Vulnerabilities Exploited in the Wild with Public PoC

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2023-35078 9.8 CRITICAL KEV RANSOMWARE 7 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Endpoint Manager Mobile < 11.8.1.1 - Authentication Bypass
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
CWE-287 Jul 25, 2023
CVE-2023-3519 9.8 CRITICAL KEV RANSOMWARE 17 PoCs Analysis NUCLEI EPSS 0.94
Unspecified Product <Version> - RCE
Unauthenticated remote code execution
CWE-94 Jul 19, 2023
CVE-2023-28121 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
Automattic Woocommerce Payments < 4.8.2 - Authentication Bypass
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
CWE-287 Apr 12, 2023
CVE-2023-26256 7.5 HIGH EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.92
STAGIL Navigation for Jira <2.0.52 - Path Traversal
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.
CWE-22 Feb 28, 2023
CVE-2023-26255 7.5 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
STAGIL Navigation for Jira <2.0.52 - Path Traversal
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.
CWE-22 Feb 28, 2023
CVE-2023-36884 7.5 HIGH KEV RANSOMWARE 9 PoCs Analysis EPSS 0.93
Windows Search - RCE
Windows Search Remote Code Execution Vulnerability
CWE-362 Jul 11, 2023
CVE-2023-36874 7.8 HIGH KEV 7 PoCs Analysis EPSS 0.71
Windows Error Reporting Service - Privilege Escalation
Windows Error Reporting Service Elevation of Privilege Vulnerability
CWE-59 Jul 11, 2023
CVE-2023-3460 9.8 CRITICAL EXPLOITED 12 PoCs Analysis NUCLEI EPSS 0.93
Ultimate Member <2.6.7 - Privilege Escalation
The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.
Jul 04, 2023
CVE-2023-32434 7.8 HIGH KEV 3 PoCs Analysis EPSS 0.58
Apple Ipados < 15.7.7 - Integer Overflow
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.5.2, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Monterey 12.6.7, watchOS 8.8.1, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
CWE-190 Jun 23, 2023
CVE-2023-2986 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.91
Tychesoftwares Abandoned Cart Lite Fo... - Authentication Bypass
The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.14.2. This is due to insufficient encryption on the user being supplied during the abandoned cart link decode through the plugin. This allows unauthenticated attackers to log in as users who have abandoned the cart, who are typically customers. Further security hardening was introduced in version 5.15.1 that ensures sites are no longer vulnerable through historical check-out links, and additional hardening was introduced in version 5.15.2 that ensured null key values wouldn't permit the authentication bypass.
CWE-288 Jun 08, 2023
CVE-2023-20887 9.8 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.94
VMWare Aria Operations for Networks (vRealize Network Insight) pre-authenticated RCE
Aria Operations for Networks contains a command injection vulnerability. A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in remote code execution.
CWE-77 Jun 07, 2023
CVE-2023-27997 9.8 CRITICAL KEV RANSOMWARE 11 PoCs Analysis EPSS 0.91
Fortinet Fortiproxy < 1.1.6 - Out-of-Bounds Write
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
CWE-122 Jun 13, 2023
CVE-2023-3124 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.27
Elementor Pro <3.11.6 - Privilege Escalation
The Elementor Pro plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_page_option function in versions up to, and including, 3.11.6. This makes it possible for authenticated attackers with subscriber-level capabilities to update arbitrary site options, which can lead to privilege escalation.
CWE-862 Jun 07, 2023
CVE-2023-3079 8.8 HIGH KEV 1 PoC Analysis EPSS 0.02
Google Chrome <114.0.5735.110 - Heap Corruption
Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Jun 05, 2023
CVE-2023-34362 9.8 CRITICAL KEV RANSOMWARE 15 PoCs Analysis NUCLEI EPSS 0.94
MOVEit SQL Injection vulnerability
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.
CWE-89 Jun 02, 2023
CVE-2023-28771 9.8 CRITICAL KEV 7 PoCs Analysis EPSS 0.94
Zyxel ZyWALL/USG <4.73 - RCE
Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35, and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.
CWE-78 Apr 25, 2023
CVE-2023-32243 9.8 CRITICAL EXPLOITED 11 PoCs Analysis NUCLEI EPSS 0.94
Wpdeveloper Essential Addons For Elementor - Authentication Bypass
Improper Authentication vulnerability in WPDeveloper Essential Addons for Elementor allows Privilege Escalation. This issue affects Essential Addons for Elementor: from 5.4.0 through 5.7.1.
CWE-287 May 12, 2023
CVE-2023-2868 9.4 CRITICAL KEV 3 PoCs Analysis EPSS 0.91
Barracuda Email Security Gateway <9.2.0.006 - Command Injection
A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.
CWE-20 May 24, 2023
CVE-2023-30777 7.1 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.83
Advancedcustomfields Advanced Custom Fields < 6.1.6 - XSS
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WP Engine Advanced Custom Fields Pro, WP Engine Advanced Custom Fields plugins <= 6.1.5 versions.
CWE-79 May 10, 2023
CVE-2023-24932 6.7 MEDIUM EXPLOITED 3 PoCs Analysis EPSS 0.01
Secure Boot - Privilege Escalation
Secure Boot Security Feature Bypass Vulnerability
CWE-863 May 09, 2023