Critical Vulnerabilities with Public Exploits

Updated 46m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,101 results Clear all
CVE-2018-5723 9.8 CRITICAL 1 PoC Analysis EPSS 0.38
MASTER IPCAMERA01 <3.3.4.2103 - Info Disclosure
MASTER IPCAMERA01 3.3.4.2103 devices have a hardcoded password of cat1029 for the root account.
CWE-798 Jan 16, 2018
CVE-2018-25120 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.01
D-Link DNS-343 ShareCenter <1.05 - Command Injection
D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses several form parameters directly in a call to a system email utility without proper input validation. An unauthenticated remote attacker can supply crafted form data that injects shell commands, resulting in execution as root on the device. NOTE: The DNS-343 product line has been declared end-of-life.
CWE-78 Oct 29, 2025
CVE-2018-5347 9.8 CRITICAL 1 PoC Analysis EPSS 0.47
Seagate Media Server - Command Injection
Seagate Media Server in Seagate Personal Cloud has unauthenticated command injection in the uploadTelemetry and getLogs functions in views.py because .psp URLs are handled by the fastcgi.server component and shell metacharacters are mishandled.
CWE-78 Jan 12, 2018
CVE-2018-25115 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.01
D-Link DIR-series <1.03 - RCE
Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.
CWE-78 Aug 27, 2025
CVE-2018-5315 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Wachipi WP Events Calendar <1.0 - SQL Injection
The Wachipi WP Events Calendar plugin 1.0 for WordPress has SQL Injection via the event_id parameter to event.php.
CWE-89 Jan 12, 2018
CVE-2018-5262 9.8 CRITICAL 1 PoC Analysis EPSS 0.44
Flexense DiskBoss <8.8.16 - Buffer Overflow
A stack-based buffer overflow in Flexense DiskBoss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account.
CWE-787 Jan 12, 2018
CVE-2018-4331 9.8 CRITICAL 1 PoC Analysis EPSS 0.19
Apple Iphone OS < 12.0 - Memory Corruption
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
CWE-119 Apr 03, 2019
CVE-2018-5211 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
PHP Melody <2.7.1 - SQL Injection
PHP Melody version 2.7.1 suffer from SQL Injection Time-based attack on the page ajax.php with the parameter playlist.
CWE-89 Jan 09, 2018
CVE-2018-4110 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Apple <11.3 - CSRF
An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves the "Web App" component. It allows remote attackers to bypass intended restrictions on cookie persistence.
Apr 03, 2018
CVE-2018-17841 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Scriptzee Flippa Marketplace Clone 1.0 - SQL Injection
SQL injection exists in Scriptzee Flippa Marketplace Clone 1.0 via the site-search sortBy or sortDir parameter.
CWE-89 Jun 19, 2019
CVE-2017-5638 9.8 CRITICAL KEV RANSOMWARE 100 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts < 2.3.32 - Improper Exception Handling
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
CWE-755 Mar 11, 2017
CVE-2017-14980 9.8 CRITICAL 10 PoCs Analysis EPSS 0.75
Flexense Syncbreeze - Memory Corruption
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
CWE-119 Oct 10, 2017
CVE-2017-15220 9.8 CRITICAL 2 PoCs Analysis EPSS 0.12
Flexense VX Search - Memory Corruption
Flexense VX Search Enterprise 10.1.12 is vulnerable to a buffer overflow via an empty POST request to a long URI beginning with a /../ substring. This allows remote attackers to execute arbitrary code.
CWE-119 Oct 11, 2017
CVE-2017-9841 9.8 CRITICAL KEV 21 PoCs Analysis NUCLEI EPSS 0.94
PHPUnit <4.8.28, <5.6.3 - RCE
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
CWE-94 Jun 27, 2017
CVE-2017-20149 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis EPSS 0.06
Mikrotik RouterOS <6.38.5 - Long-term 6.37.5 - Memory Corruption
The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later.
CWE-787 Oct 15, 2022
CVE-2017-18368 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.94
Billion 5200w-t Firmware - OS Command Injection
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.
CWE-78 May 02, 2019
CVE-2017-18362 9.8 CRITICAL KEV RANSOMWARE 1 PoC 1 Writeup NUCLEI EPSS 0.80
Kaseya VSA 2017 ConnectWise ManagedITSync - Remote Code Execution
ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication.
CWE-89 Feb 05, 2019
CVE-2017-1000486 9.8 CRITICAL KEV 10 PoCs Analysis NUCLEI EPSS 0.94
Primefaces Remote Code Execution Exploit
Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
CWE-326 Jan 03, 2018
CVE-2017-15944 9.8 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
Palo Alto Network PAN-OS - Remote Code Execution
Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.
CWE-119 Dec 11, 2017
CVE-2017-11357 9.8 CRITICAL KEV RANSOMWARE 3 PoCs Analysis EPSS 0.94
Telerik UI For Asp.net Ajax < 2020.1.114 - Unrestricted File Upload
Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
CWE-434 Aug 23, 2017