Critical Vulnerabilities with Public Exploits
Updated 16m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,104 results
Clear all
CVE-2019-5413
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.02
morgan <1.9.1 - Command Injection
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
CWE-94
Mar 21, 2019
CVE-2019-25024
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.51
OpenRepeater <2.2 - Command Injection
OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.
CWE-78
Feb 19, 2021
CVE-2019-16693
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.16
phpIPAM 1.4 - SQL Injection
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/order.php table parameter when action=add is used.
CWE-89
Sep 22, 2019
CVE-2019-17640
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.02
Eclipse Vert.x < 3.9.4 - Path Traversal
In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0.milestone1, 4.0.0.milestone2, 4.0.0.milestone3, 4.0.0.milestone4, 4.0.0.milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory.
CWE-22
Oct 15, 2020
CVE-2019-1010298
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.05
Linaro/OP-TEE OP-TEE <3.4.0 - Buffer Overflow
Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Buffer Overflow. The impact is: Code execution in the context of TEE core (kernel). The component is: optee_os. The fixed version is: 3.4.0 and later.
CWE-190
Jul 15, 2019
CVE-2019-7139
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.60
Magento <2.1.18-2.3.2 - SQL Injection
An unauthenticated user can execute SQL statements that allow arbitrary read access to the underlying database, which causes sensitive data leakage. This issue is fixed in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2.
CWE-89
Apr 10, 2019
CVE-2019-16891
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.80
Liferay Portal CE 6.2.5 - Code Injection
Liferay Portal CE 6.2.5 allows remote command execution because of deserialization of a JSON payload.
CWE-502
Oct 04, 2019
CVE-2019-7238
9.8
CRITICAL
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Sonatype Nexus Repository Manager <3.15.0 - Privilege Escalation
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
Mar 21, 2019
CVE-2019-19245
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.21
NAPC Xinet Elegant 6.1.655 - SQL Injection
NAPC Xinet Elegant 6 Asset Library 6.1.655 allows Pre-Authentication SQL Injection via the /elegant6/login LoginForm[username] field when double quotes are used.
CWE-89
Dec 02, 2019
CVE-2019-12409
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.83
Apache Solr < 8.3.0 - Unrestricted File Upload
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
CWE-434
Nov 18, 2019
CVE-2019-14222
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Alfresco Community Edition <=6.0 - Auth Bypass
An issue was discovered in Alfresco Community Edition versions 6.0 and lower. An unauthenticated, remote attacker could authenticate to Alfresco's Solr Web Admin Interface. The vulnerability is due to the presence of a default private key that is present in all default installations. An attacker could exploit this vulnerability by using the extracted private key and bundling it into a PKCS12. A successful exploit could allow the attacker to gain information about the target system (e.g., OS type, system file locations, Java version, Solr version, etc.) as well as the ability to launch further attacks by leveraging the access to Alfresco's Solr Web Admin Interface.
CWE-1188
Sep 05, 2019
CVE-2019-11395
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.13
MailCarrier 2.51 - RCE
A buffer overflow in MailCarrier 2.51 allows remote attackers to execute arbitrary code via a long string, as demonstrated by SMTP RCPT TO, POP3 USER, POP3 LIST, POP3 TOP, or POP3 RETR.
CWE-787
Apr 22, 2019
CVE-2019-1003030
9.9
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.93
Jenkins Pipeline: Groovy Plugin <2.63 - RCE
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
CWE-693
Mar 08, 2019
CVE-2019-12102
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Kentico 11-12 - Info Disclosure
Kentico 11 through 12 lets attackers upload and explore files without authentication via the cmsmodules/medialibrary/formcontrols/liveselectors/insertimageormedia/tabs_media.aspx URI. NOTE: The vendor disputes the report because the researcher did not configure the media library permissions correctly. The vendor states that by default all users can read/modify/upload files, and it’s up to the administrator to decide who should have access to the media library and set the permissions accordingly. See the vendor documentation in the references for more information
CWE-732
May 22, 2019
CVE-2019-5029
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.85
Exhibitor Web UI <1.7.1 - Command Injection
An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
CWE-78
Nov 13, 2019
CVE-2019-1010174
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
CImg Library <2.3.3 - Command Injection
CImg The CImg Library v.2.3.3 and earlier is affected by: command injection. The impact is: RCE. The component is: load_network() function. The attack vector is: Loading an image from a user-controllable url can lead to command injection, because no string sanitization is done on the url. The fixed version is: v.2.3.4.
CWE-77
Jul 25, 2019
CVE-2019-19842
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
Ruckuswireless Unleashed < 200.7.10.202.94 - OS Command Injection
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=spectra-analysis to admin/_cmdstat.jsp via the mac attribute.
CWE-78
Jan 22, 2020
CVE-2019-19919
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
Handlebars.js < 5.19.0 - Prototype Pollution
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads.
CWE-1321
Dec 20, 2019
CVE-2019-16746
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Linux kernel <5.2.17 - Buffer Overflow
An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
CWE-120
Sep 24, 2019
CVE-2019-13990
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.17
Terracotta Quartz Scheduler <2.3.0 - SSRF
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
CWE-611
Jul 26, 2019