Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,101 results Clear all
CVE-2017-12561 9.8 CRITICAL 1 PoC Analysis EPSS 0.39
HP Intelligent Management Center < 7.3 - Remote Code Execution
A remote code execution vulnerability in HPE intelligent Management Center (iMC) PLAT version Plat 7.3 E0504P4 and earlier was found.
CWE-824 Feb 15, 2018
CVE-2017-17736 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.93
Kentico - Installer Privilege Escalation
Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
CWE-425 Mar 23, 2018
CVE-2017-18349 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.89
Fastjson Insecure Deserialization - Remote Code Execution
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
CWE-20 Oct 23, 2018
CVE-2017-11366 9.8 CRITICAL 1 PoC Analysis EPSS 0.34
Codiad < 2.8.3 - OS Command Injection
components/filemanager/class.filemanager.php in Codiad before 2.8.4 is vulnerable to remote command execution because shell commands can be embedded in parameter values, as demonstrated by search_file_type.
CWE-78 Aug 21, 2017
CVE-2017-12943 9.8 CRITICAL 3 PoCs Analysis EPSS 0.82
Dlink Dir-600 B1 Firmware - Path Traversal
D-Link DIR-600 Rev Bx devices with v2.x firmware allow remote attackers to read passwords via a model/__show_info.php?REQUIRE_FILE= absolute path traversal attack, as demonstrated by discovering the admin password.
CWE-22 Aug 18, 2017
CVE-2017-3241 9.0 CRITICAL 3 PoCs Analysis EPSS 0.77
Oracle Jdk - Improper Input Validation
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
CWE-20 Jan 27, 2017
CVE-2017-13266 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Google Android - Memory Corruption
In avrc_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible stack corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69478941.
CWE-119 Apr 04, 2018
CVE-2017-13281 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Google Android - Memory Corruption
In avrc_pars_browsing_cmd of avrc_pars_tg.cc, there is a possible stack buffer overflow due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-71603262.
CWE-119 Apr 04, 2018
CVE-2017-13267 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Google Android - Memory Corruption
In avrc_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible stack corruption due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69479009.
CWE-119 Apr 04, 2018
CVE-2017-0879 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Android <8.0 - Info Disclosure
An information disclosure vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-65025028.
CWE-200 Dec 06, 2017
CVE-2017-7997 9.8 CRITICAL 2 PoCs Analysis EPSS 0.08
Gespage < 7.4.9 - SQL Injection
Multiple SQL injection vulnerabilities in Gespage before 7.4.9 allow remote attackers to execute arbitrary SQL commands via the (1) show_prn parameter to webapp/users/prnow.jsp or show_month parameter to (2) webapp/users/blhistory.jsp or (3) webapp/users/prhistory.jsp.
CWE-89 Jan 08, 2018
CVE-2017-13208 9.8 CRITICAL 1 PoC Analysis EPSS 0.25
Google Android - Memory Corruption
In receive_packet of libnetutils/packet.c, there is a possible out-of-bounds write due to a missing bounds check on the DHCP response. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67474440.
CWE-119 Jan 12, 2018
CVE-2017-6558 9.8 CRITICAL 2 PoCs Analysis EPSS 0.35
Iball Ib-wra150n Firmware - Hard-coded Credentials
iball Baton 150M iB-WRA150N v1 00000001 1.2.6 build 110401 Rel.47776n devices are prone to an authentication bypass vulnerability that allows remote attackers to view and modify administrative router settings by reading the HTML source code of the password.cgi file.
CWE-798 Mar 09, 2017
CVE-2017-16783 9.8 CRITICAL 1 PoC Analysis EPSS 0.10
CMS Made Simple <2.1.6 - SSRF
In CMS Made Simple 2.1.6, there is Server-Side Template Injection via the cntnt01detailtemplate parameter.
CWE-94 Nov 10, 2017
CVE-2017-7376 9.8 CRITICAL 1 PoC Analysis EPSS 0.38
libxml2 - Buffer Overflow
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
CWE-119 Feb 19, 2018
CVE-2017-6640 9.8 CRITICAL 1 PoC Analysis EPSS 0.46
Cisco Prime Data Center Network Manager - Access Control
A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software could allow an unauthenticated, remote attacker to log in to the administrative console of a DCNM server by using an account that has a default, static password. The account could be granted root- or system-level privileges. The vulnerability exists because the affected software has a default user account that has a default, static password. The user account is created automatically when the software is installed. An attacker could exploit this vulnerability by connecting remotely to an affected system and logging in to the affected software by using the credentials for this default user account. A successful exploit could allow the attacker to use this default user account to log in to the affected software and gain access to the administrative console of a DCNM server. This vulnerability affects Cisco Prime Data Center Network Manager (DCNM) Software releases prior to Release 10.2(1) for Microsoft Windows, Linux, and Virtual Appliance platforms. Cisco Bug IDs: CSCvd95346.
CWE-770 Jun 08, 2017
CVE-2017-8809 9.8 CRITICAL 1 PoC Analysis EPSS 0.18
Mediawiki < 1.27.3 - Injection
api.php in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has a Reflected File Download vulnerability.
CWE-74 Nov 15, 2017
CVE-2017-3623 10.0 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.77
Solaris - RCE
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel RPC). For supported versions that are affected see note. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3623 is assigned for "Ebbisland". Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue. CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
Apr 24, 2017
CVE-2017-16943 9.8 CRITICAL 1 PoC Analysis EPSS 0.77
Exim <4.90 - Use After Free
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
CWE-416 Nov 25, 2017
CVE-2017-14948 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Dlink Dir-868l Firmware - Buffer Overflow
Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L 1.08B04 and DIR-895 L/R 1.13b03. The impact is: execute arbitrary code (remote). The component is: htdocs/fileaccess.cgi. The attack vector is: A crafted HTTP request handled by fileacces.cgi could allow an attacker to mount a ROP attack: if the HTTP header field CONTENT_TYPE starts with ''boundary=' followed by more than 256 characters, a buffer overflow would be triggered, potentially causing code execution.
CWE-120 Oct 14, 2019