Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,105 results Clear all
CVE-2020-9758 9.6 CRITICAL 1 PoC Analysis EPSS 0.02
Livezilla < 8.0.1.3 - XSS
An issue was discovered in chat.php in LiveZilla Live Chat 8.0.1.3 (Helpdesk). A blind JavaScript injection lies in the name parameter. Triggering this can fetch the username and passwords of the helpdesk employees in the URI. This leads to a privilege escalation, from unauthenticated to user-level access, leading to full account takeover. The attack fetches multiple credentials because they are stored in the database (stored XSS). This affects the mobile/chat URI via the lgn and psswrd parameters.
CWE-79 Mar 09, 2020
CVE-2020-8657 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.89
EyesOfNetwork 5.1-5.3 AutoDiscovery Target Command Execution
An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.
CWE-798 Feb 06, 2020
CVE-2020-37095 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Cyberoam Authentication Client <2.1.2.7 - RCE
Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.
CWE-121 Feb 07, 2026
CVE-2020-9374 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.87
Tp-link Tl-wr849n Firmware - OS Command Injection
On TP-Link TL-WR849N 0.9.1 4.16 devices, a remote command execution vulnerability in the diagnostics area can be exploited when an attacker sends specific shell metacharacters to the panel's traceroute feature.
CWE-78 Feb 24, 2020
CVE-2020-8510 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
phpABook 0.9 Intermediate - Auth Bypass
An issue was discovered in phpABook 0.9 Intermediate. On the login page, if one sets a userInfo cookie with the value of admin+1+en (user+perms+lang), one can login as any user without a password.
CWE-287 Feb 03, 2020
CVE-2020-37159 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Parallaxis Cuckoo Clock 5.0 - Buffer Overflow
Parallaxis Cuckoo Clock 5.0 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting memory registers in the alarm scheduling feature. Attackers can craft a malicious payload exceeding 260 bytes to overwrite EIP and EBP, enabling shellcode execution with potential remote code execution.
CWE-121 Feb 07, 2026
CVE-2020-37161 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Wedding Slideshow Studio 1.36 - RCE
Wedding Slideshow Studio 1.36 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting the registration name field with malicious payload. Attackers can craft a specially designed payload to trigger remote code execution, demonstrating the ability to run system commands like launching the calculator.
CWE-121 Feb 07, 2026
CVE-2020-37162 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Wedding Slideshow Studio <1.36 - Buffer Overflow
Wedding Slideshow Studio 1.36 contains a buffer overflow vulnerability in the registration key input that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload of 1608 bytes to trigger a stack-based buffer overflow and execute commands through the registration key field.
CWE-122 Feb 07, 2026
CVE-2020-8547 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
phpList 3.5.0 - Auth Bypass
phpList 3.5.0 allows type juggling for admin login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters.
Feb 03, 2020
CVE-2020-37176 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Torrent 3GP Converter <1.51 - RCE
Torrent 3GP Converter 1.51 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload targeting the application's registration dialog to trigger code execution and open the calculator through carefully constructed buffer overflow techniques.
CWE-121 Feb 11, 2026
CVE-2020-6170 9.8 CRITICAL 1 PoC Analysis EPSS 0.10
Genexis Platinum-4410 <2.1 - Auth Bypass
An authentication bypass vulnerability on Genexis Platinum-4410 v2.1 P4410-V2 1.28 devices allows attackers to obtain cleartext credentials from the HTML source code of the cgi-bin/index2.asp URI.
CWE-306 Jan 08, 2020
CVE-2020-37181 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Torrent FLV Converter <1.51 Build 117 - Buffer Overflow
Torrent FLV Converter 1.51 Build 117 contains a stack overflow vulnerability that allows attackers to overwrite Structured Exception Handler (SEH) through a malicious registration code input. Attackers can craft a payload with specific offsets and partial SEH overwrite techniques to potentially execute arbitrary code on vulnerable Windows 32-bit systems.
CWE-121 Feb 11, 2026
CVE-2020-37186 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Chevereto 3.13.4 Core - RCE
Chevereto 3.13.4 Core contains a remote code execution vulnerability that allows attackers to inject malicious code during database configuration installation. Attackers can manipulate the database table prefix parameter to write a PHP shell file and execute arbitrary system commands through a crafted POST request.
CWE-94 Feb 11, 2026
CVE-2020-37184 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Allok Video Converter <4.6.1217 - RCE
Allok Video Converter 4.6.1217 contains a stack overflow vulnerability in the License Name input field that allows attackers to execute arbitrary code. Attackers can craft a specially designed payload to overwrite SEH handlers and execute system commands by injecting malicious bytecode into the input field.
CWE-121 Feb 11, 2026
CVE-2020-37183 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Buffer Overflow
Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload in the License Name input field to trigger a buffer overflow and execute system commands like calc.exe.
CWE-121 Feb 11, 2026
CVE-2020-6756 9.8 CRITICAL 1 PoC Analysis EPSS 0.12
Rasilient Pixelstor 5000 Firmware - OS Command Injection
languageOptions.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows unauthenticated attackers to remotely execute code via the lang parameter.
CWE-78 Jan 09, 2020
CVE-2020-37153 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
ASTPP 4.0.1 - XSS, Command Injection
ASTPP 4.0.1 contains multiple vulnerabilities including cross-site scripting and command injection in SIP device configuration and plugin management interfaces. Attackers can exploit these flaws to inject system commands, hijack administrator sessions, and potentially execute arbitrary code with root permissions through cron task manipulation.
CWE-79 Feb 11, 2026
CVE-2020-10224 9.8 CRITICAL 1 PoC Analysis EPSS 0.14
Phpgurukul Online Book Store - Unrestricted File Upload
An unauthenticated file upload vulnerability has been identified in admin_add.php in PHPGurukul Online Book Store 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
CWE-434 Mar 08, 2020
CVE-2020-10225 9.8 CRITICAL 1 PoC Analysis EPSS 0.09
Phpgurukul Job Portal - Unrestricted File Upload
An unauthenticated file upload vulnerability has been identified in admin/gallery.php in PHPGurukul Job Portal 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
CWE-434 Mar 08, 2020
CVE-2020-5307 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.81
Phpgurukul Dairy Farm Shop Management System - SQL Injection
PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php.
CWE-89 Jan 07, 2020