Vulnerabilities Exploited in the Wild with Public PoC

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
2,391 results Clear all
CVE-2020-0683 7.8 HIGH KEV 4 PoCs Analysis EPSS 0.31
Microsoft Windows 10 1507 - Symlink Following
An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0686.
CWE-59 Feb 11, 2020
CVE-2020-0674 7.5 HIGH KEV 6 PoCs Analysis EPSS 0.94
Microsoft Internet Explorer - Use After Free
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
CWE-416 Feb 11, 2020
CVE-2020-8655 7.8 HIGH KEV 3 PoCs Analysis EPSS 0.88
EyesOfNetwork <5.3 - Privilege Escalation
An issue was discovered in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE script for nmap 7.
CWE-269 Feb 07, 2020
CVE-2020-8657 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.89
EyesOfNetwork 5.1-5.3 AutoDiscovery Target Command Execution
An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.
CWE-798 Feb 06, 2020
CVE-2020-8644 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
PlaySMS <1.4.3 - XSS
PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
CWE-94 Feb 05, 2020
CVE-2020-8515 9.8 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.94
DrayTek - RCE
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
CWE-78 Feb 01, 2020
CVE-2020-2555 9.8 CRITICAL KEV 10 PoCs Analysis EPSS 0.93
Oracle Coherence 3.7.1.0/12.1.3.0.0/12.2.1.3-4 - RCE
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-502 Jan 15, 2020
CVE-2020-0646 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Microsoft .net Framework - Remote Code Execution
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
CWE-91 Jan 14, 2020
CVE-2020-0601 8.1 HIGH KEV RANSOMWARE 38 PoCs Analysis EPSS 0.94
Microsoft Windows 10 1507 < 1.12.16 - Improper Certificate Validation
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
CWE-295 Jan 14, 2020
CVE-2020-15568 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
TerraMaster TOS <4.1.29 - Code Injection
TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter.
CWE-913 Jan 30, 2021
CVE-2020-28188 9.8 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.93
Terra-master Tos < 4.2.06 - OS Command Injection
Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.
CWE-78 Dec 24, 2020
CVE-2020-25494 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.61
Xinuos Openserver - OS Command Injection
Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.
CWE-78 Dec 18, 2020
CVE-2020-9496 6.1 MEDIUM EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
Apache Ofbiz - Insecure Deserialization
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
CWE-502 Jul 15, 2020
CVE-2020-24949 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
Php-fusion - Privilege Escalation
Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
Sep 03, 2020
CVE-2020-8813 8.8 HIGH EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.94
Cacti 1.2.8 - Command Injection
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CWE-78 Feb 22, 2020
CVE-2020-0609 9.8 CRITICAL EXPLOITED RANSOMWARE 9 PoCs Analysis EPSS 0.90
Microsoft Windows Server 2012 - Remote Code Execution
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0610.
Jan 14, 2020
CVE-2020-11022 6.9 MEDIUM EXPLOITED 7 PoCs Analysis EPSS 0.07
jQuery <3.5.0 - XSS
In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CWE-79 Apr 29, 2020
CVE-2020-21224 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup NUCLEI EPSS 0.92
Inspur Clusterengine - Remote Code Execution
A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server
CWE-88 Feb 22, 2021
CVE-2020-28871 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Monitorr - Unrestricted File Upload
Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload.
CWE-434 Feb 10, 2021
CVE-2020-13942 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
Apache Unomi < 1.5.2 - Injection
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
CWE-74 Nov 24, 2020