Vulnerabilities Exploited in the Wild with Public PoC
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2020-0683
7.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.31
Microsoft Windows 10 1507 - Symlink Following
An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0686.
CWE-59
Feb 11, 2020
CVE-2020-0674
7.5
HIGH
KEV
6 PoCs
Analysis
EPSS 0.94
Microsoft Internet Explorer - Use After Free
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
CWE-416
Feb 11, 2020
CVE-2020-8655
7.8
HIGH
KEV
3 PoCs
Analysis
EPSS 0.88
EyesOfNetwork <5.3 - Privilege Escalation
An issue was discovered in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE script for nmap 7.
CWE-269
Feb 07, 2020
CVE-2020-8657
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.89
EyesOfNetwork 5.1-5.3 AutoDiscovery Target Command Execution
An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.
CWE-798
Feb 06, 2020
CVE-2020-8644
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
PlaySMS <1.4.3 - XSS
PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
CWE-94
Feb 05, 2020
CVE-2020-8515
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
DrayTek - RCE
DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.
CWE-78
Feb 01, 2020
CVE-2020-2555
9.8
CRITICAL
KEV
10 PoCs
Analysis
EPSS 0.93
Oracle Coherence 3.7.1.0/12.1.3.0.0/12.2.1.3-4 - RCE
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-502
Jan 15, 2020
CVE-2020-0646
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Microsoft .net Framework - Remote Code Execution
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
CWE-91
Jan 14, 2020
CVE-2020-0601
8.1
HIGH
KEV
RANSOMWARE
38 PoCs
Analysis
EPSS 0.94
Microsoft Windows 10 1507 < 1.12.16 - Improper Certificate Validation
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
CWE-295
Jan 14, 2020
CVE-2020-15568
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
TerraMaster TOS <4.1.29 - Code Injection
TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter.
CWE-913
Jan 30, 2021
CVE-2020-28188
9.8
CRITICAL
EXPLOITED
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.93
Terra-master Tos < 4.2.06 - OS Command Injection
Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.
CWE-78
Dec 24, 2020
CVE-2020-25494
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.61
Xinuos Openserver - OS Command Injection
Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.
CWE-78
Dec 18, 2020
CVE-2020-9496
6.1
MEDIUM
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Ofbiz - Insecure Deserialization
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
CWE-502
Jul 15, 2020
CVE-2020-24949
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
Php-fusion - Privilege Escalation
Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
Sep 03, 2020
CVE-2020-8813
8.8
HIGH
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Cacti 1.2.8 - Command Injection
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CWE-78
Feb 22, 2020
CVE-2020-0609
9.8
CRITICAL
EXPLOITED
RANSOMWARE
9 PoCs
Analysis
EPSS 0.90
Microsoft Windows Server 2012 - Remote Code Execution
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0610.
Jan 14, 2020
CVE-2020-11022
6.9
MEDIUM
EXPLOITED
7 PoCs
Analysis
EPSS 0.07
jQuery <3.5.0 - XSS
In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CWE-79
Apr 29, 2020
CVE-2020-21224
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
NUCLEI
EPSS 0.92
Inspur Clusterengine - Remote Code Execution
A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server
CWE-88
Feb 22, 2021
CVE-2020-28871
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Monitorr - Unrestricted File Upload
Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload.
CWE-434
Feb 10, 2021
CVE-2020-13942
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Unomi < 1.5.2 - Injection
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
CWE-74
Nov 24, 2020