Critical Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2015-2147
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Phpbugtracker < 1.6.0 - SQL Injection
Multiple SQL injection vulnerabilities in Issuetracker phpBugTracker before 1.7.0 allow remote attackers to execute arbitrary SQL commands via unspecified parameters.
CWE-89
Oct 06, 2017
CVE-2015-9499
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.68
Themepunch Showbiz Pro < 1.7.1 - Unrestricted File Upload
The Showbiz Pro plugin through 1.7.1 for WordPress has PHP code execution by uploading a .php file within a ZIP archive.
CWE-434
Oct 22, 2019
CVE-2015-4523
9.3
CRITICAL
1 PoC
Analysis
EPSS 0.05
Symantec Malware Analysis Appliance < 4.2 - Access Control
Blue Coat Malware Analysis Appliance (MAA) before 4.2.5 and Malware Analyzer G2 allow remote attackers to bypass a virtual machine protection mechanism and consequently write to arbitrary files, cause a denial of service (host reboot or reset to factory defaults), or execute arbitrary code via vectors related to saving files during analysis.
CWE-264
Sep 11, 2017
CVE-2014-6271
9.8
CRITICAL
KEV
126 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
CWE-78
Sep 24, 2014
CVE-2014-8684
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.45
CodeIgniter <3.0 & Kohana 3.2.3-3.3.2 - Code Injection
CodeIgniter before 3.0 and Kohana 3.2.3 and earlier and 3.3.x through 3.3.2 make it easier for remote attackers to spoof session cookies and consequently conduct PHP object injection attacks by leveraging use of standard string comparison operators to compare cryptographic hashes.
CWE-310
Sep 19, 2017
CVE-2014-8687
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.50
Seagate Business NAS <2015.00322 - RCE
Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens.
CWE-327
Jun 08, 2017
CVE-2014-6287
9.8
CRITICAL
KEV
22 PoCs
Analysis
NUCLEI
EPSS 0.94
Rejetto HTTP File Server <2.3c - RCE
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.
CWE-94
Oct 07, 2014
CVE-2014-8739
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.92
jQuery File Upload Plugin <6.4.4 - RCE
Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.
CWE-434
Feb 08, 2020
CVE-2014-7169
9.8
CRITICAL
KEV
19 PoCs
Analysis
EPSS 0.90
GNU Bash <4.3 - Code Injection
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
CWE-78
Sep 25, 2014
CVE-2014-5093
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
Status2k - Insufficiently Protected Credentials
Status2k does not remove the install directory allowing credential reset.
CWE-522
Jan 10, 2020
CVE-2014-1510
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.71
Mozilla Firefox < 28.0 - Improper Privilege Management
The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
CWE-269
Mar 19, 2014
CVE-2014-7862
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.81
Zohocorp Desktop Central < 90109 - Access Control
The DCPluginServelet servlet in ManageEngine Desktop Central and Desktop Central MSP before build 90109 allows remote attackers to create administrator accounts via an addPlugInUser action.
CWE-264
Jan 04, 2018
CVE-2014-5470
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.78
Actual Analyzer <2014-08-29 - Code Injection
Actual Analyzer through 2014-08-29 allows code execution via shell metacharacters because untrusted input is used for part of the input data passed to an eval operation.
CWE-77
Jun 21, 2024
CVE-2014-7236
9.1
CRITICAL
3 PoCs
Analysis
EPSS 0.84
TWiki Debugenableplugins Remote Code Execution
Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki before 6.0.1 allows remote attackers to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome.
CWE-74
Feb 17, 2020
CVE-2014-9390
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.77
Malicious Git and Mercurial HTTP Server For CVE-2014-9390
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.
CWE-20
Feb 12, 2020
CVE-2014-8516
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.83
Cloudfastpath Netcharts Server - Unrestricted File Upload
Unrestricted file upload vulnerability in Visual Mining NetCharts Server allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors.
CWE-434
Jan 03, 2020
CVE-2014-8741
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.70
Lexmark MarkVision Enterprise <2.1 - Path Traversal
Directory traversal vulnerability in the GfdFileUploadServerlet servlet in Lexmark MarkVision Enterprise before 2.1 allows remote attackers to write to arbitrary files via unspecified vectors.
CWE-22
Jan 27, 2020
CVE-2014-0497
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.93
Adobe Flash Player Integer Underflow Remote Code Execution
Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
CWE-191
Feb 05, 2014
CVE-2014-125117
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.48
Dlink Dsp-w215 Firmware - Improper Input Validation
A stack-based buffer overflow vulnerability in the my_cgi.cgi component of certain D-Link devices, including the DSP-W215 version 1.02, can be exploited via a specially crafted HTTP POST request to the /common/info.cgi endpoint. This flaw enables an unauthenticated attacker to achieve remote code execution with system-level privileges.
CWE-121
Jul 25, 2025
CVE-2014-8686
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.34
CodeIgniter <2.2.0 - Info Disclosure
CodeIgniter before 2.2.0 makes it easier for attackers to decode session cookies by leveraging fallback to a custom XOR-based encryption scheme when the Mcrypt extension for PHP is not available.
CWE-310
Sep 19, 2017