Vulnerabilities Exploited in the Wild with Public PoC

Updated 21m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
2,391 results Clear all
CVE-2020-13158 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Artica Proxy <4.30.000000 - Path Traversal
Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter.
CWE-22 Jun 22, 2020
CVE-2020-29597 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
IncomCMS 2.0 - File Upload
IncomCMS 2.0 has a modules/uploader/showcase/script.php insecure file upload vulnerability. This vulnerability allows unauthenticated attackers to upload files into the server.
CWE-434 Dec 07, 2020
CVE-2020-15920 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Midasolutions Eframework < 2.9.0 - OS Command Injection
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
CWE-78 Jul 24, 2020
CVE-2020-36112 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.89
Cse Bookstore - SQL Injection
CSE Bookstore version 1.0 is vulnerable to time-based blind, boolean-based blind and OR error-based SQL injection in pubid parameter in bookPerPub.php and in cart.php. A successful exploitation of this vulnerability will lead to an attacker dumping the entire database on which the web application is running.
CWE-89 Jan 04, 2021
CVE-2020-1206 7.5 HIGH EXPLOITED 5 PoCs Analysis EPSS 0.31
Microsoft SMBv3 - Info Disclosure
An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Information Disclosure Vulnerability'.
CWE-908 Jun 09, 2020
CVE-2020-13167 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Netsweeper <6.4.3 - RCE
Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.
CWE-78 May 19, 2020
CVE-2020-17506 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Artica Web Proxy 4.30.00000000 - SQL Injection
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
CWE-89 Aug 12, 2020
CVE-2020-17518 7.5 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Apache Flink <1.11.3-1.12.0 - Path Traversal
Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.
CWE-22 Jan 05, 2021
CVE-2020-11455 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Limesurvey < 4.1.11 - Path Traversal
LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/admin/LimeSurveyFileManager.php.
CWE-22 Apr 01, 2020
CVE-2020-11546 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Superwebmailer < 7.40.0.01550 - Code Injection
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
CWE-94 Jul 14, 2020
CVE-2020-2551 9.8 CRITICAL KEV 12 PoCs Analysis NUCLEI EPSS 0.94
Oracle WebLogic Server <12.2.1.4 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jan 15, 2020
CVE-2020-7980 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Intellian Aptus Web <1.24 - RCE
Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.
CWE-78 Jan 25, 2020
CVE-2020-8209 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Citrix XenMobile <10.12 - Info Disclosure
Improper access control in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files.
CWE-22 Aug 17, 2020
CVE-2020-23575 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.87
Kyocera Printer d-COPIA253MF - Path Traversal
A directory traversal vulnerability exists in Kyocera Printer d-COPIA253MF plus. Successful exploitation of this vulnerability could allow an attacker to retrieve or view arbitrary files from the affected server.
CWE-22 May 10, 2021
CVE-2020-17453 6.1 MEDIUM EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.67
WSO2 Management Console <5.10 - XSS
WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp msgId parameter.
CWE-79 Apr 05, 2021
CVE-2020-35131 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Cockpit <0.6.1 - RCE
Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.
CWE-94 Jan 08, 2021
CVE-2020-11514 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.66
Rankmath Seo < 1.0.40.2 - Missing Authorization
The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to update arbitrary WordPress metadata, including the ability to escalate or revoke administrative privileges for existing users via the unsecured rankmath/v1/updateMeta REST API endpoint.
CWE-862 Apr 07, 2020
CVE-2020-35730 6.1 MEDIUM KEV 1 PoC Analysis EPSS 0.65
Roundcube Webmail < 1.2.13 - XSS
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
CWE-79 Dec 28, 2020
CVE-2020-12641 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.93
Roundcube Webmail <1.4.4 - RCE
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
CWE-78 May 04, 2020
CVE-2020-36708 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
WordPress Themes - Function Injection
The following themes for WordPress are vulnerable to Function Injections in versions up to and including Shapely <= 1.2.7, NewsMag <= 2.4.1, Activello <= 1.4.0, Illdy <= 2.1.4, Allegiant <= 1.2.2, Newspaper X <= 1.3.1, Pixova Lite <= 2.0.5, Brilliance <= 1.2.7, MedZone Lite <= 1.2.4, Regina Lite <= 2.0.4, Transcend <= 1.1.8, Affluent <= 1.1.0, Bonkers <= 1.0.4, Antreas <= 1.0.2, Sparkling <= 2.4.8, and NatureMag Lite <= 1.0.4. This is due to epsilon_framework_ajax_action. This makes it possible for unauthenticated attackers to call functions and achieve remote code execution.
CWE-94 Jun 07, 2023