Critical Vulnerabilities with Public Exploits
Updated 6h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,103 results
Clear all
CVE-2019-17124
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.24
Kramerav Viaware - Incorrect Default Permissions
Kramer VIAware 2.5.0719.1034 has Incorrect Access Control.
CWE-276
Oct 09, 2019
CVE-2019-20933
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
InfluxDB <1.7.6 - Auth Bypass
InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
CWE-287
Nov 19, 2020
CVE-2019-2205
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
Android -<8.0, 8.1, 9, 10 - Memory Corruption
In ProxyResolverV8::SetPacScript of proxy_resolver_v8.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139806216
CWE-416
Nov 13, 2019
CVE-2019-6339
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.76
Drupal < 7.62 - Improper Input Validation
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
CWE-20
Jan 22, 2019
CVE-2019-17195
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.06
Connect2id Nimbus Jose+jwt < 7.9 - Improper Exception Handling
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
CWE-755
Oct 15, 2019
CVE-2019-9791
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.38
Thunderbird <60.6-Firefox <66 - Memory Corruption
The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
CWE-843
Apr 26, 2019
CVE-2019-15224
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Rest-client < 1.6.13 - Code Injection
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.
CWE-94
Aug 19, 2019
CVE-2019-13025
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.11
Compal Ch7465lg Firmware - OS Command Injection
Compal CH7465LG CH7465LG-NCIP-6.12.18.24-5p8-NOSH devices have Incorrect Access Control because of Improper Input Validation. The attacker can send a maliciously modified POST (HTTP) request containing shell commands, which will be executed on the device, to an backend API endpoint of the cable modem.
CWE-78
Oct 02, 2019
CVE-2019-19208
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.39
Codiad Web IDE <2.8.4 - Code Injection
Codiad Web IDE through 2.8.4 allows PHP Code injection.
CWE-94
Mar 16, 2020
CVE-2019-7489
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.21
SonicWall Email Security <10.0.2 - RCE
A vulnerability in SonicWall Email Security appliance allow an unauthenticated user to perform remote code execution. This vulnerability affected Email Security Appliance version 10.0.2 and earlier.
CWE-285
Dec 23, 2019
CVE-2019-9184
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.20
J2store < 3.3.7 - SQL Injection
SQL injection vulnerability in the J2Store plugin 3.x before 3.3.7 for Joomla! allows remote attackers to execute arbitrary SQL commands via the product_option[] parameter.
CWE-89
Feb 26, 2019
CVE-2019-17638
9.4
CRITICAL
1 PoC
Analysis
EPSS 0.31
Eclipse Jetty <9.4.29 - Use After Free
In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with other data. Thread1 then proceeds to write the buffer that now contains different data. This results in client1, which issued request1 seeing data from another request or response which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). If the Jetty version cannot be upgraded, the vulnerability can be significantly reduced by configuring a responseHeaderSize significantly larger than the requestHeaderSize (12KB responseHeaderSize and 8KB requestHeaderSize).
CWE-675
Jul 09, 2020
CVE-2019-7482
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.65
SonicWall SMA100 <9.0.0.3 - Buffer Overflow
Stack-based buffer overflow in SonicWall SMA100 allows an unauthenticated user to execute arbitrary code in function libSys.so. This vulnerability impacted SMA100 version 9.0.0.3 and earlier.
CWE-121
Dec 19, 2019
CVE-2019-17137
9.4
CRITICAL
1 PoC
Analysis
EPSS 0.00
NETGEAR AC1200 R6220 Firmware <1.1.0.86 - Auth Bypass
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 R6220 Firmware version 1.1.0.86 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-8616.
CWE-626
Feb 10, 2020
CVE-2019-5454
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Nextcloud - SQL Injection
SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account.
CWE-89
Jul 30, 2019
CVE-2019-17041
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Rsyslog - Out-of-Bounds Write
An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
CWE-787
Oct 07, 2019
CVE-2019-14450
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.47
Repetier-Server <0.91 - Path Traversal
A directory traversal vulnerability was discovered in RepetierServer.exe in Repetier-Server 0.8 through 0.91 that allows for the creation of a user controlled XML file at an unintended location. When this is combined with CVE-2019-14451, an attacker can upload an "external command" configuration as a printer configuration, and achieve remote code execution. After exploitation, loading of the external command configuration is dependent on a system reboot or service restart.
CWE-22
Oct 28, 2019
CVE-2019-8979
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
Kohana < 3.3.6 - SQL Injection
Kohana through 3.3.6 has SQL Injection when the order_by() parameter can be controlled.
CWE-89
Feb 21, 2019
CVE-2019-12815
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.77
Proftpd < 1.3.5b - Improper Exception Handling
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
CWE-755
Jul 19, 2019
CVE-2019-16374
9.8
CRITICAL
1 PoC
EPSS 0.01
Pega Platform 8.2.1 - Command Injection
Pega Platform 8.2.1 allows LDAP injection because a username can contain a * character and can be of unlimited length. An attacker can specify four characters of a username, followed by the * character, to bypass access control.
Aug 13, 2020