Critical Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,109 results
Clear all
CVE-2020-17530
9.8
CRITICAL
KEV
SSVC ACTIVE
14 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Struts 2 Forced Multi OGNL Evaluation
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
CWE-917
Dec 11, 2020
CVE-2020-24719
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.63
Couchbase Server < 6.6.0 - OS Command Injection
Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.
CWE-78
Nov 12, 2020
CVE-2020-25213
10.0
CRITICAL
KEV
SSVC ACTIVE
11 PoCs
Analysis
NUCLEI
EPSS 0.94
WordPress File Manager Unauthenticated Remote Code Execution
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
CWE-434
Sep 09, 2020
CVE-2020-17496
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
vBulletin <5.6.2 - RCE
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
CWE-74
Aug 12, 2020
CVE-2020-13381
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.36
openSIS <7.4 - SQL Injection
openSIS through 7.4 allows SQL Injection.
CWE-89
Jul 01, 2020
CVE-2020-12800
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Wordpress Drag and Drop Multi File Uploader RCE
The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
CWE-434
Jun 08, 2020
CVE-2020-8794
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.88
OpenSMTPD OOB Read Local Privilege Escalation
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
CWE-125
Feb 25, 2020
CVE-2020-9015
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.78
Arista restricted shell escape (with privesc)
Arista DCS-7050QX-32S-R 4.20.9M, DCS-7050CX3-32S-R 4.20.11M, and DCS-7280SRAM-48C6-R 4.22.0.1F devices (and possibly other products) allow attackers to bypass intended TACACS+ shell restrictions via a | character. NOTE: the vendor reports that this is a configuration issue relating to an overly permissive regular expression in the TACACS+ server permitted commands
Feb 20, 2020
CVE-2020-8518
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.85
Horde Groupware Webmail Edition <5.2.22 - Code Injection
Horde Groupware Webmail Edition 5.2.22 allows injection of arbitrary PHP code via CSV data, leading to remote code execution.
CWE-94
Feb 17, 2020
CVE-2020-8644
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
PlaySMS <1.4.3 - XSS
PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
CWE-94
Feb 05, 2020
CVE-2020-7200
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.86
HP Systems Insight Manager - Remote Code Execution
A potential security vulnerability has been identified in HPE Systems Insight Manager (SIM) version 7.6. The vulnerability could be exploited to allow remote code execution.
Dec 18, 2020
CVE-2020-17132
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.83
Microsoft Exchange - RCE
Microsoft Exchange Remote Code Execution Vulnerability
Dec 10, 2020
CVE-2020-27955
9.8
CRITICAL
20 PoCs
Analysis
EPSS 0.94
Git Remote Code Execution via git-lfs (CVE-2020-27955)
Git LFS 2.12.0 allows Remote Code Execution.
CWE-427
Nov 05, 2020
CVE-2020-7361
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.36
Easycorp Zentao Pro < 8.8.2 - OS Command Injection
The EasyCorp ZenTao Pro application suffers from an OS command injection vulnerability in its '/pro/repo-create.html' component. After authenticating to the ZenTao dashboard, attackers may construct and send arbitrary OS commands via the POST parameter 'path', and those commands will run in an elevated SYSTEM context on the underlying Windows operating system.
CWE-78
Aug 06, 2020
CVE-2020-7356
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.62
Cayintech Xpost - SQL Injection
CAYIN xPost suffers from an unauthenticated SQL Injection vulnerability. Input passed via the GET parameter 'wayfinder_seqid' in wayfinder_meeting_input.jsp is not properly sanitized before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands.
CWE-89
Aug 06, 2020
CVE-2020-13166
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.77
MyLittleAdmin 3.8 - RCE
The management tool in MyLittleAdmin 3.8 allows remote attackers to execute arbitrary code because machineKey is hardcoded (the same for all customers' installations) in web.config, and can be used to send serialized ASP code.
CWE-798
May 19, 2020
CVE-2020-10915
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.84
VEEAM One Agent 9.5.4.4587 - Deserialization
This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HandshakeResult method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10401.
CWE-502
Apr 22, 2020
CVE-2020-10189
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Zohocorp Manageengine Desktop Central - Insecure Deserialization
Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.
CWE-502
Mar 06, 2020
CVE-2020-8012
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.84
Broadcom Unified Infrastructure Management < 9.20 - Buffer Overflow
CA Unified Infrastructure Management (Nimsoft/UIM) 20.1, 20.3.x, and 9.20 and below contains a buffer overflow vulnerability in the robot (controller) component. A remote attacker can execute arbitrary code.
CWE-120
Feb 18, 2020
CVE-2020-0646
9.8
CRITICAL
KEV
SSVC ACTIVE
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Microsoft .net Framework - Remote Code Execution
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
CWE-91
Jan 14, 2020