Critical Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,101 results Clear all
CVE-2017-9769 9.8 CRITICAL 3 PoCs Analysis EPSS 0.78
Razer Synapse <2.20.15.1104 - Privilege Escalation
A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing a handle to be opened to an arbitrary process.
Aug 02, 2017
CVE-2017-6416 9.8 CRITICAL 2 PoCs Analysis EPSS 0.65
Flexense Sysgauge - Memory Corruption
An issue was discovered in SysGauge 1.5.18. A buffer overflow vulnerability in SMTP connection verification leads to arbitrary code execution. The attack vector is a crafted SMTP daemon that sends a long 220 (aka "Service ready") string.
CWE-119 Mar 06, 2017
CVE-2017-18371 9.8 CRITICAL 1 PoC Analysis EPSS 0.73
Billion 5200w-t Firmware - Hard-coded Credentials
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.
CWE-798 May 02, 2019
CVE-2017-1000353 9.8 CRITICAL KEV 7 PoCs Analysis NUCLEI EPSS 0.94
Jenkins <2.56-<2.46.1 LTS - RCE
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.
CWE-502 Jan 29, 2018
CVE-2017-2741 9.8 CRITICAL 4 PoCs Analysis EPSS 0.88
HP PageWide/OfficeJet Pro <1708D - RCE
A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code.
Jan 23, 2018
CVE-2017-18047 9.8 CRITICAL 4 PoCs Analysis EPSS 0.55
Labf Nfsaxe - Memory Corruption
Buffer Overflow in the FTP client in LabF nfsAxe 3.7 allows remote FTP servers to execute arbitrary code via a long reply.
CWE-119 Jan 22, 2018
CVE-2017-17411 9.8 CRITICAL EXPLOITED 3 PoCs Analysis EPSS 0.92
Linksys WVBR0 - RCE
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.
CWE-78 Dec 21, 2017
CVE-2017-15222 9.8 CRITICAL 4 PoCs Analysis EPSS 0.82
Nftp < 2.0 - Buffer Overflow
Buffer Overflow vulnerability in Ayukov NFTPD 2.0 and earlier allows remote attackers to execute arbitrary code.
CWE-120 Oct 24, 2017
CVE-2017-13067 9.8 CRITICAL 1 PoC Analysis EPSS 0.51
Qnap Qts < 4.2.6 - Remote Code Execution
QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.
Sep 14, 2017
CVE-2017-12477 9.8 CRITICAL 3 PoCs Analysis EPSS 0.76
Unitrends UEB bpserverd authentication bypass RCE
It was discovered that the bpserverd proprietary protocol in Unitrends Backup (UB) before 10.0.0, as invoked through xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system.
CWE-287 Aug 07, 2017
CVE-2017-6553 9.8 CRITICAL 2 PoCs Analysis EPSS 0.74
Quest Privilege Manager For Unix < 6.0.0-50 - Memory Corruption
Buffer Overflow in Quest One Identity Privilege Manager for Unix before 6.0.0.061 allows remote attackers to obtain full access to the policy server via an ACT_ALERT_EVENT request that causes memory corruption in the pmmasterd daemon.
CWE-119 Apr 29, 2017
CVE-2017-7269 9.8 CRITICAL KEV 33 PoCs Analysis NUCLEI EPSS 0.94
IIS 6.0 - Buffer Overflow
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
CWE-120 Mar 27, 2017
CVE-2017-6465 9.8 CRITICAL 2 PoCs Analysis EPSS 0.80
Ftpshell Client - Memory Corruption
Remote Code Execution was discovered in FTPShell Client 6.53. By default, the client sends a PWD command to the FTP server it is connecting to; however, it doesn't check the response's length, leading to a buffer overflow situation.
CWE-119 Mar 10, 2017
CVE-2017-18365 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.41
Github < 2.8.7 - Insecure Deserialization
The Management Console in GitHub Enterprise 2.8.x before 2.8.7 has a deserialization issue that allows unauthenticated remote attackers to execute arbitrary code. This occurs because the enterprise session secret is always the same, and can be found in the product's source code. By sending a crafted cookie signed with this secret, one can call Marshal.load with arbitrary data, which is a problem because the Marshal data format allows Ruby objects.
CWE-502 Mar 28, 2019
CVE-2017-17560 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.83
Westerndigital MY Cloud Pr4100 Firmware - Authentication Bypass
An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device's file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root.
CWE-287 Dec 12, 2017
CVE-2017-14706 9.8 CRITICAL 1 PoC Analysis EPSS 0.72
DenyAll WAF <6.4.1 - Info Disclosure
DenyAll WAF before 6.4.1 allows unauthenticated remote attackers to obtain authentication information by making a typeOf=debug request to /webservices/download/index.php, and then reading the iToken field in the reply. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments.
CWE-287 Sep 22, 2017
CVE-2017-14143 9.8 CRITICAL 3 PoCs Analysis EPSS 0.77
Kaltura <13.2.0 - Code Injection
The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and consequently conduct PHP object injection attacks and execute arbitrary PHP code via a crafted userzone cookie.
CWE-798 Sep 19, 2017
CVE-2017-12478 9.8 CRITICAL 4 PoCs Analysis EPSS 0.82
Unitrends UEB http api remote code execution
It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system.
CWE-287 Aug 07, 2017
CVE-2017-1000002 9.8 CRITICAL 1 PoC Analysis EPSS 0.60
ATutor <2.2.1 - Path Traversal
ATutor versions 2.2.1 and earlier are vulnerable to a directory traversal and file extension check bypass in the Course component resulting in code execution. ATutor versions 2.2.1 and earlier are vulnerable to a directory traversal vulnerability in the Course Icon component resulting in information disclosure.
CWE-22 Jul 17, 2017
CVE-2017-6326 10.0 CRITICAL 2 PoCs Analysis EPSS 0.79
Symantec Messaging Gateway < 10.6.3 - Remote Code Execution
The Symantec Messaging Gateway can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process.
Jun 26, 2017