Vulnerabilities Exploited in the Wild with Public PoC
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2020-35391
9.6
CRITICAL
EXPLOITED
4 PoCs
Analysis
EPSS 0.47
Tenda N300 F3 12.01.01.48 - Info Disclosure
Tenda N300 F3 12.01.01.48 devices allow remote attackers to obtain sensitive information (possibly including an http_passwd line) via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg, a related issue to CVE-2017-14942. NOTE: the vulnerability report may suggest that either a ? character must be placed after the RouterCfm.cfg filename, or that the HTTP request headers must be unusual, but it is not known why these are relevant to the device's HTTP response behavior.
CWE-425
Jan 01, 2021
CVE-2020-14644
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jul 15, 2020
CVE-2020-4450
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.72
IBM Websphere Application Server < 8.5.5.18 - Insecure Deserialization
IBM WebSphere Application Server 8.5 and 9.0 traditional could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects. IBM X-Force ID: 181231.
CWE-502
Jun 05, 2020
CVE-2020-0618
8.8
HIGH
KEV
RANSOMWARE
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Microsoft Sql Server - Insecure Deserialization
A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'.
CWE-502
Feb 11, 2020
CVE-2020-25540
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Thinkadmin - Path Traversal
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
CWE-22
Sep 14, 2020
CVE-2020-13965
6.1
MEDIUM
KEV
1 PoC
Analysis
EPSS 0.72
Roundcube Webmail < 1.3.12 - Basic XSS
An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.
CWE-80
Jun 09, 2020
CVE-2020-17519
7.5
HIGH
KEV
16 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Flink JobManager Traversal
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
CWE-552
Jan 05, 2021
CVE-2020-9480
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Apache Spark < 2.4.5 - Missing Authentication
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
CWE-306
Jun 23, 2020
CVE-2020-9802
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.41
Apple Icloud < 7.19 - Denial of Service
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
Jun 09, 2020
CVE-2020-11530
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Idangero Chop Slider - SQL Injection
A blind SQL injection vulnerability is present in Chop Slider 3, a WordPress plugin. The vulnerability is introduced in the id GET parameter supplied to get_script/index.php, and allows an attacker to execute arbitrary SQL queries in the context of the WP database user.
CWE-89
May 08, 2020
CVE-2020-12124
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Wavlink Wn530h4 Firmware - OS Command Injection
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
CWE-78
Oct 02, 2020
CVE-2020-13379
8.2
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Grafana 3.0.1-7.0.1 - SSRF
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
CWE-918
Jun 03, 2020
CVE-2020-15916
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.04
Tenda Ac15 Firmware - OS Command Injection
goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.
CWE-78
Jul 23, 2020
CVE-2020-6308
5.3
MEDIUM
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.82
SAP BusinessObjects Web Services - Info Disclosure
SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability.
CWE-918
Oct 20, 2020
CVE-2020-35713
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Linksys Re6500 Firmware < 1.0.012.001 - OS Command Injection
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
CWE-78
Dec 26, 2020
CVE-2020-10770
5.3
MEDIUM
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Keycloak <13.0.0 - SSRF
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
CWE-918
Dec 15, 2020
CVE-2020-17505
8.8
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Artica proxy 4.30.000000 Auth Bypass service-cmds-peform Command Injection
Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform.
CWE-78
Aug 12, 2020
CVE-2020-4463
8.2
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.86
IBM Maximo Asset Management - XXE
IBM Maximo Asset Management 7.6.0.1 and 7.6.0.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181484.
CWE-611
Jul 29, 2020
CVE-2020-11798
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.78
Mitel Micollab Audio, Web & Video Conferencing - Path Traversal
A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.
CWE-22
Jun 10, 2020
CVE-2020-35476
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
OpenTSDB 2.4.0 unauthenticated command injection
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
CWE-78
Dec 16, 2020