Critical Vulnerabilities with Public Exploits

Updated 16m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,544 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,344 vendors 43,890 researchers
4,104 results Clear all
CVE-2019-5413 9.8 CRITICAL 3 PoCs Analysis EPSS 0.02
morgan <1.9.1 - Command Injection
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
CWE-94 Mar 21, 2019
CVE-2019-25024 9.8 CRITICAL 2 PoCs Analysis EPSS 0.51
OpenRepeater <2.2 - Command Injection
OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.
CWE-78 Feb 19, 2021
CVE-2019-16693 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
phpIPAM 1.4 - SQL Injection
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/order.php table parameter when action=add is used.
CWE-89 Sep 22, 2019
CVE-2019-17640 9.8 CRITICAL 2 PoCs Analysis EPSS 0.02
Eclipse Vert.x < 3.9.4 - Path Traversal
In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0.milestone1, 4.0.0.milestone2, 4.0.0.milestone3, 4.0.0.milestone4, 4.0.0.milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory.
CWE-22 Oct 15, 2020
CVE-2019-1010298 9.8 CRITICAL 1 PoC Analysis EPSS 0.05
Linaro/OP-TEE OP-TEE <3.4.0 - Buffer Overflow
Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Buffer Overflow. The impact is: Code execution in the context of TEE core (kernel). The component is: optee_os. The fixed version is: 3.4.0 and later.
CWE-190 Jul 15, 2019
CVE-2019-7139 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.60
Magento <2.1.18-2.3.2 - SQL Injection
An unauthenticated user can execute SQL statements that allow arbitrary read access to the underlying database, which causes sensitive data leakage. This issue is fixed in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2.
CWE-89 Apr 10, 2019
CVE-2019-16891 9.8 CRITICAL 1 PoC Analysis EPSS 0.80
Liferay Portal CE 6.2.5 - Code Injection
Liferay Portal CE 6.2.5 allows remote command execution because of deserialization of a JSON payload.
CWE-502 Oct 04, 2019
CVE-2019-7238 9.8 CRITICAL KEV 7 PoCs Analysis NUCLEI EPSS 0.94
Sonatype Nexus Repository Manager <3.15.0 - Privilege Escalation
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
Mar 21, 2019
CVE-2019-19245 9.8 CRITICAL 1 PoC Analysis EPSS 0.21
NAPC Xinet Elegant 6.1.655 - SQL Injection
NAPC Xinet Elegant 6 Asset Library 6.1.655 allows Pre-Authentication SQL Injection via the /elegant6/login LoginForm[username] field when double quotes are used.
CWE-89 Dec 02, 2019
CVE-2019-12409 9.8 CRITICAL 2 PoCs Analysis EPSS 0.83
Apache Solr < 8.3.0 - Unrestricted File Upload
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
CWE-434 Nov 18, 2019
CVE-2019-14222 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Alfresco Community Edition <=6.0 - Auth Bypass
An issue was discovered in Alfresco Community Edition versions 6.0 and lower. An unauthenticated, remote attacker could authenticate to Alfresco's Solr Web Admin Interface. The vulnerability is due to the presence of a default private key that is present in all default installations. An attacker could exploit this vulnerability by using the extracted private key and bundling it into a PKCS12. A successful exploit could allow the attacker to gain information about the target system (e.g., OS type, system file locations, Java version, Solr version, etc.) as well as the ability to launch further attacks by leveraging the access to Alfresco's Solr Web Admin Interface.
CWE-1188 Sep 05, 2019
CVE-2019-11395 9.8 CRITICAL 3 PoCs Analysis EPSS 0.13
MailCarrier 2.51 - RCE
A buffer overflow in MailCarrier 2.51 allows remote attackers to execute arbitrary code via a long string, as demonstrated by SMTP RCPT TO, POP3 USER, POP3 LIST, POP3 TOP, or POP3 RETR.
CWE-787 Apr 22, 2019
CVE-2019-1003030 9.9 CRITICAL KEV 2 PoCs Analysis EPSS 0.93
Jenkins Pipeline: Groovy Plugin <2.63 - RCE
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
CWE-693 Mar 08, 2019
CVE-2019-12102 9.1 CRITICAL 2 PoCs Analysis EPSS 0.00
Kentico 11-12 - Info Disclosure
Kentico 11 through 12 lets attackers upload and explore files without authentication via the cmsmodules/medialibrary/formcontrols/liveselectors/insertimageormedia/tabs_media.aspx URI. NOTE: The vendor disputes the report because the researcher did not configure the media library permissions correctly. The vendor states that by default all users can read/modify/upload files, and it’s up to the administrator to decide who should have access to the media library and set the permissions accordingly. See the vendor documentation in the references for more information
CWE-732 May 22, 2019
CVE-2019-5029 9.8 CRITICAL 3 PoCs Analysis EPSS 0.85
Exhibitor Web UI <1.7.1 - Command Injection
An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
CWE-78 Nov 13, 2019
CVE-2019-1010174 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
CImg Library <2.3.3 - Command Injection
CImg The CImg Library v.2.3.3 and earlier is affected by: command injection. The impact is: RCE. The component is: load_network() function. The attack vector is: Loading an image from a user-controllable url can lead to command injection, because no string sanitization is done on the url. The fixed version is: v.2.3.4.
CWE-77 Jul 25, 2019
CVE-2019-19842 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Ruckuswireless Unleashed < 200.7.10.202.94 - OS Command Injection
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=spectra-analysis to admin/_cmdstat.jsp via the mac attribute.
CWE-78 Jan 22, 2020
CVE-2019-19919 9.8 CRITICAL 1 PoC Analysis EPSS 0.18
Handlebars.js < 5.19.0 - Prototype Pollution
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads.
CWE-1321 Dec 20, 2019
CVE-2019-16746 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Linux kernel <5.2.17 - Buffer Overflow
An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
CWE-120 Sep 24, 2019
CVE-2019-13990 9.8 CRITICAL 1 PoC Analysis EPSS 0.17
Terracotta Quartz Scheduler <2.3.0 - SSRF
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
CWE-611 Jul 26, 2019