Critical Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
4,098 results Clear all
CVE-2010-20113 9.8 CRITICAL 2 PoCs Analysis EPSS 0.63
Easyftp Server < 1.7.0.12 - Stack Buffer Overflow
EasyFTP Server 1.7.0.11 and earlier contains a stack-based buffer overflow vulnerability in its HTTP interface. When processing a GET request to list.html, the server fails to properly validate the length of the path parameter. Supplying an excessively long value causes a buffer overflow on the stack, potentially corrupting control flow structures. The vulnerability is exposed through the embedded web server and does not require authentication due to default anonymous access. The issue was resolved in version 1.7.0.12, after which the product was renamed to UplusFtp.
CWE-121 Aug 21, 2025
CVE-2010-3765 9.8 CRITICAL KEV 5 PoCs Analysis EPSS 0.87
Mozilla Firefox - Memory Corruption
Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
CWE-119 Oct 28, 2010
CVE-2010-20121 9.8 CRITICAL 5 PoCs Analysis EPSS 0.69
Easyftp Server < 1.7.0.12 - Stack Buffer Overflow
EasyFTP Server versions up to 1.7.0.11 contain a stack-based buffer overflow vulnerability in the FTP command parser. When processing the CWD (Change Working Directory) command, the server fails to properly validate the length of the input string, allowing attackers to overwrite memory on the stack. This flaw enables remote code execution without authentication, as EasyFTP allows anonymous access by default. The vulnerability was resolved in version 1.7.0.12, after which the product was renamed “UplusFtp.”
CWE-121 Aug 21, 2025
CVE-2010-1205 9.8 CRITICAL 2 PoCs Analysis EPSS 0.15
libpng <1.2.44, <1.4.3 - Buffer Overflow
Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
CWE-120 Jun 30, 2010
CVE-2010-0211 9.8 CRITICAL 1 PoC Analysis EPSS 0.43
Openldap < 10.6.5 - Denial of Service
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
CWE-252 Jul 28, 2010
CVE-2010-5330 9.8 CRITICAL KEV 1 PoC Analysis EPSS 0.44
Ubiquiti - Command Injection
On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.
CWE-77 Jun 11, 2019
CVE-2010-1866 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Php < 5.3.2 - Integer Overflow
The dechunk filter in PHP 5.3 through 5.3.2, when decoding an HTTP chunked encoding stream, allows context-dependent attackers to cause a denial of service (crash) and possibly trigger memory corruption via a negative chunk size, which bypasses a signed comparison, related to an integer overflow in the chunk size decoder.
CWE-190 May 07, 2010
CVE-2009-2367 9.8 CRITICAL 1 PoC Analysis EPSS 0.32
Iomega StorCenter Pro - Info Disclosure
cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.
CWE-338 Jul 08, 2009
CVE-2009-1151 9.8 CRITICAL KEV 7 PoCs Analysis NUCLEI EPSS 0.93
Phpmyadmin < 2.11.9.5 - Code Injection
Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
CWE-94 Mar 26, 2009
CVE-2009-4491 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
thttpd 2.25b0 - XSS
thttpd 2.25b0 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
CWE-20 Jan 13, 2010
CVE-2009-4488 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Varnish 2.0.6 - XSS
Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. NOTE: the vendor disputes the significance of this report, stating that "This is not a security problem in Varnish or any other piece of software which writes a logfile. The real problem is the mistaken belief that you can cat(1) a random logfile to your terminal safely.
CWE-1284 Jan 13, 2010
CVE-2009-4581 9.8 CRITICAL 1 PoC Analysis EPSS 0.05
RoseOnlineCMS <3 B1 - Path Traversal
Directory traversal vulnerability in modules/admincp.php in RoseOnlineCMS 3 B1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the admin parameter.
CWE-22 Jan 06, 2010
CVE-2009-3421 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Zenas Pao-bacheca Guestbook - Authentication Bypass
login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1.
CWE-287 Sep 25, 2009
CVE-2009-2382 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
phpMyBlockchecker 1.0.0055 - Auth Bypass
admin.php in phpMyBlockchecker 1.0.0055 allows remote attackers to bypass authentication and gain administrative access by setting the PHPMYBCAdmin cookie to LOGGEDIN.
CWE-287 Jul 08, 2009
CVE-2009-2168 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
EgyPlus 7ammel <1.0.1 - Auth Bypass
cpanel/login.php in EgyPlus 7ammel (aka 7ml) 1.0.1 and earlier sends a redirect to the web browser but does not exit when the supplied credentials are incorrect, which allows remote attackers to bypass authentication by providing arbitrary username and password parameters.
CWE-287 Jun 22, 2009
CVE-2009-1936 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
cpCommerce 1.2.x - RCE
_functions.php in cpCommerce 1.2.x, possibly including 1.2.9, sends a redirect but does not exit when it is called directly, which allows remote attackers to bypass a protection mechanism to conduct remote file inclusion and directory traversal attacks, execute arbitrary PHP code, or read arbitrary files via the GLOBALS[prefix] parameter, a different vector than CVE-2003-1500.
CWE-22 Jun 05, 2009
CVE-2008-0081 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.82
Microsoft Excel - Use of Uninitialized Resource
Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via crafted macros, aka "Macro Validation Vulnerability," a different vulnerability than CVE-2007-3490.
CWE-908 Jan 16, 2008
CVE-2008-5784 9.8 CRITICAL 2 PoCs Analysis EPSS 0.06
V3 Chat - Profiles/Dating Script 3.0.2 - Auth Bypass
V3 Chat - Profiles/Dating Script 3.0.2 allows remote attackers to bypass authentication and gain administrative access by setting the admin cookie to 1.
CWE-565 Dec 31, 2008
CVE-2008-3604 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
ZeeBuddy 2.1 - SQL Injection
SQL injection vulnerability in bannerclick.php in ZeeBuddy 2.1 allows remote attackers to execute arbitrary SQL commands via the adid parameter.
CWE-89 Aug 12, 2008
CVE-2008-1511 9.8 CRITICAL 2 PoCs Analysis EPSS 0.02
ooComments 1.0 - RCE
Multiple PHP remote file inclusion vulnerabilities in ooComments 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the PathToComment parameter for (1) classes/class_admin.php and (2) classes/class_comments.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CWE-94 Mar 25, 2008