Critical Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,104 results
Clear all
CVE-2019-11510
10.0
CRITICAL
KEV
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
Pulse Secure PCS <9.0R3.4 - Info Disclosure
In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
CWE-22
May 08, 2019
CVE-2019-25224
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.81
WP Database Backup <5.2 - Command Injection
The WP Database Backup plugin for WordPress is vulnerable to OS Command Injection in versions before 5.2 via the mysqldump function. This vulnerability allows unauthenticated attackers to execute arbitrary commands on the host operating system.
CWE-78
Jul 25, 2025
CVE-2019-4716
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.93
IBM Planning Analytics <2.0.9 - Privilege Escalation
IBM Planning Analytics 2.0.0 through 2.0.8 is vulnerable to a configuration overwrite that allows an unauthenticated user to login as "admin", and then execute code as root or SYSTEM via TM1 scripting. IBM X-Force ID: 172094.
CWE-94
Dec 18, 2019
CVE-2019-15954
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.57
Total.js CMS 12.0.0 - Authenticated RCE
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script>
CWE-862
Sep 05, 2019
CVE-2019-12928
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.54
Qemu < 4.0.0 - Exposure to Wrong Actor
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
CWE-78
Jun 24, 2019
CVE-2019-11231
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.55
Get-simple Getsimple Cms < 3.3.15 - Path Traversal
An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary content (PHP code, for example). This vulnerability is triggered by an authenticated user; however, authentication can be bypassed. According to the official documentation for installation step 10, an admin is required to upload all the files, including the .htaccess files, and run a health check. However, what is overlooked is that the Apache HTTP Server by default no longer enables the AllowOverride directive, leading to data/users/admin.xml password exposure. The passwords are hashed but this can be bypassed by starting with the data/other/authorization.xml API key. This allows one to target the session state, since they decided to roll their own implementation. The cookie_name is crafted information that can be leaked from the frontend (site name and version). If a someone leaks the API key and the admin username, then they can bypass authentication. To do so, they need to supply a cookie based on an SHA-1 computation of this known information. The vulnerability exists in the admin/theme-edit.php file. This file checks for forms submissions via POST requests, and for the csrf nonce. If the nonce sent is correct, then the file provided by the user is uploaded. There is a path traversal allowing write access outside the jailed themes directory root. Exploiting the traversal is not necessary because the .htaccess file is ignored. A contributing factor is that there isn't another check on the extension before saving the file, with the assumption that the parameter content is safe. This allows the creation of web accessible and executable files with arbitrary content.
CWE-22
May 22, 2019
CVE-2019-12518
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.75
Anviz Crosschex - Buffer Overflow
Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability.
CWE-120
Dec 02, 2019
CVE-2019-17181
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.74
Intrasrv - Buffer Overflow
A remote SEH buffer overflow has been discovered in IntraSrv 1.0 (2007-06-03). An attacker may send a crafted HTTP GET or HEAD request that can result in a compromise of the hosting system.
CWE-120
Oct 28, 2019
CVE-2019-9848
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.87
LibreOffice - Code Injection
LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
CWE-94
Jul 17, 2019
CVE-2019-10123
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.80
AIS ESEL-Server 67 - SQL Injection
SQL Injection in Advanced InfoData Systems (AIS) ESEL-Server 67 (which is the backend for the AIS logistics mobile app) allows an anonymous attacker to execute arbitrary code in the context of the user of the MSSQL database. The default user for the database is the 'sa' user.
CWE-89
May 31, 2019
CVE-2019-7214
9.8
CRITICAL
6 PoCs
Analysis
EPSS 0.83
SmarterTools SmarterMail less than build 6985 - .NET Deserialization Remote Code Execution
SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch.
CWE-502
Apr 24, 2019
CVE-2019-5420
9.8
CRITICAL
14 PoCs
Analysis
EPSS 0.94
Ruby On Rails DoubleTap Development Mode secret_key_base Vulnerability
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
CWE-330
Mar 27, 2019
CVE-2019-3396
9.8
CRITICAL
KEV
RANSOMWARE
27 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Confluence Widget Connector Macro Velocity Template Injection
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
CWE-22
Mar 25, 2019
CVE-2019-13372
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Dlink Central Wifimanager < 1.03 - Code Injection
/web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication.
CWE-287
Jul 06, 2019
CVE-2019-5620
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.79
Hitachienergy Microscada Pro Sys600 - Missing Authentication
ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication for Critical Function.
CWE-306
Apr 29, 2020
CVE-2019-5619
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.66
Aasync - Out-of-Bounds Write
AASync.com AASync version 2.2.1.0 suffers from an instance of CWE-121: Stack-based Buffer Overflow.
CWE-121
Apr 29, 2020
CVE-2019-20215
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.90
Dlink Dir-859 Firmware - OS Command Injection
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via a urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because HTTP_ST is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters.
CWE-78
Jan 29, 2020
CVE-2019-17621
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.93
Dlink Dir-859 Firmware < 1.05b03 - OS Command Injection
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
CWE-78
Dec 30, 2019
CVE-2019-12780
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.87
Belkin Crock-pot Smart Slow Cooker Wi... - OS Command Injection
The Belkin Wemo Enabled Crock-Pot allows command injection in the Wemo UPnP API via the SmartDevURL argument to the SetSmartDevInfo action. A simple POST request to /upnp/control/basicevent1 can allow an attacker to execute commands without authentication.
CWE-78
Jun 10, 2019
CVE-2019-9760
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.74
FTPGetter Standard <5.97.0.177 - RCE
FTPGetter Standard v.5.97.0.177 allows remote code execution when a user initiates an FTP connection to an attacker-controlled machine that sends crafted responses. Long responses can also crash the FTP client with memory corruption.
CWE-787
Mar 14, 2019