Critical Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,109 results
Clear all
CVE-2020-10131
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.09
SearchBlox <9.2.1 - Code Injection
SearchBlox before Version 9.2.1 is vulnerable to CSV macro injection in "Featured Results" parameter.
CWE-1236
Sep 06, 2023
CVE-2020-13995
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
Airforce Nitf Extract Utility - Out-of-Bounds Write
U.S. Air Force Sensor Data Management System extract75 has a buffer overflow that leads to code execution. An overflow in a global variable (sBuffer) leads to a Write-What-Where outcome. Writing beyond sBuffer will clobber most global variables until reaching a pointer such as DES_info or image_info. By controlling that pointer, one achieves an arbitrary write when its fields are assigned. The data written is from a potentially untrusted NITF file in the form of an integer. The attacker can gain control of the instruction pointer.
CWE-787
Sep 25, 2020
CVE-2020-6627
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.14
Seagate Stcg2000300 Firmware - OS Command Injection
The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.
CWE-78
Dec 06, 2022
CVE-2020-9380
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.21
Whmcssmarters Web TV Player < 2020-02-22 - Unrestricted File Upload
IPTV Smarters WEB TV PLAYER through 2020-02-22 allows attackers to execute OS commands by uploading a script.
CWE-434
Mar 05, 2020
CVE-2020-36911
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.01
Covenant 0.1.3-0.5 - RCE
Covenant 0.1.3 - 0.5 contains a remote code execution vulnerability that allows attackers to craft malicious JWT tokens with administrative privileges. Attackers can generate forged tokens with admin roles and upload custom DLL payloads to execute arbitrary commands on the target system.
CWE-798
Jan 13, 2026
CVE-2020-15568
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
TerraMaster TOS <4.1.29 - Code Injection
TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter.
CWE-913
Jan 30, 2021
CVE-2020-36109
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.13
Asus Rt-ax86u Firmware < 9.0.0.4_386 - Buffer Overflow
ASUS RT-AX86U router firmware below version under 9.0.0.4_386 has a buffer overflow in the blocking_request.cgi function of the httpd module that can cause code execution when an attacker constructs malicious data.
CWE-120
Feb 01, 2021
CVE-2020-16846
9.8
CRITICAL
KEV
SSVC ACTIVE
2 PoCs
Analysis
NUCLEI
EPSS 0.94
SaltStack Salt REST API Arbitrary Command Execution
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
CWE-78
Nov 06, 2020
CVE-2020-11896
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.43
Treck Tcp/ip < 6.0.1.66 - Out-of-Bounds Write
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
CWE-119
Jun 17, 2020
CVE-2020-23591
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
OPTILINK OP-XT71000N V2.2 - File Upload
A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an attacker to upload arbitrary files through " /mgm_dev_upgrade.asp " which can "delete every file for Denial of Service (using 'rm -rf *.*' in the code), reverse connection (using '.asp' webshell), backdoor.
CWE-434
Nov 23, 2022
CVE-2020-23584
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.19
OPTILINK OP-XT71000N V2.2 - RCE
Unauthenticated remote code execution in OPTILINK OP-XT71000N, Hardware Version: V2.2 occurs when the attacker passes arbitrary commands with IP-ADDRESS using " | " to execute commands on " /diag_tracert_admin.asp " in the "PingTest" parameter that leads to command execution.
CWE-77
Nov 23, 2022
CVE-2020-23583
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
OPTILINK OP-XT71000N V2.2 - RCE
OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on "/diag_ping_admin.asp" to "PingTest" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.
CWE-77
Nov 23, 2022
CVE-2020-35314
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.43
Wondercms - OS Command Injection
A remote code execution vulnerability in the installUpdateThemePluginAction function in index.php in WonderCMS 3.1.3, allows remote attackers to upload a custom plugin which can contain arbitrary code and obtain a webshell via the theme/plugin installer.
CWE-78
Apr 20, 2021
CVE-2020-19586
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.01
Yellowfinbi Business Intelligence - XSS
Incorrect Access Control issue in Yellowfin Business Intelligence 7.3 allows remote attackers to escalate privilege via MIAdminStyles.i4 Admin UI.
CWE-79
Sep 14, 2022
CVE-2020-9006
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.41
Sygnoos Popup Builder < 2.6.7.6 - Insecure Deserialization
The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)
CWE-502
Feb 17, 2020
CVE-2020-6364
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.21
SAP Solution Manager/Focused Run <10.7 - Code Injection
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an attacker to modify a cookie in a way that OS commands can be executed and potentially gain control over the host running the CA Introscope Enterprise Manager,leading to Code Injection. With this, the attacker is able to read and modify all system files and also impact system availability.
CWE-78
Oct 15, 2020
CVE-2020-20277
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.39
Troglobit Uftpd < 2.10 - Path Traversal
There are multiple unauthenticated directory traversal vulnerabilities in different FTP commands in uftpd FTP server versions 2.7 to 2.10 due to improper implementation of a chroot jail in common.c's compose_abspath function that can be abused to read or write to arbitrary files on the filesystem, leak process memory, or potentially lead to remote code execution.
CWE-22
Dec 18, 2020
CVE-2020-28360
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.02
Private-ip < 1.0.5 - SSRF
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques.
CWE-918
Nov 23, 2020
CVE-2020-2509
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
1 PoC
Analysis
EPSS 0.84
Qnap Qts < 4.2.6 - Command Injection
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later QTS 4.5.1.1495 Build 20201123 and later QTS 4.3.6.1620 Build 20210322 and later QTS 4.3.4.1632 Build 20210324 and later QTS 4.3.3.1624 Build 20210416 and later QTS 4.2.6 Build 20210327 and later QuTS hero h4.5.1.1491 build 20201119 and later
CWE-78
Apr 17, 2021
CVE-2020-0452
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.15
Google Android - Integer Overflow
In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731
CWE-190
Nov 10, 2020