Vulnerabilities Exploited in the Wild with Public PoC
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2023-22952
8.8
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.93
SugarCRM unauthenticated Remote Code Execution (RCE)
In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation.
CWE-94
Jan 11, 2023
CVE-2023-24059
7.3
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.09
Grand Theft Auto V - RCE
Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.
CWE-94
Jan 22, 2023
CVE-2023-23488
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.84
Strangerstudios Paid Memberships Pro < 2.9.8 - SQL Injection
The Paid Memberships Pro WordPress Plugin, version < 2.9.8, is affected by an unauthenticated SQL injection vulnerability in the 'code' parameter of the '/pmpro/v1/order' REST route.
CWE-89
Jan 20, 2023
CVE-2023-2877
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.70
Formidable Forms <6.3.1 - RCE
The Formidable Forms WordPress plugin before 6.3.1 does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution.
Jun 27, 2023
CVE-2023-21674
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.10
Microsoft Windows ALPC - Elevation of Privilege
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CWE-416
Jan 10, 2023
CVE-2023-25157
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Osgeo Geoserver < 2.18.7 - SQL Injection
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.
CWE-89
Feb 21, 2023
CVE-2023-25158
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
Analysis
EPSS 0.04
Geotools < 24.7 - SQL Injection
GeoTools is an open source Java library that provides tools for geospatial data. GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastore. SQL Injection Vulnerabilities have been found when executing OGC Filters with JDBCDataStore implementations. Users are advised to upgrade to either version 27.4 or to 28.2 to resolve this issue. Users unable to upgrade may disable `encode functions` for PostGIS DataStores or enable `prepared statements` for JDBCDataStores as a partial mitigation.
CWE-89
Feb 21, 2023
CVE-2023-26609
7.2
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.37
ABUS TVIP - RCE
ABUS TVIP 20000-21150 devices allows remote attackers to execute arbitrary code via shell metacharacters in the /cgi-bin/mft/wireless_mft ap field.
Feb 27, 2023
CVE-2022-20775
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.00
Cisco SD-WAN Software - Privilege Escalation
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.
This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
CWE-22
Sep 30, 2022
CVE-2022-4982
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.00
DBLTek GoIP-1 <GHSFVT-1.1-67-5 - Local File Inclusion
DBLTek GoIP-1 firmware versions up to and including GHSFVT-1.1-67-5 contain a local file inclusion vulnerability. The device's web server exposes handlers (`frame.html` and `frame.A100.html`) that accept a path parameter (`content` or `sidebar`) which is not properly validated or canonicalized. An attacker can supply directory-traversal sequences to cause the server to read and return arbitrary filesystem files that the webserver user can access. Other GoIP models and firmware versions are likely affected. Exploitation evidence was observed by the Shadowserver Foundation on 2024-03-21 UTC.
CWE-22
Nov 12, 2025
CVE-2022-37932
8.8
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.70
HPE Officeconnect 1820 J9979a Firmware - Authentication Bypass
A potential security vulnerability has been identified in Hewlett Packard Enterprise OfficeConnect 1820, 1850, and 1920S Network switches. The vulnerability could be remotely exploited to allow authentication bypass. HPE has made the following software updates to resolve the vulnerability in Hewlett Packard Enterprise OfficeConnect 1820, 1850 and 1920S Network switches versions: Prior to PT.02.14; Prior to PC.01.22; Prior to PO.01.21; Prior to PD.02.22;
Dec 12, 2022
CVE-2022-0169
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.82
WordPress Photo Gallery Plugin SQL Injection (CVE-2022-0169)
The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection
CWE-89
Mar 14, 2022
CVE-2022-22956
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.84
Vmware Identity Manager < 9.0 - Authentication Bypass
VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.
CWE-287
Apr 13, 2022
CVE-2022-20705
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.80
Cisco Rv340 Firmware < 1.0.03.24 - Out-of-Bounds Write
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
CWE-121
Feb 10, 2022
CVE-2022-24481
7.8
HIGH
EXPLOITED
3 PoCs
Analysis
EPSS 0.28
Windows Common Log File System Driver - Privilege Escalation
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Apr 15, 2022
CVE-2022-40799
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.54
Dlink Dnr-322l Firmware < 2.60b15 - Download Without Integrity Check
Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
CWE-494
Nov 29, 2022
CVE-2022-38840
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.54
Güralp MAN-EAM-0003 3.2.4 - XXE
cgi-bin/xmlstatus.cgi in Güralp MAN-EAM-0003 3.2.4 is vulnerable to an XML External Entity (XXE) issue via XML file upload, which leads to local file disclosure.
CWE-611
Apr 16, 2023
CVE-2022-42045
6.7
MEDIUM
EXPLOITED
1 PoC
Analysis
EPSS 0.01
Watchdog Anti-virus - Code Injection
Certain Zemana products are vulnerable to Arbitrary code injection. This affects Watchdog Anti-Malware 4.1.422 and Zemana AntiMalware 3.2.28.
CWE-94
Jul 13, 2023
CVE-2022-46604
8.8
HIGH
EXPLOITED
3 PoCs
Analysis
EPSS 0.40
Tecrail Responsive FileManager <9.9.5 - Code Injection
An issue in Tecrail Responsive FileManager v9.9.5 and below allows attackers to bypass the file extension check mechanism and upload a crafted PHP file, leading to arbitrary code execution.
CWE-434
Feb 02, 2023
CVE-2022-39290
8.0
HIGH
EXPLOITED
1 PoC
1 Writeup
Analysis
EPSS 0.04
Zoneminder < 1.36.27 - Authentication Bypass
ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
CWE-287
Oct 07, 2022