Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,109 results Clear all
CVE-2020-0380 9.8 CRITICAL 1 PoC Analysis EPSS 0.06
Google Android - Out-of-Bounds Write
In allocExcessBits of bitalloc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-146398979
CWE-787 Sep 17, 2020
CVE-2020-7471 9.8 CRITICAL 8 PoCs Analysis EPSS 0.09
Django < 1.11.28 - SQL Injection
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
CWE-89 Feb 03, 2020
CVE-2020-0138 9.8 CRITICAL 1 PoC Analysis EPSS 0.06
Android -10 - Buffer Overflow
In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if bluetoothtbd were used, which it isn't in typical Android platforms, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142878416
CWE-787 Jun 11, 2020
CVE-2020-0471 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Google Android - Improper Input Validation
In reassemble_and_dispatch of packet_fragmenter.cc, there is a possible way to inject packets into an encrypted Bluetooth connection due to improper input validation. This could lead to remote escalation of privilege between two Bluetooth devices by a proximal attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-169327567.
CWE-20 Jan 11, 2021
CVE-2020-0225 9.8 CRITICAL 1 PoC Analysis EPSS 0.06
Android <10 - RCE
In a2dp_vendor_ldac_decoder_decode_packet of a2dp_vendor_ldac_decoder.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142546668
CWE-787 Jul 17, 2020
CVE-2020-2501 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
Qnap Surveillance Station < 5.1.5.3.3 - Out-of-Bounds Write
A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)
CWE-121 Feb 17, 2021
CVE-2020-7980 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Intellian Aptus Web <1.24 - RCE
Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.
CWE-78 Jan 25, 2020
CVE-2020-21378 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
Seacms - SQL Injection
SQL injection vulnerability in SeaCMS 10.1 (2020.02.08) via the id parameter in an edit action to admin_members_group.php.
CWE-89 Dec 21, 2020
CVE-2020-35191 9.8 CRITICAL 1 PoC Analysis EPSS 0.20
Drupal Docker <8.5.10-fpm-alpine - Privilege Escalation
The official drupal docker images before 8.5.10-fpm-alpine (Alpine specific) contain a blank password for a root user. System using the drupal docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
CWE-306 Dec 17, 2020
CVE-2020-11546 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Superwebmailer < 7.40.0.01550 - Code Injection
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
CWE-94 Jul 14, 2020
CVE-2020-23935 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Kabir Alhasan Student Management System 1.0 - Auth Bypass
Kabir Alhasan Student Management System 1.0 is vulnerable to Authentication Bypass via "Username: admin'# && Password: (Write Something)".
CWE-89 Aug 20, 2020
CVE-2020-28032 9.8 CRITICAL 1 PoC Analysis EPSS 0.26
Wordpress < 5.5.2 - Insecure Deserialization
WordPress before 5.5.2 mishandles deserialization requests in wp-includes/Requests/Utility/FilteredIterator.php.
CWE-502 Nov 02, 2020
CVE-2020-24030 9.8 CRITICAL 2 PoCs Analysis EPSS 0.02
ForLogic Qualiex v1/v3 - Privilege Escalation
ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."
CWE-672 Sep 02, 2020
CVE-2020-24029 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
ForLogic Qualiex v1/v3 - Info Disclosure
Because of unauthenticated password changes in ForLogic Qualiex v1 and v3, customer and admin permissions and data can be accessed via a simple request. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "corrected in all maintained versions. Password reset requests are validated against registered user emails and require a valid, short-lived token."
CWE-287 Sep 02, 2020
CVE-2020-27372 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Brandy Basic V Interpreter <1.21 - Buffer Overflow
A buffer overflow vulnerability exists in Brandy Basic V Interpreter 1.21 in the run_interpreter function.
CWE-120 Oct 11, 2021
CVE-2020-17363 9.9 CRITICAL 1 PoC Analysis EPSS 0.06
USVN <1.0.9 - RCE
USVN (aka User-friendly SVN) before 1.0.9 allows remote code execution via shell metacharacters in the number_start or number_end parameter to LastHundredRequest (aka lasthundredrequestAction) in the Timeline module. NOTE: this may overlap CVE-2020-25069.
CWE-78 Dec 31, 2020
CVE-2020-14756 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.87
Oracle Coherence <14.1.1.0.0 - RCE
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Core Components). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jan 20, 2021
CVE-2020-9054 9.8 CRITICAL KEV SSVC ACTIVE 1 PoC Analysis NUCLEI EPSS 0.94
Zyxel Nas326 Firmware < 5.21\(aazf.7\)c0 - OS Command Injection
Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2
CWE-78 Mar 04, 2020
CVE-2020-8515 9.8 CRITICAL KEV SSVC ACTIVE 4 PoCs Analysis NUCLEI EPSS 0.94
DrayTek - RCE
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
CWE-78 Feb 01, 2020
CVE-2020-35846 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Agentejo Cockpit < 0.11.2 - SQL Injection
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function.
CWE-89 Dec 30, 2020