Critical Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,109 results Clear all
CVE-2020-17530 9.8 CRITICAL KEV SSVC ACTIVE 14 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts 2 Forced Multi OGNL Evaluation
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
CWE-917 Dec 11, 2020
CVE-2020-24719 9.8 CRITICAL 1 PoC Analysis EPSS 0.63
Couchbase Server < 6.6.0 - OS Command Injection
Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.
CWE-78 Nov 12, 2020
CVE-2020-25213 10.0 CRITICAL KEV SSVC ACTIVE 11 PoCs Analysis NUCLEI EPSS 0.94
WordPress File Manager Unauthenticated Remote Code Execution
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
CWE-434 Sep 09, 2020
CVE-2020-17496 9.8 CRITICAL KEV SSVC ACTIVE 3 PoCs Analysis NUCLEI EPSS 0.94
vBulletin <5.6.2 - RCE
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
CWE-74 Aug 12, 2020
CVE-2020-13381 9.8 CRITICAL 1 PoC Analysis EPSS 0.36
openSIS <7.4 - SQL Injection
openSIS through 7.4 allows SQL Injection.
CWE-89 Jul 01, 2020
CVE-2020-12800 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Wordpress Drag and Drop Multi File Uploader RCE
The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
CWE-434 Jun 08, 2020
CVE-2020-8794 9.8 CRITICAL 3 PoCs Analysis EPSS 0.88
OpenSMTPD OOB Read Local Privilege Escalation
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
CWE-125 Feb 25, 2020
CVE-2020-9015 9.8 CRITICAL 1 PoC Analysis EPSS 0.78
Arista restricted shell escape (with privesc)
Arista DCS-7050QX-32S-R 4.20.9M, DCS-7050CX3-32S-R 4.20.11M, and DCS-7280SRAM-48C6-R 4.22.0.1F devices (and possibly other products) allow attackers to bypass intended TACACS+ shell restrictions via a | character. NOTE: the vendor reports that this is a configuration issue relating to an overly permissive regular expression in the TACACS+ server permitted commands
Feb 20, 2020
CVE-2020-8518 9.8 CRITICAL 2 PoCs Analysis EPSS 0.85
Horde Groupware Webmail Edition <5.2.22 - Code Injection
Horde Groupware Webmail Edition 5.2.22 allows injection of arbitrary PHP code via CSV data, leading to remote code execution.
CWE-94 Feb 17, 2020
CVE-2020-8644 9.8 CRITICAL KEV SSVC ACTIVE 3 PoCs Analysis NUCLEI EPSS 0.94
PlaySMS <1.4.3 - XSS
PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
CWE-94 Feb 05, 2020
CVE-2020-7200 9.8 CRITICAL 2 PoCs Analysis EPSS 0.86
HP Systems Insight Manager - Remote Code Execution
A potential security vulnerability has been identified in HPE Systems Insight Manager (SIM) version 7.6. The vulnerability could be exploited to allow remote code execution.
Dec 18, 2020
CVE-2020-17132 9.1 CRITICAL 1 PoC Analysis EPSS 0.83
Microsoft Exchange - RCE
Microsoft Exchange Remote Code Execution Vulnerability
Dec 10, 2020
CVE-2020-27955 9.8 CRITICAL 20 PoCs Analysis EPSS 0.94
Git Remote Code Execution via git-lfs (CVE-2020-27955)
Git LFS 2.12.0 allows Remote Code Execution.
CWE-427 Nov 05, 2020
CVE-2020-7361 9.6 CRITICAL 1 PoC Analysis EPSS 0.36
Easycorp Zentao Pro < 8.8.2 - OS Command Injection
The EasyCorp ZenTao Pro application suffers from an OS command injection vulnerability in its '/pro/repo-create.html' component. After authenticating to the ZenTao dashboard, attackers may construct and send arbitrary OS commands via the POST parameter 'path', and those commands will run in an elevated SYSTEM context on the underlying Windows operating system.
CWE-78 Aug 06, 2020
CVE-2020-7356 10.0 CRITICAL 1 PoC Analysis EPSS 0.62
Cayintech Xpost - SQL Injection
CAYIN xPost suffers from an unauthenticated SQL Injection vulnerability. Input passed via the GET parameter 'wayfinder_seqid' in wayfinder_meeting_input.jsp is not properly sanitized before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands.
CWE-89 Aug 06, 2020
CVE-2020-13166 9.8 CRITICAL 2 PoCs Analysis EPSS 0.77
MyLittleAdmin 3.8 - RCE
The management tool in MyLittleAdmin 3.8 allows remote attackers to execute arbitrary code because machineKey is hardcoded (the same for all customers' installations) in web.config, and can be used to send serialized ASP code.
CWE-798 May 19, 2020
CVE-2020-10915 9.8 CRITICAL 2 PoCs Analysis EPSS 0.84
VEEAM One Agent 9.5.4.4587 - Deserialization
This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HandshakeResult method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10401.
CWE-502 Apr 22, 2020
CVE-2020-10189 9.8 CRITICAL KEV SSVC ACTIVE 3 PoCs Analysis NUCLEI EPSS 0.94
Zohocorp Manageengine Desktop Central - Insecure Deserialization
Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.
CWE-502 Mar 06, 2020
CVE-2020-8012 9.8 CRITICAL 3 PoCs Analysis EPSS 0.84
Broadcom Unified Infrastructure Management < 9.20 - Buffer Overflow
CA Unified Infrastructure Management (Nimsoft/UIM) 20.1, 20.3.x, and 9.20 and below contains a buffer overflow vulnerability in the robot (controller) component. A remote attacker can execute arbitrary code.
CWE-120 Feb 18, 2020
CVE-2020-0646 9.8 CRITICAL KEV SSVC ACTIVE 2 PoCs Analysis NUCLEI EPSS 0.94
Microsoft .net Framework - Remote Code Execution
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
CWE-91 Jan 14, 2020