Vulnerabilities Exploited in the Wild with Public PoC

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
2,391 results Clear all
CVE-2020-1938 9.8 CRITICAL KEV 46 PoCs Analysis NUCLEI EPSS 0.94
Apache Geode < 7.0.100 - Remote Code Execution
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
Feb 24, 2020
CVE-2020-11984 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.75
Apache HTTP Server - Remote Code Execution
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CWE-120 Aug 07, 2020
CVE-2020-0796 10.0 CRITICAL KEV RANSOMWARE 133 PoCs Analysis NUCLEI EPSS 0.94
Microsoft Windows 10 1903 - Memory Corruption
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
CWE-119 Mar 12, 2020
CVE-2020-5722 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.93
Grandstream UCM6200 <1.0.19.20 - SQL Injection
The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.
CWE-89 Mar 23, 2020
CVE-2020-0787 7.8 HIGH KEV RANSOMWARE 12 PoCs Analysis EPSS 0.61
Microsoft Windows 10 1507 - Symlink Following
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
CWE-59 Mar 12, 2020
CVE-2020-13927 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Airflow < 1.10.11 - Missing Authentication
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default
CWE-306 Nov 10, 2020
CVE-2020-14864 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
Oracle Business Intelligence Enterprise Edition - Info Disclosure
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Installation). Supported versions that are affected are 5.5.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CWE-22 Oct 21, 2020
CVE-2020-11978 8.8 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Apache Airflow < 1.10.11 - OS Command Injection
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
CWE-78 Jul 17, 2020
CVE-2020-13756 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.27
Sabberworm Php Css Parser < 8.3.1 - Code Injection
Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data, possibly leading to remote code execution if the function allSelectors() or getSelectorsBySpecificity() is called with input from an attacker.
CWE-94 Jun 03, 2020
CVE-2020-8816 7.2 HIGH KEV 6 PoCs Analysis EPSS 0.91
Pi-hole Web <4.3.2 - RCE
Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease.
CWE-78 May 29, 2020
CVE-2020-8958 7.2 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.84
Gpononu 1ge Router Wifi Onu V2801rw Firmware - OS Command Injection
Guangzhou 1GE ONU V2801RW 1.9.1-181203 through 2.9.0-181024 and V2804RGW 1.9.1-181203 through 2.9.0-181024 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the boaform/admin/formPing Dest IP Address field.
CWE-78 Jul 15, 2020
CVE-2020-10148 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Solarwinds Orion Platform - Missing Authentication
The SolarWinds Orion API is vulnerable to an authentication bypass that could allow a remote attacker to execute API commands. This vulnerability could allow a remote attacker to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected.
CWE-306 Dec 29, 2020
CVE-2020-29583 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Zyxel USG <4.60 - Privilege Escalation
Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server or web interface with admin privileges.
CWE-522 Dec 22, 2020
CVE-2020-17530 9.8 CRITICAL KEV 14 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts 2 Forced Multi OGNL Evaluation
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
CWE-917 Dec 11, 2020
CVE-2020-17144 8.4 HIGH KEV 5 PoCs Analysis EPSS 0.92
Microsoft Exchange - RCE
Microsoft Exchange Remote Code Execution Vulnerability
CWE-502 Dec 10, 2020
CVE-2020-27950 5.5 MEDIUM KEV 3 PoCs Analysis EPSS 0.37
Apple Ipados < 14.2 - Denial of Service
A memory initialization issue was addressed. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. A malicious application may be able to disclose kernel memory.
CWE-665 Dec 08, 2020
CVE-2020-27930 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.44
Apple Ipados < 14.2 - Out-of-Bounds Write
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. Processing a maliciously crafted font may lead to arbitrary code execution.
CWE-787 Dec 08, 2020
CVE-2020-17087 7.8 HIGH KEV 5 PoCs Analysis EPSS 0.22
Windows Kernel - Privilege Escalation
Windows Kernel Local Elevation of Privilege Vulnerability
CWE-131 Nov 11, 2020
CVE-2020-16846 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
SaltStack Salt REST API Arbitrary Command Execution
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
CWE-78 Nov 06, 2020
CVE-2020-15999 9.6 CRITICAL KEV 5 PoCs Analysis EPSS 0.93
Google Chrome < 86.0.4240.111 - Out-of-Bounds Write
Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-120 Nov 03, 2020