Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,103 results Clear all
CVE-2018-14714 9.8 CRITICAL 4 PoCs Analysis EPSS 0.81
ASUS RT-AC3200 <3.0.0.4.382.50010 - Command Injection
System command injection in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to execute system commands via the "load_script" URL parameter.
May 13, 2019
CVE-2018-19323 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis EPSS 0.15
GIGABYTE APP Center <v1.05.21 - Info Disclosure
The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes functionality to read and write Machine Specific Registers (MSRs).
Dec 21, 2018
CVE-2018-1260 9.8 CRITICAL 1 PoC Analysis EPSS 0.50
Pivotal Software Spring Security Oauth < 2.0.14 - Code Injection
Spring Security OAuth, versions 2.3 prior to 2.3.3, 2.2 prior to 2.2.2, 2.1 prior to 2.1.2, 2.0 prior to 2.0.15 and older unsupported versions contains a remote code execution vulnerability. A malicious user or attacker can craft an authorization request to the authorization endpoint that can lead to remote code execution when the resource owner is forwarded to the approval endpoint.
CWE-94 May 11, 2018
CVE-2018-6789 9.8 CRITICAL KEV RANSOMWARE 7 PoCs Analysis EPSS 0.86
Exim < 4.90.1 - Buffer Overflow
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
CWE-120 Feb 08, 2018
CVE-2018-9035 9.6 CRITICAL 2 PoCs Analysis EPSS 0.08
Contact Form 7 to Database Ext <2.10.32 - Code Injection
CSV Injection vulnerability in ExportToCsvUtf8.php of the Contact Form 7 to Database Extension plugin 2.10.32 for WordPress allows remote attackers to inject spreadsheet formulas into CSV files via the contact form.
CWE-1236 Apr 04, 2018
CVE-2018-8097 9.8 CRITICAL 2 PoCs Analysis EPSS 0.19
Eve <0.7.5 - Code Injection
io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter.
CWE-94 Mar 14, 2018
CVE-2018-17246 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Kibana <6.4.3, 5.6.13 - Code Injection
Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
CWE-829 Dec 20, 2018
CVE-2018-13382 9.1 CRITICAL KEV RANSOMWARE 4 PoCs Analysis EPSS 0.85
Fortinet Fortiproxy < 1.2.9 - Incorrect Authorization
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
CWE-863 Jun 04, 2019
CVE-2018-7750 9.8 CRITICAL 3 PoCs Analysis EPSS 0.14
Paramiko <2.4.1 - RCE
transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
CWE-287 Mar 13, 2018
CVE-2018-19410 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.93
PRTG Network Monitor <18.2.40.1683 - Local File Inclusion
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
Nov 21, 2018
CVE-2018-7081 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Arubanetworks Arubaos < 6.4.4.21 - Improper Input Validation
A remote code execution vulnerability is present in network-listening components in some versions of ArubaOS. An attacker with the ability to transmit specially-crafted IP traffic to a mobility controller could exploit this vulnerability and cause a process crash or to execute arbitrary code within the underlying operating system with full system privileges. Such an attack could lead to complete system compromise. The ability to transmit traffic to an IP interface on the mobility controller is required to carry out an attack. The attack leverages the PAPI protocol (UDP port 8211). If the mobility controller is only bridging L2 traffic to an uplink and does not have an IP address that is accessible to the attacker, it cannot be attacked.
CWE-20 Sep 13, 2019
CVE-2018-10024 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
ubiQuoss Switch VP5208A - Info Disclosure
ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).
CWE-522 Apr 11, 2018
CVE-2018-5767 9.8 CRITICAL 3 PoCs Analysis EPSS 0.67
Tenda AC15 <V15.03.1.16_multi - RCE
An issue was discovered on Tenda AC15 V15.03.1.16_multi devices. A remote, unauthenticated attacker can gain remote code execution on the device with a crafted password parameter for the COOKIE header.
CWE-20 Feb 15, 2018
CVE-2018-20377 9.8 CRITICAL 1 PoC Analysis EPSS 0.37
Orange Livebox 00.96.320S - Info Disclosure
Orange Livebox 00.96.320S devices allow remote attackers to discover Wi-Fi credentials via /get_getnetworkconf.cgi on port 8080, leading to full control if the admin password equals the Wi-Fi password or has the default admin value. This is related to Firmware 01.11.2017-11:43:44, Boot v0.70.03, Modem 5.4.1.10.1.1A, Hardware 02, and Arcadyan ARV7519RW22-A-L T VR9 1.2.
Dec 23, 2018
CVE-2018-1297 9.8 CRITICAL 2 PoCs Analysis EPSS 0.18
Apache Jmeter < 4.0 - Cleartext Transmission
When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
CWE-319 Feb 13, 2018
CVE-2018-7846 9.8 CRITICAL 1 PoC Analysis EPSS 0.43
Modicon - Trust Boundary Violation
A CWE-501: Trust Boundary Violation vulnerability on connection to the Controller exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum and Modicon Premium which could cause unauthorized access by conducting a brute force attack on Modbus protocol to the controller.
CWE-668 May 22, 2019
CVE-2018-7842 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
Modicon - Privilege Escalation
A CWE-290: Authentication Bypass by Spoofing vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause an elevation of privilege by conducting a brute force attack on Modbus parameters sent to the controller.
CWE-290 May 22, 2019
CVE-2018-1000861 9.8 CRITICAL KEV RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.94
Jenkins <2.153 - RCE
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
CWE-502 Dec 10, 2018
CVE-2018-5701 9.8 CRITICAL 2 PoCs Analysis EPSS 0.22
Iolo System Shield - Memory Corruption
In Iolo System Shield AntiVirus and AntiSpyware 5.0.0.136, the amp.sys driver file contains an Arbitrary Write vulnerability due to not validating input values from IOCtl 0x00226003.
CWE-119 Jan 31, 2018
CVE-2018-0171 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.93
Cisco Ios - Out-of-Bounds Write
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.
CWE-20 Mar 28, 2018