Critical Vulnerabilities with Public Exploits
Updated 30m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,103 results
Clear all
CVE-2019-14271
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.73
Docker 19.03.x <19.03.1 - Code Injection
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
CWE-665
Jul 29, 2019
CVE-2019-14678
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.01
SAS XML Mapper 9.45 - SSRF
SAS XML Mapper 9.45 has an XML External Entity (XXE) vulnerability that can be leveraged by malicious attackers in multiple ways. Examples are Local File Reading, Out Of Band File Exfiltration, Server Side Request Forgery, and/or Potential Denial of Service attacks. This vulnerability also affects the XMLV2 LIBNAME engine when the AUTOMAP option is used.
CWE-611
Nov 14, 2019
CVE-2019-17382
9.1
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Zabbix < 4.4 - IDOR
An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
CWE-639
Oct 09, 2019
CVE-2019-12150
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.01
Karamasoft UltimateEditor 1 - Info Disclosure
Karamasoft UltimateEditor 1 does not ensure that an uploaded file is an image or document (neither file types nor extensions are restricted). The attacker must use the Attach icon to perform an upload. An uploaded file is accessible under the UltimateEditorInclude/UserFiles/ URI.
CWE-434
May 24, 2019
CVE-2019-1010268
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.13
Ladon <0.6.1 - XXE
Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.
CWE-611
Jul 18, 2019
CVE-2019-14234
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.19
Django <1.11.23,2.1.11,2.2.4 - SQL Injection
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
CWE-89
Aug 09, 2019
CVE-2019-0604
9.8
CRITICAL
KEV
RANSOMWARE
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Microsoft SharePoint - RCE
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594.
CWE-20
Mar 05, 2019
CVE-2019-16452
9.8
CRITICAL
1 PoC
EPSS 0.06
Adobe Acrobat and Reader <2019.021.20056 - Use After Free
Adobe Acrobat and Reader versions , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CWE-416
Dec 19, 2019
CVE-2019-15896
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
LifterLMS <3.34.5 - Privilege Escalation
An issue was discovered in the LifterLMS plugin through 3.34.5 for WordPress. The upload_import function in the class.llms.admin.import.php script is prone to an unauthenticated options import vulnerability that could lead to privilege escalation (administrator account creation), website redirection, and stored XSS.
CWE-306
Sep 10, 2019
CVE-2019-13292
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.11
Weberp - SQL Injection
A SQL Injection issue was discovered in webERP 4.15. Payments.php accepts payment data in base64 format. After this is decoded, it is deserialized. Then, this deserialized data goes directly into a SQL query, with no sanitizing checks.
CWE-89
Jul 04, 2019
CVE-2019-17571
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.37
Apache Log4j < 1.2.17 - Insecure Deserialization
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
CWE-502
Dec 20, 2019
CVE-2019-8341
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.25
Pocoo Jinja2 - Code Injection
An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing
CWE-94
Feb 15, 2019
CVE-2019-18370
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.64
Millet Router 3G Firmware < 2.28.23 - OS Command Injection
An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The backup file is in tar.gz format. After uploading, the application uses the tar zxf command to decompress, so one can control the contents of the files in the decompressed directory. In addition, the application's sh script for testing upload and download speeds reads a URL list from /tmp/speedtest_urls.xml, and there is a command injection vulnerability, as demonstrated by api/xqnetdetect/netspeed.
CWE-78
Oct 23, 2019
CVE-2019-5544
9.8
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Vmware Horizon Daas < 9.0.0.0 - Out-of-Bounds Write
OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
CWE-787
Dec 06, 2019
CVE-2019-16724
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.86
File Sharing Wizard 1.5.0 - Buffer Overflow
File Sharing Wizard 1.5.0 allows a remote attacker to obtain arbitrary code execution by exploiting a Structured Exception Handler (SEH) based buffer overflow in an HTTP POST parameter, a similar issue to CVE-2010-2330 and CVE-2010-2331.
CWE-120
Sep 24, 2019
CVE-2019-15605
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.32
Nodejs Node.js < 10.19.0 - HTTP Request Smuggling
HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
CWE-444
Feb 07, 2020
CVE-2019-17564
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Dubbo < 2.5.10 - Insecure Deserialization
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
CWE-502
Apr 01, 2020
CVE-2019-8985
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.72
Netis-systems Wf2411 Firmware - Out-of-Bounds Write
On Netis WF2411 with firmware 2.1.36123 and other Netis WF2xxx devices (possibly WF2411 through WF2880), there is a stack-based buffer overflow that does not require authentication. This can cause denial of service (device restart) or remote code execution. This vulnerability can be triggered by a GET request with a long HTTP "Authorization: Basic" header that is mishandled by user_auth->user_ok in /bin/boa.
CWE-306
Feb 21, 2019
CVE-2019-18655
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.43
File Sharing Wizard 1.5.0 build 2008 - Buffer Overflow
File Sharing Wizard version 1.5.0 build 2008 is affected by a Structured Exception Handler based buffer overflow vulnerability. An unauthenticated attacker is able to perform remote command execution and obtain a command shell by sending a HTTP GET request including the malicious payload in the URL. A similar issue to CVE-2019-17415, CVE-2019-16724, and CVE-2010-2331.
CWE-787
Nov 12, 2019
CVE-2019-19844
9.8
CRITICAL
5 PoCs
Analysis
EPSS 0.14
Django < 1.11.27 - Password Reset Weakness
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
CWE-640
Dec 18, 2019