Critical Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,109 results
Clear all
CVE-2020-11998
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
Java - RCE
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13
Sep 10, 2020
CVE-2020-35848
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Agentejo Cockpit < 0.11.2 - SQL Injection
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php newpassword function.
CWE-89
Dec 30, 2020
CVE-2020-11984
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.75
Apache HTTP Server - Remote Code Execution
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CWE-120
Aug 07, 2020
CVE-2020-7378
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.09
Opencrx < 4.3.0 - Authentication Bypass
CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.
CWE-620
Nov 24, 2020
CVE-2020-5377
9.1
CRITICAL
3 PoCs
Analysis
EPSS 0.80
Dell Emc Openmanage Server Administrator < 9.4 - Path Traversal
Dell EMC OpenManage Server Administrator (OMSA) versions 9.4 and prior contain multiple path traversal vulnerabilities. An unauthenticated remote attacker could potentially exploit these vulnerabilities by sending a crafted Web API request containing directory traversal character sequences to gain file system access on the compromised management station.
CWE-22
Jul 28, 2020
CVE-2020-24913
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.42
Qcubed < 3.1.1 - SQL Injection
A SQL injection vulnerability in qcubed (all versions including 3.1.1) in profile.php via the strQuery parameter allows an unauthenticated attacker to access the database by injecting SQL code via a crafted POST request.
CWE-89
Mar 04, 2021
CVE-2020-18662
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Gnuboard5 <=5.3.2.8 - SQL Injection
SQL Injection vulnerability in gnuboard5 <=v5.3.2.8 via the table_prefix parameter in install_db.php.
CWE-89
Jun 24, 2021
CVE-2020-1948
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.64
Apache Dubbo < 2.5.10 - Insecure Deserialization
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
CWE-502
Jul 14, 2020
CVE-2020-9529
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Shenzhen Hichip Vision Technology Firmware - Privilege Escalation
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability that allows attackers on the local network to reset the device's administrator password. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
Aug 10, 2020
CVE-2020-17523
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.89
Apache Shiro <1.7.1 - Auth Bypass
Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
CWE-287
Feb 03, 2021
CVE-2020-24881
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.91
Osticket < 1.14.3 - SSRF
SSRF exists in osTicket before 1.14.3, where an attacker can add malicious file to server or perform port scanning.
CWE-918
Nov 02, 2020
CVE-2020-35575
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.19
TP-Link WA901ND <3.16.9(201211) beta - Info Disclosure
A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices.
Dec 26, 2020
CVE-2020-2733
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.89
Oracle JD Edwards <9.2 - RCE
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Monitoring and Diagnostics). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Apr 15, 2020
CVE-2020-0201
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.02
Android - Privilege Escalation
In showSecurityFields of WifiConfigController.java there is a possible credential leak due to a confused deputy. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143601727
Jun 11, 2020
CVE-2020-9480
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Apache Spark < 2.4.5 - Missing Authentication
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
CWE-306
Jun 23, 2020
CVE-2020-35717
9.0
CRITICAL
2 PoCs
Analysis
EPSS 0.06
Electronjs Zonote < 0.4.0 - XSS
zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because nodeIntegration in webPreferences is true).
CWE-79
Jan 01, 2021
CVE-2020-3187
9.1
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Cisco ASA/FTD - Path Traversal
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.
CWE-22
May 06, 2020
CVE-2020-12641
9.8
CRITICAL
KEV
SSVC ACTIVE
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Roundcube Webmail <1.4.4 - RCE
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
CWE-78
May 04, 2020
CVE-2020-12640
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.23
Roundcube Webmail <1.4.4 - Path Traversal
Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.
CWE-22
May 04, 2020
CVE-2020-26574
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.03
Leostream Connection Broker 8.2.x - XSS
Leostream Connection Broker 8.2.x is affected by stored XSS. An unauthenticated attacker can inject arbitrary JavaScript code via the webquery.pl User-Agent HTTP header. It is rendered by the admins the next time they log in. The JavaScript injected can be used to force the admin to upload a malicious Perl script that will be executed as root via libMisc::browser_client. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CWE-79
Oct 06, 2020