Critical Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
4,118 results Clear all
CVE-2020-13927 9.8 CRITICAL KEV SSVC ACTIVE 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Airflow < 1.10.11 - Missing Authentication
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default
CWE-306 Nov 10, 2020
CVE-2020-4429 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.91
IBM Data Risk Manager - Hard-coded Credentials
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 contains a default password for an IDRM administrative account. A remote attacker could exploit this vulnerability to login and execute arbitrary code on the system with root privileges. IBM X-Force ID: 180534.
CWE-798 May 07, 2020
CVE-2020-4427 9.8 CRITICAL KEV SSVC ACTIVE 2 PoCs Analysis NUCLEI EPSS 0.93
IBM Data Risk Manager < 2.0.6.1 - Authentication Bypass
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532.
CWE-287 May 07, 2020
CVE-2020-11651 9.8 CRITICAL KEV SSVC ACTIVE 17 PoCs Analysis EPSS 0.94
SaltStack Salt <2019.2.4,3000.2 - RCE
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Apr 30, 2020
CVE-2020-1938 9.8 CRITICAL KEV SSVC ACTIVE 46 PoCs Analysis NUCLEI EPSS 0.94
Apache Geode < 7.0.100 - Remote Code Execution
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
Feb 24, 2020
CVE-2020-10567 9.8 CRITICAL 1 PoC Analysis EPSS 0.11
Responsive Filemanager <9.14.0 - Code Injection
An issue was discovered in Responsive Filemanager through 9.14.0. In the ajax_calls.php file in the save_img action in the name parameter, there is no validation of what kind of extension is sent. This makes it possible to execute PHP code if a legitimate JPEG image contains this code in the EXIF data, and the .php extension is used in the name parameter. (A potential fast patch is to disable the save_img action in the config file.)
CWE-20 Mar 14, 2020
CVE-2020-13768 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.01
Minishare < 1.4.2 - Out-of-Bounds Write
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CWE-787 Jun 04, 2020
CVE-2020-5902 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 65 PoCs Analysis NUCLEI EPSS 0.94
BIG-IP <15.2 - RCE
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
CWE-22 Jul 01, 2020
CVE-2020-1350 10.0 CRITICAL KEV SSVC ACTIVE 19 PoCs Analysis EPSS 0.94
Microsoft Windows Server 2008 - Improper Input Validation
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
CWE-20 Jul 14, 2020
CVE-2020-28347 9.8 CRITICAL 1 PoC 2 Writeups Analysis EPSS 0.83
Tp-link Ac1750 Firmware < 201029 - OS Command Injection
tdpServer on TP-Link Archer A7 AC1750 devices before 201029 allows remote attackers to execute arbitrary code via the slave_mac parameter. NOTE: this issue exists because of an incomplete fix for CVE-2020-10882 in which shell quotes are mishandled.
CWE-78 Nov 08, 2020
CVE-2020-6207 9.8 CRITICAL KEV SSVC ACTIVE 4 PoCs Analysis NUCLEI EPSS 0.94
SAP Solution Manager 7.2 - Auth Bypass
SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
CWE-306 Mar 10, 2020
CVE-2020-21152 9.8 CRITICAL SSVC PoC 1 PoC EPSS 0.00
Inxedu - SQL Injection
SQL Injection vulnerability in inxedu 2.0.6 allows attackers to execute arbitrary commands via the functionIds parameter to /saverolefunction.
CWE-89 Jan 20, 2023
CVE-2020-35326 9.8 CRITICAL SSVC PoC 1 PoC 1 Writeup EPSS 0.02
Inxedu - SQL Injection
SQL Injection vulnerability in file /inxedu/demo_inxedu_open/src/main/resources/mybatis/inxedu/website/WebsiteImagesMapper.xml in inxedu 2.0.6 via the id value.
CWE-89 Jan 18, 2023
CVE-2020-21786 9.8 CRITICAL 1 PoC EPSS 0.00
Ibos - Unrestricted File Upload
In IBOS 4.5.4 Open, Arbitrary File Inclusion causes getshell via /system/modules/dashboard/controllers/CronController.php.
CWE-434 Jun 24, 2021
CVE-2020-21787 9.8 CRITICAL 1 PoC EPSS 0.00
Crmeb - Unrestricted File Upload
CRMEB 3.1.0+ is vulnerable to File Upload Getshell via /crmeb/crmeb/services/UploadService.php.
CWE-434 Jun 24, 2021
CVE-2020-35430 9.8 CRITICAL 1 PoC EPSS 0.00
Inxedu - SQL Injection
SQL Injection in com/inxedu/OS/edu/controller/letter/AdminMsgSystemController in Inxedu v2.0.6 via the ids parameter to admin/letter/delsystem.
CWE-89 Apr 29, 2021
CVE-2020-18020 9.8 CRITICAL 1 PoC EPSS 0.10
PHPSHE Mall System <1.7 - SQL Injection
SQL Injection in PHPSHE Mall System v1.7 allows remote attackers to execute arbitrary code by injecting SQL commands into the "user_phone" parameter of a crafted HTTP request to the "admin.php" component.
CWE-89 Apr 28, 2021
CVE-2020-21377 9.8 CRITICAL 1 PoC EPSS 0.00
Yunyecms - SQL Injection
SQL injection vulnerability in yunyecms V2.0.1 via the selcart parameter.
CWE-89 Dec 21, 2020
CVE-2020-14645 9.8 CRITICAL 6 PoCs Analysis EPSS 0.92
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jul 15, 2020
CVE-2020-4450 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.72
IBM Websphere Application Server < 8.5.5.18 - Insecure Deserialization
IBM WebSphere Application Server 8.5 and 9.0 traditional could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects. IBM X-Force ID: 181231.
CWE-502 Jun 05, 2020