Critical Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
4,101 results Clear all
CVE-2015-2147 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Phpbugtracker < 1.6.0 - SQL Injection
Multiple SQL injection vulnerabilities in Issuetracker phpBugTracker before 1.7.0 allow remote attackers to execute arbitrary SQL commands via unspecified parameters.
CWE-89 Oct 06, 2017
CVE-2015-9499 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.68
Themepunch Showbiz Pro < 1.7.1 - Unrestricted File Upload
The Showbiz Pro plugin through 1.7.1 for WordPress has PHP code execution by uploading a .php file within a ZIP archive.
CWE-434 Oct 22, 2019
CVE-2015-4523 9.3 CRITICAL 1 PoC Analysis EPSS 0.05
Symantec Malware Analysis Appliance < 4.2 - Access Control
Blue Coat Malware Analysis Appliance (MAA) before 4.2.5 and Malware Analyzer G2 allow remote attackers to bypass a virtual machine protection mechanism and consequently write to arbitrary files, cause a denial of service (host reboot or reset to factory defaults), or execute arbitrary code via vectors related to saving files during analysis.
CWE-264 Sep 11, 2017
CVE-2014-6271 9.8 CRITICAL KEV 126 PoCs Analysis NUCLEI EPSS 0.94
Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
CWE-78 Sep 24, 2014
CVE-2014-8684 9.8 CRITICAL 2 PoCs Analysis EPSS 0.45
CodeIgniter <3.0 & Kohana 3.2.3-3.3.2 - Code Injection
CodeIgniter before 3.0 and Kohana 3.2.3 and earlier and 3.3.x through 3.3.2 make it easier for remote attackers to spoof session cookies and consequently conduct PHP object injection attacks by leveraging use of standard string comparison operators to compare cryptographic hashes.
CWE-310 Sep 19, 2017
CVE-2014-8687 9.8 CRITICAL 3 PoCs Analysis EPSS 0.50
Seagate Business NAS <2015.00322 - RCE
Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens.
CWE-327 Jun 08, 2017
CVE-2014-6287 9.8 CRITICAL KEV 22 PoCs Analysis NUCLEI EPSS 0.94
Rejetto HTTP File Server <2.3c - RCE
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.
CWE-94 Oct 07, 2014
CVE-2014-8739 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.92
jQuery File Upload Plugin <6.4.4 - RCE
Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.
CWE-434 Feb 08, 2020
CVE-2014-7169 9.8 CRITICAL KEV 19 PoCs Analysis EPSS 0.90
GNU Bash <4.3 - Code Injection
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
CWE-78 Sep 25, 2014
CVE-2014-5093 9.8 CRITICAL 1 PoC Analysis EPSS 0.12
Status2k - Insufficiently Protected Credentials
Status2k does not remove the install directory allowing credential reset.
CWE-522 Jan 10, 2020
CVE-2014-1510 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.71
Mozilla Firefox < 28.0 - Improper Privilege Management
The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
CWE-269 Mar 19, 2014
CVE-2014-7862 9.8 CRITICAL 2 PoCs Analysis EPSS 0.81
Zohocorp Desktop Central < 90109 - Access Control
The DCPluginServelet servlet in ManageEngine Desktop Central and Desktop Central MSP before build 90109 allows remote attackers to create administrator accounts via an addPlugInUser action.
CWE-264 Jan 04, 2018
CVE-2014-5470 9.8 CRITICAL 2 PoCs Analysis EPSS 0.78
Actual Analyzer <2014-08-29 - Code Injection
Actual Analyzer through 2014-08-29 allows code execution via shell metacharacters because untrusted input is used for part of the input data passed to an eval operation.
CWE-77 Jun 21, 2024
CVE-2014-7236 9.1 CRITICAL 3 PoCs Analysis EPSS 0.84
TWiki Debugenableplugins Remote Code Execution
Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki before 6.0.1 allows remote attackers to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome.
CWE-74 Feb 17, 2020
CVE-2014-9390 9.8 CRITICAL 2 PoCs Analysis EPSS 0.77
Malicious Git and Mercurial HTTP Server For CVE-2014-9390
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.
CWE-20 Feb 12, 2020
CVE-2014-8516 9.8 CRITICAL 2 PoCs Analysis EPSS 0.83
Cloudfastpath Netcharts Server - Unrestricted File Upload
Unrestricted file upload vulnerability in Visual Mining NetCharts Server allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors.
CWE-434 Jan 03, 2020
CVE-2014-8741 9.8 CRITICAL 2 PoCs Analysis EPSS 0.70
Lexmark MarkVision Enterprise <2.1 - Path Traversal
Directory traversal vulnerability in the GfdFileUploadServerlet servlet in Lexmark MarkVision Enterprise before 2.1 allows remote attackers to write to arbitrary files via unspecified vectors.
CWE-22 Jan 27, 2020
CVE-2014-0497 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.93
Adobe Flash Player Integer Underflow Remote Code Execution
Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
CWE-191 Feb 05, 2014
CVE-2014-125117 9.8 CRITICAL 2 PoCs Analysis EPSS 0.48
Dlink Dsp-w215 Firmware - Improper Input Validation
A stack-based buffer overflow vulnerability in the my_cgi.cgi component of certain D-Link devices, including the DSP-W215 version 1.02, can be exploited via a specially crafted HTTP POST request to the /common/info.cgi endpoint. This flaw enables an unauthenticated attacker to achieve remote code execution with system-level privileges.
CWE-121 Jul 25, 2025
CVE-2014-8686 9.8 CRITICAL 2 PoCs Analysis EPSS 0.34
CodeIgniter <2.2.0 - Info Disclosure
CodeIgniter before 2.2.0 makes it easier for attackers to decode session cookies by leveraging fallback to a custom XOR-based encryption scheme when the Mcrypt extension for PHP is not available.
CWE-310 Sep 19, 2017