Vulnerabilities Exploited in the Wild with Public PoC
Updated 11m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2017-18349
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.89
Fastjson Insecure Deserialization - Remote Code Execution
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
CWE-20
Oct 23, 2018
CVE-2017-17560
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.83
Westerndigital MY Cloud Pr4100 Firmware - Authentication Bypass
An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device's file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root.
CWE-287
Dec 12, 2017
CVE-2017-6090
8.8
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.87
Phpcollab < 2.5.1 - Unrestricted File Upload
Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/.
CWE-434
Oct 03, 2017
CVE-2017-1000170
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
jqueryFileTree <2.1.5 - Path Traversal
jqueryFileTree 2.1.5 and older Directory Traversal
CWE-22
Nov 17, 2017
CVE-2017-10974
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Yaws - Path Traversal
Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080. NOTE: this CVE is only about use of an initial /%5C sequence to defeat traversal protection mechanisms; the initial /%5C sequence was apparently not discussed in earlier research on this product.
CWE-22
Jul 07, 2017
CVE-2017-1000028
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Oracle GlassFish Server Open Source Edition 4.1 - Path Traversal
Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request.
CWE-22
Jul 17, 2017
CVE-2017-12635
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
CWE-269
Nov 14, 2017
CVE-2017-18378
8.4
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.16
Netgear Readynas Surveillance Firmware < 1.1.4-7 - Command Injection
In NETGEAR ReadyNAS Surveillance before 1.4.3-17 x86 and before 1.1.4-7 ARM, $_GET['uploaddir'] is not escaped and is passed to system() through $tmp_upload_dir, leading to upgrade_handle.php?cmd=writeuploaddir remote command execution.
CWE-77
Jun 11, 2019
CVE-2017-9833
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.85
Boa 0.94.14rc21 - Code Injection
/cgi-bin/wapopen in Boa 0.94.14rc21 allows the injection of "../.." using the FILECAMERA variable (sent by GET) to read files with root privileges. NOTE: multiple third parties report that this is a system-integrator issue (e.g., a vulnerability on one type of camera) because Boa does not include any wapopen program or any code to read a FILECAMERA variable.
CWE-22
Jun 24, 2017
CVE-2017-6884
8.8
HIGH
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.90
Zyxel EMG2926 V1.00(AAQT.4)b8 - Command Injection
A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.
CWE-78
Apr 06, 2017
CVE-2017-1000367
6.4
MEDIUM
EXPLOITED
6 PoCs
Analysis
EPSS 0.19
Todd Miller's sudo <1.8.20 - Info Disclosure & Command Execution
Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
CWE-362
Jun 05, 2017
CVE-2017-18368
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.94
Billion 5200w-t Firmware - OS Command Injection
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.
CWE-78
May 02, 2019
CVE-2017-6742
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.12
SNMP - Buffer Overflow
A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.
The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.
Only traffic directed to the affected system can be used to exploit this vulnerability.
CWE-119
Jul 17, 2017
CVE-2017-7494
9.8
CRITICAL
KEV
RANSOMWARE
28 PoCs
Analysis
EPSS 0.94
Samba is_known_pipename() Arbitrary Module Load
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
CWE-94
May 30, 2017
CVE-2017-7504
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.90
Jboss <4.X - Code Injection
HTTPServerILServlet.java in JMS over HTTP Invocation Layer of the JbossMQ implementation, which is enabled by default in Red Hat Jboss Application Server <= Jboss 4.X does not restrict the classes for which it performs deserialization, which allows remote attackers to execute arbitrary code via crafted serialized data.
CWE-502
May 19, 2017
CVE-2017-11357
9.8
CRITICAL
KEV
RANSOMWARE
3 PoCs
Analysis
EPSS 0.94
Telerik UI For Asp.net Ajax < 2020.1.114 - Unrestricted File Upload
Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
CWE-434
Aug 23, 2017
CVE-2017-17105
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.85
Zivif Camera iptest.cgi Blind Remote Command Execution
Zivif PR115-204-P-RS V2.3.4.2103 and V4.7.4.2121 (and possibly in-between versions) web cameras are vulnerable to unauthenticated, blind remote command injection via CGI scripts used as part of the web interface, as demonstrated by a cgi-bin/iptest.cgi?cmd=iptest.cgi&-time="1504225666237"&-url=$(reboot) request.
CWE-78
Dec 19, 2017
CVE-2017-16562
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.48
UserPro plugin <4.9.17.1 - Auth Bypass
The UserPro plugin before 4.9.17.1 for WordPress, when used on a site with the "admin" username, allows remote attackers to bypass authentication and obtain administrative access via a "true" value for the up_auto_log parameter in the QUERY_STRING to the default URI.
CWE-287
Nov 10, 2017
CVE-2017-5521
8.1
HIGH
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
NETGEAR R8500-R8000 - Info Disclosure
An issue was discovered on NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900, and R8000 devices. They are prone to password disclosure via simple crafted requests to the web management server. The bug is exploitable remotely if the remote management option is set, and can also be exploited given access to the router over LAN or WLAN. When trying to access the web panel, a user is asked to authenticate; if the authentication is canceled and password recovery is not enabled, the user is redirected to a page that exposes a password recovery token. If a user supplies the correct token to the page /passwordrecovered.cgi?id=TOKEN (and password recovery is not enabled), they will receive the admin password for the router. If password recovery is set the exploit will fail, as it will ask the user for the recovery questions that were previously set when enabling that feature. This is persistent (even after disabling the recovery option, the exploit will fail) because the router will ask for the security questions.
Jan 17, 2017
CVE-2017-15944
9.8
CRITICAL
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Palo Alto Network PAN-OS - Remote Code Execution
Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.
CWE-119
Dec 11, 2017