Critical Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,109 results Clear all
CVE-2020-35729 9.8 CRITICAL 4 PoCs Analysis NUCLEI EPSS 0.90
Klogserver Klog Server - OS Command Injection
KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.
CWE-78 Dec 27, 2020
CVE-2020-14871 10.0 CRITICAL KEV SSVC ACTIVE 6 PoCs Analysis EPSS 0.89
Oracle Solaris 10-11 - Privilege Escalation
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
CWE-787 Oct 21, 2020
CVE-2020-25223 9.8 CRITICAL KEV SSVC ACTIVE 3 PoCs Analysis NUCLEI EPSS 0.94
Sophos Unified Threat Management < 9.511 - OS Command Injection
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
CWE-78 Sep 25, 2020
CVE-2020-17506 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Artica Web Proxy 4.30.00000000 - SQL Injection
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
CWE-89 Aug 12, 2020
CVE-2020-13151 9.8 CRITICAL 4 PoCs Analysis EPSS 0.90
Aerospike Database UDF Lua Code Execution
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.
CWE-78 Aug 05, 2020
CVE-2020-15893 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.83
Dlink Dir-816l Firmware - OS Command Injection
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet.
CWE-78 Jul 22, 2020
CVE-2020-12029 9.0 CRITICAL 1 PoC Analysis EPSS 0.25
Rockwellautomation Factorytalk View - Improper Input Validation
All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
CWE-20 Jul 20, 2020
CVE-2020-13160 9.8 CRITICAL 2 PoCs Analysis EPSS 0.82
AnyDesk <5.5.3 - RCE
AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution.
CWE-134 Jun 09, 2020
CVE-2020-8606 9.8 CRITICAL 1 PoC Analysis EPSS 0.90
Trend Micro InterScan Web Security Virtual Appliance 6.5 - Auth Bypass
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
CWE-287 May 27, 2020
CVE-2020-13167 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Netsweeper <6.4.3 - RCE
Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.
CWE-78 May 19, 2020
CVE-2020-10220 9.8 CRITICAL 4 PoCs Analysis NUCLEI EPSS 0.94
Rconfig 3.x Chained Remote Code Execution
An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.
CWE-89 Mar 07, 2020
CVE-2020-28188 9.8 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.93
Terra-master Tos < 4.2.06 - OS Command Injection
Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.
CWE-78 Dec 24, 2020
CVE-2020-35476 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
OpenTSDB 2.4.0 unauthenticated command injection
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
CWE-78 Dec 16, 2020
CVE-2020-25592 9.8 CRITICAL 1 PoC Analysis EPSS 0.43
Salt < 2015.8.10 - Authentication Bypass
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
CWE-287 Nov 06, 2020
CVE-2020-11857 9.8 CRITICAL 1 PoC Analysis EPSS 0.63
Microfocus Operation Bridge Reporter < 10.40 - Hard-coded Credentials
An Authorization Bypass vulnerability on Micro Focus Operation Bridge Reporter, affecting version 10.40 and earlier. The vulnerability could allow remote attackers to access the OBR host as a non-admin user
CWE-798 Sep 22, 2020
CVE-2020-11698 9.8 CRITICAL 2 PoCs Analysis EPSS 0.84
Titanhq Spamtitan - Command Injection
An issue was discovered in Titan SpamTitan 7.07. Improper input sanitization of the parameter community on the page snmp-x.php would allow a remote attacker to inject commands into the file snmpd.conf that would allow executing commands on the target server.
CWE-77 Sep 17, 2020
CVE-2020-7357 9.6 CRITICAL 1 PoC Analysis EPSS 0.77
Cayintech Cms-se Firmware - OS Command Injection
Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'NTP_Server_IP' HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5.
CWE-78 Aug 06, 2020
CVE-2020-15920 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Midasolutions Eframework < 2.9.0 - OS Command Injection
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
CWE-78 Jul 24, 2020
CVE-2020-4428 9.1 CRITICAL KEV SSVC ACTIVE 1 PoC Analysis EPSS 0.92
IBM Data Risk Manager < 2.0.4 - OS Command Injection
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to execute arbitrary commands on the system. IBM X-Force ID: 180533.
CWE-78 May 07, 2020
CVE-2020-3243 9.8 CRITICAL 1 PoC Analysis EPSS 0.90
Cisco UCS Director - Auth Bypass/Path Traversal
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-269 Apr 15, 2020