High EPSS Vulnerabilities with Public Exploits
Updated 40m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,483 results
Clear all
CVE-2014-3120
8.1
HIGH
KEV
6 PoCs
Analysis
NUCLEI
EPSS 0.83
Elasticsearch < 1.2 - Improper Access Control
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
CWE-284
Jul 28, 2014
CVE-2021-37343
8.8
HIGH
1 PoC
Analysis
EPSS 0.83
Nagios XI Autodiscovery Webshell Upload
A path traversal vulnerability exists in Nagios XI below version 5.8.5 AutoDiscovery component and could lead to post authenticated RCE under security context of the user running Nagios.
CWE-22
Aug 13, 2021
CVE-2012-5357
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.83
Ektron CMS <8.02 SP5 - RCE
Ektron Content Management System (CMS) before 8.02 SP5 uses the XslCompiledTransform class with enablescript set to true, which allows remote attackers to execute arbitrary code with NETWORK SERVICE privileges via crafted XSL data.
CWE-19
Oct 30, 2017
CVE-2020-15893
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.83
Dlink Dir-816l Firmware - OS Command Injection
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet.
CWE-78
Jul 22, 2020
CVE-2005-1213
3 PoCs
Analysis
EPSS 0.83
Microsoft Outlook Express <6 SP1 - Buffer Overflow
Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.
Jun 14, 2005
CVE-2016-6515
7.5
HIGH
4 PoCs
Analysis
EPSS 0.83
OpenSSH <7.3 - DoS
The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
CWE-20
Aug 07, 2016
CVE-2017-5817
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.83
HP Intelligent Management Center < 7.3 - Improper Input Validation
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found.
CWE-20
Feb 15, 2018
CVE-2015-5603
3 PoCs
Analysis
EPSS 0.83
HipChat for JIRA <6.30.0 - Code Injection
The HipChat for JIRA plugin before 6.30.0 for Atlassian JIRA allows remote authenticated users to execute arbitrary Java code via unspecified vectors, related to "Velocity Template Injection Vulnerability."
CWE-94
Sep 21, 2015
CVE-2024-38526
7.2
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.83
pdoc <14.5.1 - Open Redirect
pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.
CWE-1395
Jun 26, 2024
CVE-2024-35584
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.83
Os4ed Opensis - SQL Injection
SQL injection vulnerabilities were discovered in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1 to 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from "X-Forwarded-For" header and appends it to a SQL INSERT statement directly, leading to SQL Injection.
CWE-89
Oct 15, 2024
CVE-2018-1000115
7.5
HIGH
3 PoCs
Analysis
EPSS 0.83
Memcached <1.5.6 - DoS
Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.
CWE-400
Mar 05, 2018
CVE-2016-15043
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.83
WP Mobile Detector <3.5 - File Upload
The WP Mobile Detector plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in resize.php file in versions up to, and including, 3.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
CWE-434
Jul 19, 2025
CVE-1999-1510
4 PoCs
Analysis
EPSS 0.83
Bisonware FTP Server < 4.1 - Buffer Overflow
Buffer overflows in Bisonware FTP server prior to 4.1 allow remote attackers to cause a denial of service, and possibly execute arbitrary commands, via long (1) USER, (2) LIST, or (3) CWD commands.
May 17, 1999
CVE-2022-36067
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.83
vm2 <3.9.11 - RCE
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
CWE-913
Sep 06, 2022
CVE-2024-31621
7.6
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.83
Flowise <1.6.2 - RCE
An issue in FlowiseAI Inc Flowise v.1.6.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the api/v1 component.
CWE-94
Apr 29, 2024
CVE-2014-9195
2 PoCs
Analysis
EPSS 0.82
Phoenix Contact ProConOs & MultiProg - RCE
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
CWE-306
Jan 17, 2015
CVE-2018-8373
7.5
HIGH
KEV
1 PoC
EPSS 0.82
Internet Explorer <11 - Memory Corruption
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
CWE-787
Aug 15, 2018
CVE-2021-45043
7.5
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.82
Hd-network Real-time Monitoring System - Path Traversal
HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter.
CWE-22
Dec 15, 2021
CVE-2021-20039
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.82
Sonicwall Sma 410 Firmware - OS Command Injection
Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
CWE-78
Dec 08, 2021
CVE-2013-4468
2 PoCs
Analysis
EPSS 0.82
VICIDIAL dialer <2.8-403a, 2.7, 2.7RC1 - Command Injection
VICIDIAL dialer (aka Asterisk GUI client) 2.8-403a, 2.7, 2.7RC1, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in the extension parameter in an OriginateVDRelogin action to manager_send.php.
May 14, 2014