Critical Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2016-0954
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.34
Adobe Digital Editions <4.5.1 - Memory Corruption
Adobe Digital Editions before 4.5.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
CWE-119
Mar 09, 2016
CVE-2016-0953
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
Adobe Photoshop CC <15.2.4 & Bridge CC <6.2 - Memory Corruption
Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0951 and CVE-2016-0952.
CWE-119
Feb 10, 2016
CVE-2016-0952
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
Adobe Photoshop CC <15.2.4 & Bridge CC <6.2 - Memory Corruption
Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0951 and CVE-2016-0953.
CWE-119
Feb 10, 2016
CVE-2016-0951
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
Adobe Photoshop CC <15.2.4 & Bridge CC <6.2 - Memory Corruption
Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0952 and CVE-2016-0953.
CWE-119
Feb 10, 2016
CVE-2016-3987
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.43
Trend Micro Password Manager - Command Injection
The HTTP server in Trend Micro Password Manager allows remote web servers to execute arbitrary commands via the url parameter to (1) api/openUrlInDefaultBrowser or (2) api/showSB.
CWE-284
Apr 12, 2016
CVE-2016-6599
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.33
BMC Track-It! 11.4 - Info Disclosure
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.
CWE-255
Jan 30, 2018
CVE-2015-5254
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.80
Apache ActiveMQ <5.13.0 - RCE
Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.
CWE-20
Jan 08, 2016
CVE-2015-8522
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.09
IBM Tivoli Storage Manager FastBack <6.1.12.2 - RCE
Buffer overflow in the server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 allows remote attackers to execute arbitrary code via a crafted command, a different vulnerability than CVE-2015-8519, CVE-2015-8520, and CVE-2015-8521.
CWE-119
Apr 05, 2016
CVE-2015-9235
9.8
CRITICAL
5 PoCs
Analysis
EPSS 0.37
Auth0 Jsonwebtoken < 4.2.2 - Broken Cryptographic Algorithm
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
CWE-327
May 29, 2018
CVE-2015-7501
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
EPSS 0.71
Red Hat - RCE
Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
CWE-502
Nov 09, 2017
CVE-2015-7450
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.93
IBM Products - Command Injection
Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.
CWE-502
Jan 02, 2016
CVE-2015-4852
9.8
CRITICAL
KEV
11 PoCs
Analysis
EPSS 0.93
Oracle Virtual Desktop Infrastructure - Insecure Deserialization
The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.
CWE-502
Nov 18, 2015
CVE-2015-5122
9.8
CRITICAL
KEV
RANSOMWARE
3 PoCs
Analysis
EPSS 0.93
Adobe Flash opaqueBackground Use After Free
Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
CWE-416
Jul 14, 2015
CVE-2015-5119
9.8
CRITICAL
KEV
RANSOMWARE
7 PoCs
Analysis
EPSS 0.93
Adobe Flash Player ByteArray Use After Free
Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
CWE-416
Jul 08, 2015
CVE-2015-1427
9.8
CRITICAL
KEV
RANSOMWARE
9 PoCs
Analysis
NUCLEI
EPSS 0.92
Elasticsearch <1.3.8, <1.4.3 - Command Injection
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
Feb 17, 2015
CVE-2015-6922
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.78
Kaseya Virtual System Administrator < 7.0.0.33 - Authentication Bypass
Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.33, 8.x before 8.0.0.23, 9.0 before 9.0.0.19, and 9.1 before 9.1.0.9 does not properly require authentication, which allows remote attackers to bypass authentication and (1) add an administrative account via crafted request to LocalAuth/setAccount.aspx or (2) write to and execute arbitrary files via a full pathname in the PathData parameter to ConfigTab/uploader.aspx.
CWE-287
Feb 17, 2020
CVE-2015-1635
9.8
CRITICAL
KEV
21 PoCs
Analysis
NUCLEI
EPSS 0.94
MS15-034 HTTP Protocol Stack Request Handling Denial-of-Service
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
CWE-94
Apr 14, 2015
CVE-2015-7871
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.80
NTP <4.2.8p4, <4.3.77 - Auth Bypass
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
CWE-287
Aug 07, 2017
CVE-2015-8103
9.8
CRITICAL
6 PoCs
Analysis
EPSS 0.90
Jenkins CLI RMI Java Deserialization Vulnerability
The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".
CWE-502
Nov 25, 2015
CVE-2015-10135
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.65
WPshop <1.3.9.6 - RCE
The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajaxUpload function in versions before 1.3.9.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
CWE-434
Jul 19, 2025