Vulnerabilities Exploited in the Wild with Public PoC
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2020-4427
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.93
IBM Data Risk Manager < 2.0.6.1 - Authentication Bypass
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532.
CWE-287
May 07, 2020
CVE-2020-11652
6.5
MEDIUM
KEV
10 PoCs
Analysis
EPSS 0.94
Salt < 2019.2.4 - Path Traversal
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
CWE-22
Apr 30, 2020
CVE-2020-11651
9.8
CRITICAL
KEV
17 PoCs
Analysis
EPSS 0.94
SaltStack Salt <2019.2.4,3000.2 - RCE
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Apr 30, 2020
CVE-2020-3161
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.87
Cisco IP Phones - RCE/DoS
A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.
CWE-20
Apr 15, 2020
CVE-2020-1020
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.86
Microsoft Windows - RCE
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938.
CWE-787
Apr 15, 2020
CVE-2020-11738
7.5
HIGH
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Awesomemotive Duplicator < 1.3.28 - Path Traversal
The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.
CWE-22
Apr 13, 2020
CVE-2020-3952
9.8
CRITICAL
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.94
VMware vCenter Server vmdir Information Disclosure
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
CWE-306
Apr 10, 2020
CVE-2020-5735
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.54
Amcrest - Buffer Overflow
Amcrest cameras and NVR are vulnerable to a stack-based buffer overflow over port 37777. An authenticated remote attacker can abuse this issue to crash the device and possibly execute arbitrary code.
CWE-121
Apr 08, 2020
CVE-2020-10199
8.8
HIGH
KEV
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Nexus Repository Manager Java EL Injection RCE
Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
CWE-917
Apr 01, 2020
CVE-2020-7961
9.8
CRITICAL
KEV
16 PoCs
Analysis
NUCLEI
EPSS 0.94
Liferay Portal <7.2.1 CE GA2 - Code Injection
Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).
CWE-502
Mar 20, 2020
CVE-2020-3950
7.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.21
VMware Fusion <11.5.2 - Privilege Escalation
VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.
CWE-269
Mar 17, 2020
CVE-2020-5849
7.5
HIGH
KEV
2 PoCs
Analysis
EPSS 0.94
Unraid 6.8.0 - Auth Bypass
Unraid 6.8.0 allows authentication bypass.
CWE-697
Mar 16, 2020
CVE-2020-5847
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Unraid <6.8.0 - RCE
Unraid through 6.8.0 allows Remote Code Execution.
Mar 16, 2020
CVE-2020-6207
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
SAP Solution Manager 7.2 - Auth Bypass
SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
CWE-306
Mar 10, 2020
CVE-2020-0069
7.8
HIGH
KEV
6 PoCs
Analysis
EPSS 0.01
Mediatek Command Queue driver - Privilege Escalation
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
CWE-787
Mar 10, 2020
CVE-2020-0041
7.8
HIGH
KEV
5 PoCs
Analysis
EPSS 0.24
Android - Privilege Escalation
In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145988638References: Upstream kernel
CWE-20
Mar 10, 2020
CVE-2020-10221
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.91
Rconfig < 3.9.4 - OS Command Injection
lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.
CWE-78
Mar 08, 2020
CVE-2020-10189
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Zohocorp Manageengine Desktop Central - Insecure Deserialization
Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.
CWE-502
Mar 06, 2020
CVE-2020-6418
8.8
HIGH
KEV
8 PoCs
Analysis
EPSS 0.86
Google Chrome <80.0.3987.122 - Heap Corruption
Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-843
Feb 27, 2020
CVE-2020-0688
8.8
HIGH
KEV
RANSOMWARE
33 PoCs
Analysis
EPSS 0.94
Microsoft Exchange Server - Authentication Bypass
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.
CWE-287
Feb 11, 2020