Critical Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2013-7052
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.45
Dlink Dir-100 Firmware - Insufficiently Protected Credentials
D-Link DIR-100 4.03B07: security bypass via an error in the cliget.cgi script
CWE-522
Feb 04, 2020
CVE-2013-2681
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.43
Cisco Linksys E4200 <1.0.05 Build 7 - Auth Bypass
Cisco Linksys E4200 1.0.05 Build 7 devices contain a Security Bypass Vulnerability which could allow remote attackers to gain unauthorized access.
CWE-287
Feb 05, 2020
CVE-2013-10069
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.72
D-Link DIR-600 DIR-300 - Command Injection
The web interface of multiple D-Link routers, including DIR-600 rev B (≤2.14b01) and DIR-300 rev B (≤2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.
CWE-78
Aug 05, 2025
CVE-2013-2010
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.84
Automattic WP Super Cache < 1.2 - Injection
WordPress W3 Total Cache Plugin 0.9.2.8 has a Remote PHP Code Execution Vulnerability
CWE-74
Feb 12, 2020
CVE-2013-10051
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.76
InstantCMS <1.6 - RCE
A remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of eval() within the search view handler. Specifically, user-supplied input passed via the look parameter is concatenated into a PHP expression and executed without proper sanitation. A remote attacker can exploit this flaw by sending a crafted HTTP GET request with a base64-encoded payload in the Cmd header, resulting in arbitrary PHP code execution within the context of the web server.
CWE-95
Aug 01, 2025
CVE-2013-10040
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.64
ClipBucket <2.6 - RCE
ClipBucket version 2.6 and earlier contains a critical vulnerability in the ofc_upload_image.php script located at /admin_area/charts/ofc-library/. This endpoint allows unauthenticated users to upload arbitrary files, including executable PHP scripts. Once uploaded, the attacker can access the file via a predictable path and trigger remote code execution.
CWE-434
Jul 31, 2025
CVE-2013-4211
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.88
Openx - Code Injection
A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code
CWE-94
Feb 14, 2020
CVE-2013-1359
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.89
Sonicwall Analyzer - Authentication Bypass
An Authentication Bypass Vulnerability exists in DELL SonicWALL Analyzer 7.0, Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0; Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, 5.1, and 6.0 via the skipSessionCheck parameter to the UMA interface (/appliance/), which could let a remote malicious user obtain access to the root account.
CWE-287
Feb 11, 2020
CVE-2013-0803
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.84
PolarBear CMS 2.5 - RCE
A PHP File Upload Vulnerability exists in PolarBear CMS 2.5 via upload.php, which could let a malicious user execute arbitrary code.
CWE-434
Feb 11, 2020
CVE-2013-0632
9.8
CRITICAL
KEV
4 PoCs
Analysis
EPSS 0.93
Adobe ColdFusion <10 - Auth Bypass
administrator.cfc in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code by logging in to the RDS component using the default empty password and leveraging this session to access the administrative web interface, as exploited in the wild in January 2013.
CWE-276
Jan 17, 2013
CVE-2013-2465
9.8
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.93
Java storeImageArray() Invalid Array Indexing Vulnerability
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
CWE-693
Jun 18, 2013
CVE-2013-0422
9.8
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.94
Oracle Jdk - Improper Access Control
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
CWE-284
Jan 10, 2013
CVE-2013-3346
9.8
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.90
Adobe Acrobat < 9.5.5 - Out-of-Bounds Write
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
CWE-787
Aug 30, 2013
CVE-2013-10042
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.60
freeFTPd <1.0.10 - Buffer Overflow
A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled.
CWE-121
Jul 31, 2025
CVE-2013-10048
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.60
D-Link DIR-300 rev B & DIR-600 <2.13/2.14b01 - Command Injection
An OS command injection vulnerability exists in various legacy D-Link routers—including DIR-300 rev B and DIR-600 (firmware ≤ 2.13 and ≤ 2.14b01, respectively)—due to improper input handling in the unauthenticated command.php endpoint. By sending specially crafted POST requests, a remote attacker can execute arbitrary shell commands with root privileges, allowing full takeover of the device. This includes launching services such as Telnet, exfiltrating credentials, modifying system configuration, and disrupting availability. The flaw stems from the lack of authentication and inadequate sanitation of the cmd parameter.
CWE-78
Aug 01, 2025
CVE-2013-5743
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.78
Zabbix < 1.8.17 - SQL Injection
Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.
CWE-89
Dec 11, 2019
CVE-2013-7285
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.15
Xstream API <1.4.6, 1.4.10 - RCE
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
CWE-78
May 15, 2019
CVE-2013-2729
9.8
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.90
Adobe Reader/Acrobat <9.5.5, <10.1.7, <11.0.03 - RCE
Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.
CWE-190
May 16, 2013
CVE-2013-7055
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.52
Dlink Dir-100 Firmware - Insufficiently Protected Credentials
D-Link DIR-100 4.03B07 has PPTP and poe information disclosure
CWE-522
Feb 04, 2020
CVE-2013-7137
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.10
Burden <1.8.1 - Auth Bypass
The "remember me" functionality in login.php in Burden before 1.8.1 allows remote attackers to bypass authentication and gain privileges by setting the burden_user_rememberme cookie to 1.
CWE-287
Jan 26, 2014