Critical Vulnerabilities with Public Exploits

Updated 33m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
4,103 results Clear all
CVE-2018-25142 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
NovaRad NovaPACS Diagnostics Viewer <8.5.19.75 - XXE Injection
NovaRad NovaPACS Diagnostics Viewer 8.5.19.75 contains an unauthenticated XML External Entity (XXE) injection vulnerability in XML preference import settings. Attackers can craft malicious XML files with DTD parameter entities to retrieve arbitrary system files through an out-of-band channel attack.
CWE-611 Dec 24, 2025
CVE-2018-16709 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Fuji Xerox Devices - Info Disclosure
Fuji Xerox DocuCentre-V 3065, ApeosPort-VI C3371, ApeosPort-V C4475, ApeosPort-V C3375, DocuCentre-VI C2271, ApeosPort-V C5576, DocuCentre-IV C2263, DocuCentre-V C2263, and ApeosPort-V 5070 devices allow remote attackers to read or write to files via crafted PJL commands.
Sep 07, 2018
CVE-2018-17110 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Simple POS 4.0.24 - SQL Injection
Simple POS 4.0.24 allows SQL Injection via a products/get_products/ columns[0][search][value] parameter in the management panel, as demonstrated by products/get_products/1.
CWE-89 Sep 17, 2018
CVE-2018-15839 9.8 CRITICAL 1 PoC Analysis EPSS 0.69
Dlink Dir-615 Firmware - Memory Corruption
D-Link DIR-615 devices have a buffer overflow via a long Authorization HTTP header.
CWE-119 Aug 28, 2018
CVE-2018-15727 9.8 CRITICAL 1 PoC Analysis EPSS 0.80
Grafana < 2.1.2 - Authentication Bypass
Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
CWE-287 Aug 29, 2018
CVE-2018-12031 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.75
Eaton Intelligent Power Manager <1.6 - Path Traversal
Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
CWE-22 Jun 07, 2018
CVE-2018-16159 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.33
Codemenschen Gift Vouchers < 2.0.1 - SQL Injection
The Gift Vouchers plugin through 2.0.1 for WordPress allows SQL Injection via the template_id parameter in a wp-admin/admin-ajax.php wpgv_doajax_front_template request.
CWE-89 Aug 30, 2018
CVE-2018-15534 9.8 CRITICAL 1 PoC Analysis EPSS 0.18
Geutebrueck RE Porter 16 Firmware - Information Disclosure
Geutebrueck re_porter 16 before 7.8.974.20 has a possibility of unauthenticated access to sensitive information including usernames and hashes via a direct request for /statistics/gscsetup.xml on TCP port 12003.
CWE-200 Aug 21, 2018
CVE-2018-11510 9.8 CRITICAL EXPLOITED 3 PoCs Analysis EPSS 0.89
Asustor Adm < 3.1.2.rhg1 - OS Command Injection
The ASUSTOR ADM 3.1.0.RFQ3 NAS portal suffers from an unauthenticated remote code execution vulnerability in the portal/apis/aggrecate_js.cgi file by embedding OS commands in the 'script' parameter.
CWE-78 Jun 28, 2018
CVE-2018-11511 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.20
Asustor Data Master - SQL Injection
The tree list functionality in the photo gallery application in ASUSTOR ADM 3.1.0.RFQ3 has a SQL injection vulnerability that affects the 'album_id' or 'scope' parameter via a photo-gallery/api/album/tree_lists/ URI.
CWE-89 Aug 16, 2018
CVE-2018-11509 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
Asustor Data Master - Hard-coded Credentials
ASUSTOR ADM 3.1.0.RFQ3 uses the same default root:admin username and password as it does for the NAS itself for applications that are installed from the online repository. This may allow an attacker to login and upload a webshell.
CWE-798 Aug 16, 2018
CVE-2018-12584 9.8 CRITICAL 1 PoC Analysis EPSS 0.25
reSIProcate <1.10.2 - Buffer Overflow
The ConnectionBase::preparseNewBytes function in resip/stack/ConnectionBase.cxx in reSIProcate through 1.10.2 allows remote attackers to cause a denial of service (buffer overflow) or possibly execute arbitrary code when TLS communication is enabled.
CWE-120 Jul 16, 2018
CVE-2018-13417 9.8 CRITICAL 1 PoC Analysis EPSS 0.47
Vuze Bittorrent Client - XXE
In Vuze Bittorrent Client 5.7.6.0, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Remote, unauthenticated attackers can use this vulnerability to: (1) Access arbitrary files from the filesystem with the same permission as the user account running Vuze, (2) Initiate SMB connections to capture a NetNTLM challenge/response and crack to cleartext password, or (3) Initiate SMB connections to relay a NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.
CWE-611 Aug 13, 2018
CVE-2018-13415 9.8 CRITICAL 1 PoC Analysis EPSS 0.32
Plex Media Server - XXE
In Plex Media Server 1.13.2.5154, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Remote, unauthenticated attackers can use this vulnerability to: (1) Access arbitrary files from the filesystem with the same permission as the user account running Plex, (2) Initiate SMB connections to capture a NetNTLM challenge/response and crack to cleartext password, or (3) Initiate SMB connections to relay a NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.
CWE-611 Aug 13, 2018
CVE-2018-13416 9.8 CRITICAL 1 PoC Analysis EPSS 0.56
Spirton Universal Media Server - XXE
In Universal Media Server (UMS) 7.1.0, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Remote, unauthenticated attackers can use this vulnerability to: (1) Access arbitrary files from the filesystem with the same permission as the user account running UMS, (2) Initiate SMB connections to capture a NetNTLM challenge/response and crack to cleartext password, or (3) Initiate SMB connections to relay a NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.
CWE-611 Aug 03, 2018
CVE-2018-8096 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Datalust Seq <4.2.605 - Auth Bypass
Datalust Seq before 4.2.605 is vulnerable to Authentication Bypass (with the attacker obtaining admin access) via '"Name":"isauthenticationenabled","Value":false' in an api/settings/setting-isauthenticationenabled PUT request.
CWE-287 Mar 14, 2018
CVE-2018-14728 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.91
Responsive FileManager 9.13.1 - SSRF
upload.php in Responsive FileManager 9.13.1 allows SSRF via the url parameter.
CWE-918 Aug 03, 2018
CVE-2018-14417 9.8 CRITICAL 1 PoC Analysis EPSS 0.71
SoftNAS Cloud <4.0.3 - Command Injection
A command injection vulnerability was found in the web administration console in SoftNAS Cloud before 4.0.3. In particular, the snserv script did not sanitize the 'recentVersion' parameter from the snserv endpoint, allowing an unauthenticated attacker to execute arbitrary commands with root permissions.
CWE-78 Aug 04, 2018
CVE-2018-14328 9.8 CRITICAL 1 PoC Analysis EPSS 0.17
Brynamics Online Trade - Info Disclosure
Brynamics "Online Trade - Online trading and cryptocurrency investment system" allows remote attackers to obtain sensitive information via a direct request for /dashboard/addplan, /dashboard/paywithcard/charge, /dashboard/withdrawal, or /privacy&terms, as demonstrated by reading database username, database password, database_name, and IP address fields, related to CVE-2018-12908.
CWE-200 Jul 23, 2018
CVE-2018-13859 9.8 CRITICAL 1 PoC Analysis EPSS 0.58
MusicCenter / Trivum Multiroom Setup Tool V8.76-9.34 - Auth Bypass
MusicCenter / Trivum Multiroom Setup Tool V8.76 - SNR 8604.26 - C4 Professional before V9.34 build 13381 - 12.07.18, allow unauthorized remote attackers to reset the authentication via the "/xml/system/setAttribute.xml" URL, using the GET request "?id=0&attr=protectAccess&newValue=0" (a successful attack will allow attackers to login without authorization).
Jul 17, 2018