Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2023-22952 8.8 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.93
SugarCRM unauthenticated Remote Code Execution (RCE)
In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation.
CWE-94 Jan 11, 2023
CVE-2023-24059 7.3 HIGH EXPLOITED 1 PoC Analysis EPSS 0.09
Grand Theft Auto V - RCE
Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.
CWE-94 Jan 22, 2023
CVE-2023-23488 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.84
Strangerstudios Paid Memberships Pro < 2.9.8 - SQL Injection
The Paid Memberships Pro WordPress Plugin, version < 2.9.8, is affected by an unauthenticated SQL injection vulnerability in the 'code' parameter of the '/pmpro/v1/order' REST route.
CWE-89 Jan 20, 2023
CVE-2023-2877 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.70
Formidable Forms <6.3.1 - RCE
The Formidable Forms WordPress plugin before 6.3.1 does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution.
Jun 27, 2023
CVE-2023-21674 8.8 HIGH KEV 1 PoC Analysis EPSS 0.10
Microsoft Windows ALPC - Elevation of Privilege
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CWE-416 Jan 10, 2023
CVE-2023-25157 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
Osgeo Geoserver < 2.18.7 - SQL Injection
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.
CWE-89 Feb 21, 2023
CVE-2023-25158 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis EPSS 0.04
Geotools < 24.7 - SQL Injection
GeoTools is an open source Java library that provides tools for geospatial data. GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastore. SQL Injection Vulnerabilities have been found when executing OGC Filters with JDBCDataStore implementations. Users are advised to upgrade to either version 27.4 or to 28.2 to resolve this issue. Users unable to upgrade may disable `encode functions` for PostGIS DataStores or enable `prepared statements` for JDBCDataStores as a partial mitigation.
CWE-89 Feb 21, 2023
CVE-2023-26609 7.2 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.37
ABUS TVIP - RCE
ABUS TVIP 20000-21150 devices allows remote attackers to execute arbitrary code via shell metacharacters in the /cgi-bin/mft/wireless_mft ap field.
Feb 27, 2023
CVE-2022-20775 7.8 HIGH KEV 1 PoC Analysis EPSS 0.00
Cisco SD-WAN Software - Privilege Escalation
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
CWE-22 Sep 30, 2022
CVE-2022-4982 HIGH EXPLOITED 1 PoC Analysis EPSS 0.00
DBLTek GoIP-1 <GHSFVT-1.1-67-5 - Local File Inclusion
DBLTek GoIP-1 firmware versions up to and including GHSFVT-1.1-67-5 contain a local file inclusion vulnerability. The device's web server exposes handlers (`frame.html` and `frame.A100.html`) that accept a path parameter (`content` or `sidebar`) which is not properly validated or canonicalized. An attacker can supply directory-traversal sequences to cause the server to read and return arbitrary filesystem files that the webserver user can access. Other GoIP models and firmware versions are likely affected. Exploitation evidence was observed by the Shadowserver Foundation on 2024-03-21 UTC.
CWE-22 Nov 12, 2025
CVE-2022-37932 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.70
HPE Officeconnect 1820 J9979a Firmware - Authentication Bypass
A potential security vulnerability has been identified in Hewlett Packard Enterprise OfficeConnect 1820, 1850, and 1920S Network switches. The vulnerability could be remotely exploited to allow authentication bypass. HPE has made the following software updates to resolve the vulnerability in Hewlett Packard Enterprise OfficeConnect 1820, 1850 and 1920S Network switches versions: Prior to PT.02.14; Prior to PC.01.22; Prior to PO.01.21; Prior to PD.02.22;
Dec 12, 2022
CVE-2022-0169 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.82
WordPress Photo Gallery Plugin SQL Injection (CVE-2022-0169)
The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection
CWE-89 Mar 14, 2022
CVE-2022-22956 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.84
Vmware Identity Manager < 9.0 - Authentication Bypass
VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.
CWE-287 Apr 13, 2022
CVE-2022-20705 10.0 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.80
Cisco Rv340 Firmware < 1.0.03.24 - Out-of-Bounds Write
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
CWE-121 Feb 10, 2022
CVE-2022-24481 7.8 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.28
Windows Common Log File System Driver - Privilege Escalation
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Apr 15, 2022
CVE-2022-40799 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.54
Dlink Dnr-322l Firmware < 2.60b15 - Download Without Integrity Check
Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
CWE-494 Nov 29, 2022
CVE-2022-38840 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.54
Güralp MAN-EAM-0003 3.2.4 - XXE
cgi-bin/xmlstatus.cgi in Güralp MAN-EAM-0003 3.2.4 is vulnerable to an XML External Entity (XXE) issue via XML file upload, which leads to local file disclosure.
CWE-611 Apr 16, 2023
CVE-2022-42045 6.7 MEDIUM EXPLOITED 1 PoC Analysis EPSS 0.01
Watchdog Anti-virus - Code Injection
Certain Zemana products are vulnerable to Arbitrary code injection. This affects Watchdog Anti-Malware 4.1.422 and Zemana AntiMalware 3.2.28.
CWE-94 Jul 13, 2023
CVE-2022-46604 8.8 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.40
Tecrail Responsive FileManager <9.9.5 - Code Injection
An issue in Tecrail Responsive FileManager v9.9.5 and below allows attackers to bypass the file extension check mechanism and upload a crafted PHP file, leading to arbitrary code execution.
CWE-434 Feb 02, 2023
CVE-2022-39290 8.0 HIGH EXPLOITED 1 PoC 1 Writeup Analysis EPSS 0.04
Zoneminder < 1.36.27 - Authentication Bypass
ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
CWE-287 Oct 07, 2022