Critical Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2017-12757
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Ambittechnologies Itech B2b Script - SQL Injection
Certain Ambit Technologies Pvt. Ltd products are affected by: SQL Injection. This affects iTech B2B Script 4.42i and Tech Business Networking Script 8.26i and Tech Caregiver Script 2.71i and Tech Classifieds Script 7.41i and Tech Dating Script 3.40i and Tech Freelancer Script 5.27i and Tech Image Sharing Script 4.13i and Tech Job Script 9.27i and Tech Movie Script 7.51i and Tech Multi Vendor Script 6.63i and Tech Social Networking Script 3.08i and Tech Travel Script 9.49. The impact is: Code execution (remote).
CWE-89
May 09, 2019
CVE-2017-12787
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.19
Noviflow Noviware < 400.2.6 - Memory Corruption
A network interface of the novi_process_manager_daemon service, included in the NoviWare software distribution through NW400.2.6 and deployed on NoviSwitch devices, can be inadvertently exposed if an operator attempts to modify ACLs, because of a bug when ACL modifications are applied. This could be leveraged by remote, unauthenticated attackers to gain resultant privileged (root) code execution on the switch, because incoming packet data can contain embedded OS commands, and can also trigger a stack-based buffer overflow.
CWE-119
Aug 22, 2017
CVE-2017-12786
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.29
Noviflow Noviware < 400.2.6 - Memory Corruption
Network interfaces of the cliengine and noviengine services, included in the NoviWare software distribution through NW400.2.6 and deployed on NoviSwitch devices, can be inadvertently exposed if an operator attempts to modify ACLs, because of a bug when ACL modifications are applied. This could be leveraged by remote, unauthenticated attackers to gain resultant privileged (root) code execution on the switch, because there is a stack-based buffer overflow during unserialization of packet data.
CWE-119
Aug 22, 2017
CVE-2017-12785
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.24
Noviflow Noviware < 400.2.6 - Memory Corruption
The novish command-line interface, included in the NoviWare software distribution through NW400.2.6 and deployed on NoviSwitch devices, is prone to a buffer overflow in the "show log cli" command. This could be used by a read-only user (monitor role) to gain privileged (root) code execution on the switch via command injection.
CWE-119
Aug 22, 2017
CVE-2017-11153
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.15
Synology Photo Station < 6.7.2-3429 - Insecure Deserialization
Deserialization vulnerability in synophoto_csPhotoMisc.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to gain administrator privileges via a crafted serialized payload.
CWE-502
Aug 08, 2017
CVE-2017-11151
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.15
Synology Photo Station < 6.7.2-3429 - Authentication Bypass
A vulnerability in synotheme_upload.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to upload arbitrary files without authentication via the logo_upload action.
CWE-287
Aug 08, 2017
CVE-2017-4901
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.14
VMware Workstation/Fusion <12.5.4-8.5.5 - Memory Corruption
The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.
CWE-119
Jun 08, 2017
CVE-2017-11494
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
SOL.Connect ISET-mpp meter <1.2.4.2 - SQL Injection
SQL injection vulnerability in SOL.Connect ISET-mpp meter 1.2.4.2 and earlier allows remote attackers to execute arbitrary SQL commands via the user parameter in a login action.
CWE-89
Aug 02, 2017
CVE-2017-3897
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
McAfee Live Safe <16.0.3, MSS+ <3.11.599.3 - Code Injection
A Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response.
CWE-94
Sep 01, 2017
CVE-2017-20229
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
MAWK 1.3.3-17 Stack-Based Buffer Overflow
MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can craft malicious input that overflows the stack buffer and execute a return-oriented programming chain to spawn a shell with application privileges.
CWE-787
Mar 28, 2026
CVE-2017-11346
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.25
Zohocorp Manageengine Desktop Central - Improper Input Validation
Zoho ManageEngine Desktop Central before build 100092 allows remote attackers to execute arbitrary code via vectors involving the upload of help desk videos.
CWE-20
Jul 17, 2017
CVE-2017-6316
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.88
Citrix NetScaler SD-WAN <v9.1.2.26.561201 - Command Injection
Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID.
Jul 20, 2017
CVE-2017-6182
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.15
Sophos Web Appliance < 4.3.1.1 - OS Command Injection
In Sophos Web Appliance (SWA) before 4.3.1.2, a section of the machine's interface responsible for generating reports was vulnerable to remote command injection via functions, aka NSWA-1304.
CWE-78
Mar 30, 2017
CVE-2017-7175
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.21
NfSen <1.3.8 - Command Injection
NfSen before 1.3.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the customfmt parameter (aka the "Custom output format" field).
CWE-78
Jul 10, 2017
CVE-2017-6972
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.19
AlienVault USM/OSSIM <5.3.7 & NfSen <1.3.8 - Privilege Escalation
AlienVault USM and OSSIM before 5.3.7 and NfSen before 1.3.8 have an error in privilege dropping and unnecessarily execute the NfSen Perl code as root, aka AlienVault ID ENG-104945, a different vulnerability than CVE-2017-6970 and CVE-2017-6971.
CWE-273
Mar 22, 2017
CVE-2017-9834
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
WatuPRO <5.5.3.7 - SQL Injection
SQL injection vulnerability in the WatuPRO plugin before 5.5.3.7 for WordPress allows remote attackers to execute arbitrary SQL commands via the watupro_questions parameter in a watupro_submit action to wp-admin/admin-ajax.php.
CWE-89
Sep 07, 2017
CVE-2017-9811
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.25
Kaspersky Anti-virus For Linux Server < 8.0.3.297 - Improper Input Validation
The kluser is able to interact with the kav4fs-control binary in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). By abusing the quarantine read and write operations, it is possible to elevate the privileges to root.
CWE-20
Jul 17, 2017
CVE-2017-1000375
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.38
NetBSD <7.1 - RCE
NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows attackers to more easily manipulate memory leading to arbitrary code execution. This affects NetBSD 7.1 and possibly earlier versions.
CWE-119
Jun 19, 2017
CVE-2017-3078
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.70
Adobe Flash Player < 25.0.0.171 - Memory Corruption
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.
CWE-119
Jun 20, 2017
CVE-2017-20227
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
JAD 1.5.8e-1kali1 Stack-Based Buffer Overflow
JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying overly long input that exceeds buffer boundaries. Attackers can craft malicious input passed to the jad command to overflow the stack and execute a return-oriented programming chain that spawns a shell.
CWE-787
Mar 28, 2026