Critical Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,544 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,344 vendors 43,890 researchers
4,104 results Clear all
CVE-2019-4279 9.8 CRITICAL 2 PoCs Analysis EPSS 0.84
IBM WebSphere App Server <9.0 - RCE
IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 160445.
CWE-502 May 17, 2019
CVE-2019-9879 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.77
WPGraphQL 0.2.3 - RCE
The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation.
CWE-306 Jun 10, 2019
CVE-2019-9880 9.1 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.73
WPGraphQL <0.2.3 - Info Disclosure
An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username.
CWE-306 Jun 10, 2019
CVE-2019-8641 9.8 CRITICAL 3 PoCs Analysis EPSS 0.11
Apple Iphone OS < 12.4 - Out-of-Bounds Read
An out-of-bounds read was addressed with improved input validation.
CWE-125 Dec 18, 2019
CVE-2019-13360 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.27
Webpanel - IDOR
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, remote attackers can bypass authentication in the login process by leveraging knowledge of a valid username.
CWE-639 Jul 16, 2019
CVE-2019-15976 9.8 CRITICAL 1 PoC Analysis EPSS 0.43
Cisco DCNM - Privilege Escalation
Multiple vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-798 Jan 06, 2020
CVE-2019-1619 9.8 CRITICAL 3 PoCs Analysis EPSS 0.71
Cisco Data Center Network Manager - Improper Access Control
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device.
CWE-284 Jun 27, 2019
CVE-2019-1620 9.8 CRITICAL 1 PoC Analysis EPSS 0.86
Cisco Data Center Network Manager - Path Traversal
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device. The vulnerability is due to incorrect permission settings in affected DCNM software. An attacker could exploit this vulnerability by uploading specially crafted data to the affected device. A successful exploit could allow the attacker to write arbitrary files on the filesystem and execute code with root privileges on the affected device.
CWE-22 Jun 27, 2019
CVE-2019-1912 9.1 CRITICAL 1 PoC Analysis EPSS 0.12
Cisco Sf-220-24 Firmware < 1.1.4.4 - Incorrect Authorization
A vulnerability in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an unauthenticated, remote attacker to upload arbitrary files. The vulnerability is due to incomplete authorization checks in the web management interface. An attacker could exploit this vulnerability by sending a malicious request to certain parts of the web management interface. Depending on the configuration of the affected switch, the malicious request must be sent via HTTP or HTTPS. A successful exploit could allow the attacker to modify the configuration of an affected device or to inject a reverse shell. This vulnerability affects Cisco Small Business 220 Series Smart Switches running firmware versions prior to 1.1.4.4 with the web management interface enabled. The web management interface is enabled via both HTTP and HTTPS by default.
CWE-285 Aug 07, 2019
CVE-2019-1913 9.8 CRITICAL 1 PoC Analysis EPSS 0.14
Cisco Sf-220-24 Firmware < 1.1.4.4 - Memory Corruption
Multiple vulnerabilities in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an unauthenticated, remote attacker to overflow a buffer, which then allows the execution of arbitrary code with root privileges on the underlying operating system. The vulnerabilities are due to insufficient validation of user-supplied input and improper boundary checks when reading data into an internal buffer. An attacker could exploit these vulnerabilities by sending malicious requests to the web management interface of an affected device. Depending on the configuration of the affected switch, the malicious requests must be sent via HTTP or HTTPS.
CWE-119 Aug 07, 2019
CVE-2019-12989 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.92
Citrix Netscaler Sd-wan < 10.0.8 - SQL Injection
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow SQL Injection.
CWE-89 Jul 16, 2019
CVE-2019-15975 9.8 CRITICAL 2 PoCs Analysis EPSS 0.85
Cisco DCNM - Privilege Escalation
Multiple vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-798 Jan 06, 2020
CVE-2019-10692 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.89
Codecabin WP GO Maps < 7.11.18 - SQL Injection
In the wp-google-maps plugin before 7.11.18 for WordPress, includes/class.rest-api.php in the REST API does not sanitize field names before a SELECT statement.
CWE-89 Apr 02, 2019
CVE-2019-20361 9.8 CRITICAL 3 PoCs Analysis EPSS 0.28
Icegram Email Subscribers & Newsletters < 4.3.1 - SQL Injection
There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).
CWE-89 Jan 08, 2020
CVE-2019-17662 9.8 CRITICAL 9 PoCs Analysis NUCLEI EPSS 0.94
Cybelsoft Thinvnc - Path Traversal
ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.
CWE-22 Oct 16, 2019
CVE-2019-9960 9.8 CRITICAL 1 PoC Analysis EPSS 0.70
LimeSurvey Zip Path Traversals
The downloadZip function in application/controllers/admin/export.php in LimeSurvey through 3.16.1+190225 allows a relative path.
CWE-22 Mar 24, 2019
CVE-2019-7194 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.94
QNAP Photo Station - Path Traversal
This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
CWE-22 Dec 05, 2019
CVE-2019-16662 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
rConfig <3.9.2 - Command Injection
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
CWE-78 Oct 28, 2019
CVE-2019-13373 9.8 CRITICAL 1 PoC Analysis EPSS 0.90
Dlink Central Wifimanager - SQL Injection
An issue was discovered in the D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6. Input does not get validated and arbitrary SQL statements can be executed in the database via the /web/Public/Conn.php parameter dbSQL.
CWE-89 Jul 06, 2019
CVE-2019-6814 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.67
Schneider-electric Net5501 Firmware < 2.1.9.7 - Authentication Bypass
A CWE-287: Improper Authentication vulnerability exists in the NET55XX Encoder with firmware prior to version 2.1.9.7 which could cause impact to confidentiality, integrity, and availability when a remote attacker crafts a malicious request to the encoder webUI.
CWE-287 May 22, 2019