
EPSS 0.93
Windows Search - RCE
Windows Search Remote Code Execution Vulnerability
CWE-362
Jul 11, 2023
CVE-2023-36874
7.8
HIGH
KEV
7 PoCs
Analysis
EPSS 0.71
Windows Error Reporting Service - Privilege Escalation
Windows Error Reporting Service Elevation of Privilege Vulnerability
CWE-59
Jul 11, 2023
CVE-2023-3460
9.8
CRITICAL
EXPLOITED
12 PoCs
Analysis
NUCLEI
EPSS 0.93
Ultimate Member <2.6.7 - Privilege Escalation
The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.
Jul 04, 2023
CVE-2023-32434
7.8
HIGH
KEV
3 PoCs
Analysis
EPSS 0.58
Apple Ipados < 15.7.7 - Integer Overflow
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.5.2, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Monterey 12.6.7, watchOS 8.8.1, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
CWE-190
Jun 23, 2023
CVE-2023-2986
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
Tychesoftwares Abandoned Cart Lite Fo... - Authentication Bypass
The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.14.2. This is due to insufficient encryption on the user being supplied during the abandoned cart link decode through the plugin. This allows unauthenticated attackers to log in as users who have abandoned the cart, who are typically customers. Further security hardening was introduced in version 5.15.1 that ensures sites are no longer vulnerable through historical check-out links, and additional hardening was introduced in version 5.15.2 that ensured null key values wouldn't permit the authentication bypass.
CWE-288
Jun 08, 2023
CVE-2023-20887
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
VMWare Aria Operations for Networks (vRealize Network Insight) pre-authenticated RCE
Aria Operations for Networks contains a command injection vulnerability. A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in remote code execution.
CWE-77
Jun 07, 2023
CVE-2023-27997
9.8
CRITICAL
KEV
RANSOMWARE
11 PoCs
Analysis
EPSS 0.91
Fortinet Fortiproxy < 1.1.6 - Out-of-Bounds Write
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
CWE-122
Jun 13, 2023
CVE-2023-3124
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.27
Elementor Pro <3.11.6 - Privilege Escalation
The Elementor Pro plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_page_option function in versions up to, and including, 3.11.6. This makes it possible for authenticated attackers with subscriber-level capabilities to update arbitrary site options, which can lead to privilege escalation.
CWE-862
Jun 07, 2023
CVE-2023-3079
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.02
Google Chrome <114.0.5735.110 - Heap Corruption
Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843
Jun 05, 2023
CVE-2023-34362
9.8
CRITICAL
KEV
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
MOVEit SQL Injection vulnerability
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.
CWE-89
Jun 02, 2023
CVE-2023-28771
9.8
CRITICAL
KEV
7 PoCs
Analysis
EPSS 0.94
Zyxel ZyWALL/USG <4.73 - RCE
Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35, and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.
CWE-78
Apr 25, 2023
CVE-2023-32243
9.8
CRITICAL
EXPLOITED
11 PoCs
Analysis
NUCLEI
EPSS 0.94
Wpdeveloper Essential Addons For Elementor - Authentication Bypass
Improper Authentication vulnerability in WPDeveloper Essential Addons for Elementor allows Privilege Escalation. This issue affects Essential Addons for Elementor: from 5.4.0 through 5.7.1.
CWE-287
May 12, 2023
CVE-2023-2868
9.4
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.91
Barracuda Email Security Gateway <9.2.0.006 - Command Injection
A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.
CWE-20
May 24, 2023
CVE-2023-30777
7.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.83
Advancedcustomfields Advanced Custom Fields < 6.1.6 - XSS
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WP Engine Advanced Custom Fields Pro, WP Engine Advanced Custom Fields plugins <= 6.1.5 versions.
CWE-79
May 10, 2023
CVE-2023-24932
6.7
MEDIUM
EXPLOITED
3 PoCs
Analysis
EPSS 0.01
Secure Boot - Privilege Escalation
Secure Boot Security Feature Bypass Vulnerability
CWE-863
May 09, 2023