Vulnerabilities Exploited in the Wild with Public PoC

Updated 50m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
2,391 results Clear all
CVE-2020-27615 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.86
WordPress <1.6.4 - SQL Injection/XSS
The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.
CWE-89 Oct 21, 2020
CVE-2020-23972 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.73
Joomla Component GMapFP <J3.5/J3.5free - Info Disclosure
In Joomla Component GMapFP Version J3.5 and J3.5free, an attacker can access the upload function without authenticating to the application and can also upload files which due to issues of unrestricted file uploads which can be bypassed by changing the content-type and name file too double extensions.
CWE-434 Aug 27, 2020
CVE-2020-12800 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Wordpress Drag and Drop Multi File Uploader RCE
The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
CWE-434 Jun 08, 2020
CVE-2020-11975 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.88
Apache Unomi - RCE
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
Jun 05, 2020
CVE-2020-12720 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
vBulletin <5.5.6pl1, <5.6.0pl1, <5.6.1pl1 - Privilege Escalation
vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control.
CWE-306 May 08, 2020
CVE-2020-35665 9.8 CRITICAL EXPLOITED 3 PoCs Analysis EPSS 0.89
Terra-master Terramaster Operating System - OS Command Injection
An unauthenticated command-execution vulnerability exists in TerraMaster TOS through 4.2.06 via shell metacharacters in the Event parameter in include/makecvs.php during CSV creation.
CWE-78 Dec 23, 2020
CVE-2020-35234 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.81
Wp-ecommerce Easy WP SMTP < 1.4.4 - Log Information Exposure
The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there.
CWE-532 Dec 14, 2020
CVE-2020-13640 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.74
Gvectors Wpdiscuz < 5.3.5 - SQL Injection
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.)
CWE-89 Jun 18, 2020
CVE-2020-24217 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.32
HiSilicon box - RCE
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
CWE-306 Oct 06, 2020
CVE-2020-15893 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.83
Dlink Dir-816l Firmware - OS Command Injection
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet.
CWE-78 Jul 22, 2020
CVE-2020-15227 8.7 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Nette <2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 - Code Injection
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
CWE-74 Oct 01, 2020
CVE-2020-10713 8.2 HIGH EXPLOITED RANSOMWARE 1 PoC Analysis EPSS 0.00
grub2 <2.06 - Privilege Escalation
A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CWE-120 Jul 30, 2020
CVE-2020-10173 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.65
Comtrend Vr-3033 Firmware - OS Command Injection
Comtrend VR-3033 DE11-416SSG-C01_R02.A2pvI042j1.d26m devices have Multiple Authenticated Command Injection vulnerabilities via the ping and traceroute diagnostic pages, as demonstrated by shell metacharacters in the pingIpAddress parameter to ping.cgi.
CWE-78 Mar 05, 2020
CVE-2020-0624 7.8 HIGH EXPLOITED RANSOMWARE 1 PoC Analysis EPSS 0.15
Windows - Privilege Escalation
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0642.
Jan 14, 2020
CVE-2020-0610 9.8 CRITICAL EXPLOITED RANSOMWARE 6 PoCs Analysis EPSS 0.77
Microsoft Windows Server 2012 - Remote Code Execution
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0609.
Jan 14, 2020
CVE-2019-12314 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Deltek Maconomy 2.2.5 - Path Traversal
Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI.
CWE-22 May 24, 2019
CVE-2019-19492 9.8 CRITICAL EXPLOITED 6 PoCs Analysis EPSS 0.78
FreeSWITCH <1.10.1 - Info Disclosure
FreeSWITCH 1.6.10 through 1.10.1 has a default password in event_socket.conf.xml.
CWE-798 Dec 02, 2019
CVE-2019-5434 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.89
XML-RPC - Code Injection
An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the "what" parameter in the "openads.spc" RPC method. Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third party websites. This vulnerability was addressed in version 4.2.0.
CWE-502 May 06, 2019
CVE-2019-6443 9.1 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.44
Ntpsec < 1.1.3 - Out-of-Bounds Read
An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.
CWE-125 Jan 16, 2019
CVE-2019-13101 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.86
Dlink Dir-600m Firmware - Missing Authentication
An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
CWE-306 Aug 08, 2019