Critical Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,105 results
Clear all
CVE-2020-36898
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.18
QiHang Media Web Digital Signage 3.0.9 - Path Traversal
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file deletion vulnerability in the QH.aspx endpoint that allows remote attackers to delete files without authentication. Attackers can exploit the 'data' parameter by sending a POST request with file paths to delete arbitrary files with web server permissions using directory traversal sequences.
CWE-22
Dec 10, 2025
CVE-2020-36897
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
QiHang Media Web Digital Signage 3.0.9 - RCE
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit the file upload functionality by using the 'remotePath' and 'fileToUpload' parameters to write and execute arbitrary system commands on the server.
CWE-434
Dec 10, 2025
CVE-2020-11552
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.05
Zohocorp ManageEngine ADSelfService Plus < 6003 - Privilege Escalation
An elevation of privilege vulnerability exists in ManageEngine ADSelfService Plus before build 6003 because it does not properly enforce user privileges associated with a Certificate dialog. This vulnerability could allow an unauthenticated attacker to escalate privileges on a Windows host. An attacker does not require any privilege on the target system in order to exploit this vulnerability. One option is the self-service option on the Windows login screen. Upon selecting this option, the thick-client software is launched, which connects to a remote ADSelfService Plus server to facilitate self-service operations. An unauthenticated attacker having physical access to the host could trigger a security alert by supplying a self-signed SSL certificate to the client. The View Certificate option from the security alert allows an attacker to export a displayed certificate to a file. This can further cascade to a dialog that can open Explorer as SYSTEM. By navigating from Explorer to \windows\system32, cmd.exe can be launched as a SYSTEM.
CWE-269
Aug 11, 2020
CVE-2020-29280
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Victor CMS v1.0 - SQL Injection
The Victor CMS v1.0 application is vulnerable to SQL injection via the 'search' parameter on the search.php page.
CWE-89
Dec 02, 2020
CVE-2020-36997
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
BacklinkSpeed 2.4 - Buffer Overflow
BacklinkSpeed 2.4 contains a buffer overflow vulnerability that allows attackers to corrupt the Structured Exception Handler (SEH) chain through malicious file import. Attackers can craft a specially designed payload file to overwrite SEH addresses, potentially executing arbitrary code and gaining control of the application.
CWE-121
Jan 29, 2026
CVE-2020-24208
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
SourceCodester Online Shopping Alphaware 1.0 - SQL Injection
A SQL injection vulnerability in SourceCodester Online Shopping Alphaware 1.0 allows remote unauthenticated attackers to bypass the authentication process via email and password parameters.
CWE-89
Aug 17, 2020
CVE-2020-37000
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Free MP3 CD Ripper 2.8 - RCE
Free MP3 CD Ripper 2.8 contains a stack buffer overflow vulnerability that allows remote attackers to execute arbitrary code by crafting a malicious WAV file with oversized payload. Attackers can leverage a specially crafted exploit file with shellcode, SEH bypass, and egghunter technique to achieve remote code execution on vulnerable Windows systems.
CWE-121
Jan 29, 2026
CVE-2020-23828
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
SourceCodester Online Course Registration v1.0 - RCE
A File Upload vulnerability in SourceCodester Online Course Registration v1.0 allows remote attackers to achieve Remote Code Execution (RCE) on the hosting webserver by uploading a crafted PHP web-shell that bypasses the image upload filters. An attack uses /Online%20Course%20Registration/my-profile.php with the POST parameter photo.
CWE-434
Sep 15, 2020
CVE-2020-11749
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.06
Pandorafms Pandora Fms < 746 - XSS
Pandora FMS 7.0 NG <= 746 suffers from Multiple XSS vulnerabilities in different browser views. A network administrator scanning a SNMP device can trigger a Cross Site Scripting (XSS), which can run arbitrary code to allow Remote Code Execution as root or apache2.
CWE-79
Jul 13, 2020
CVE-2020-15367
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Venki Supravizio BPM 10.1.2 - Auth Bypass
Venki Supravizio BPM 10.1.2 does not limit the number of authentication attempts. An unauthenticated user may exploit this vulnerability to launch a brute-force authentication attack against the Login page.
CWE-307
Jul 07, 2020
CVE-2020-36902
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
UBICOD Medivision Digital Signage 1.5.1 - Auth Bypass
UBICOD Medivision Digital Signage 1.5.1 contains an authorization bypass vulnerability that allows normal users to escalate privileges by manipulating the 'ft[grp]' parameter. Attackers can send a GET request to /html/user with 'ft[grp]' set to integer value '3' to gain super admin rights without authentication.
CWE-862
Dec 10, 2025
CVE-2020-13925
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.85
Apache Kylin < 3.1.0 - OS Command Injection
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.
CWE-78
Jul 14, 2020
CVE-2020-14944
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
Global RADAR BSA Radar <1.6.7234.24750 - Privilege Escalation
Global RADAR BSA Radar 1.6.7234.24750 and earlier lacks valid authorization controls in multiple functions. This can allow for manipulation and takeover of user accounts if successfully exploited. The following vulnerable functions are exposed: ChangePassword, SaveUserProfile, and GetUser.
CWE-862
Jun 22, 2020
CVE-2020-37027
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Sickbeard alpha - Command Injection
Sickbeard alpha contains a remote command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands through the extra scripts configuration. Attackers can set malicious commands in the extra scripts field and trigger processing to execute remote code on the vulnerable Sickbeard installation.
CWE-78
Jan 30, 2026
CVE-2020-13640
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.74
Gvectors Wpdiscuz < 5.3.5 - SQL Injection
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.)
CWE-89
Jun 18, 2020
CVE-2020-12828
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.15
AnchorFree VPN SDK <1.3.3.218 - Code Injection
An issue was discovered in AnchorFree VPN SDK before 1.3.3.218. The VPN SDK service takes certain executable locations over a socket bound to localhost. Binding to the socket and providing a path where a malicious executable file resides leads to executing the malicious executable file with SYSTEM privileges.
CWE-434
May 21, 2020
CVE-2020-12856
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.11
OpenTrace <v1.0.17 - Info Disclosure
OpenTrace, as used in COVIDSafe through v1.0.17, TraceTogether, ABTraceTogether, and other applications on iOS and Android, allows remote attackers to conduct long-term re-identification attacks and possibly have unspecified other impact, because of how Bluetooth is used.
May 18, 2020
CVE-2020-13159
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
Artica Proxy <4.30.000000 - Command Injection
Artica Proxy before 4.30.000000 Community Edition allows OS command injection via the Netbios name, Server domain name, dhclient_mac, Hostname, or Alias field. NOTE: this may overlap CVE-2020-10818.
CWE-78
Jun 22, 2020
CVE-2020-14011
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.34
Lansweeper <7.2.x - Command Injection
Lansweeper 6.0.x through 7.2.x has a default installation in which the admin password is configured for the admin account, unless "Built-in admin" is manually unchecked. This allows command execution via the Add New Package and Scheduled Deployments features.
CWE-1188
Jun 15, 2020
CVE-2020-26051
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
College Management System - SQL Injection
College Management System Php 1.0 suffers from SQL injection vulnerabilities in the index.php page from POST parameters 'unametxt' and 'pwdtxt', which are not filtered before passing a SQL query.
CWE-89
Feb 08, 2021