Critical Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,109 results
Clear all
CVE-2020-35729
9.8
CRITICAL
4 PoCs
Analysis
NUCLEI
EPSS 0.90
Klogserver Klog Server - OS Command Injection
KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.
CWE-78
Dec 27, 2020
CVE-2020-14871
10.0
CRITICAL
KEV
SSVC ACTIVE
6 PoCs
Analysis
EPSS 0.89
Oracle Solaris 10-11 - Privilege Escalation
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
CWE-787
Oct 21, 2020
CVE-2020-25223
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Sophos Unified Threat Management < 9.511 - OS Command Injection
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
CWE-78
Sep 25, 2020
CVE-2020-17506
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Artica Web Proxy 4.30.00000000 - SQL Injection
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
CWE-89
Aug 12, 2020
CVE-2020-13151
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.90
Aerospike Database UDF Lua Code Execution
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.
CWE-78
Aug 05, 2020
CVE-2020-15893
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.83
Dlink Dir-816l Firmware - OS Command Injection
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet.
CWE-78
Jul 22, 2020
CVE-2020-12029
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.25
Rockwellautomation Factorytalk View - Improper Input Validation
All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
CWE-20
Jul 20, 2020
CVE-2020-13160
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.82
AnyDesk <5.5.3 - RCE
AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution.
CWE-134
Jun 09, 2020
CVE-2020-8606
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.90
Trend Micro InterScan Web Security Virtual Appliance 6.5 - Auth Bypass
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
CWE-287
May 27, 2020
CVE-2020-13167
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Netsweeper <6.4.3 - RCE
Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.
CWE-78
May 19, 2020
CVE-2020-10220
9.8
CRITICAL
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Rconfig 3.x Chained Remote Code Execution
An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.
CWE-89
Mar 07, 2020
CVE-2020-28188
9.8
CRITICAL
EXPLOITED
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.93
Terra-master Tos < 4.2.06 - OS Command Injection
Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.
CWE-78
Dec 24, 2020
CVE-2020-35476
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
OpenTSDB 2.4.0 unauthenticated command injection
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
CWE-78
Dec 16, 2020
CVE-2020-25592
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.43
Salt < 2015.8.10 - Authentication Bypass
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
CWE-287
Nov 06, 2020
CVE-2020-11857
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.63
Microfocus Operation Bridge Reporter < 10.40 - Hard-coded Credentials
An Authorization Bypass vulnerability on Micro Focus Operation Bridge Reporter, affecting version 10.40 and earlier. The vulnerability could allow remote attackers to access the OBR host as a non-admin user
CWE-798
Sep 22, 2020
CVE-2020-11698
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.84
Titanhq Spamtitan - Command Injection
An issue was discovered in Titan SpamTitan 7.07. Improper input sanitization of the parameter community on the page snmp-x.php would allow a remote attacker to inject commands into the file snmpd.conf that would allow executing commands on the target server.
CWE-77
Sep 17, 2020
CVE-2020-7357
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.77
Cayintech Cms-se Firmware - OS Command Injection
Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'NTP_Server_IP' HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5.
CWE-78
Aug 06, 2020
CVE-2020-15920
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Midasolutions Eframework < 2.9.0 - OS Command Injection
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
CWE-78
Jul 24, 2020
CVE-2020-4428
9.1
CRITICAL
KEV
SSVC ACTIVE
1 PoC
Analysis
EPSS 0.92
IBM Data Risk Manager < 2.0.4 - OS Command Injection
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to execute arbitrary commands on the system. IBM X-Force ID: 180533.
CWE-78
May 07, 2020
CVE-2020-3243
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.90
Cisco UCS Director - Auth Bypass/Path Traversal
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-269
Apr 15, 2020