High EPSS Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,483 results
Clear all
CVE-2009-3563
1 PoC
Analysis
EPSS 0.80
Ntp < 4.2.2p4 - Denial of Service
ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
Dec 09, 2009
CVE-2005-2611
2 PoCs
Analysis
EPSS 0.80
VERITAS Backup Exec - Info Disclosure
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
Aug 17, 2005
CVE-2015-7871
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.80
NTP <4.2.8p4, <4.3.77 - Auth Bypass
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
CWE-287
Aug 07, 2017
CVE-2010-2703
3 PoCs
Analysis
EPSS 0.80
HP OpenView Network Node Manager <7.53 - Buffer Overflow
Stack-based buffer overflow in the execvp_nc function in the ov.dll module in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53, when running on Windows, allows remote attackers to execute arbitrary code via a long HTTP request to webappmon.exe.
CWE-119
Jul 28, 2010
CVE-2021-36782
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.80
Suse Rancher < 2.5.16 - Cleartext Storage
A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners, Project Members and User Base to use the Kubernetes API to retrieve plaintext version of sensitive data. This issue affects: SUSE Rancher Rancher versions prior to 2.5.16; Rancher versions prior to 2.6.7.
CWE-312
Sep 07, 2022
CVE-2019-5475
8.8
HIGH
4 PoCs
Analysis
EPSS 0.80
Sonatype Nexus Repository Manager < 2.14.9-01 - OS Command Injection
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
CWE-78
Sep 03, 2019
CVE-2019-19985
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.80
Icegram Email Subscribers & Newsletters - Missing Authorization
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.
CWE-862
Dec 26, 2019
CVE-2017-9544
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.80
EFS Software Easy Chat Server <3.1 - Buffer Overflow
There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.
CWE-787
Jun 12, 2017
CVE-2021-4380
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.80
Pinterest Automatic <1.14.3 - Auth Bypass
The Pinterest Automatic plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the 'wp_pinterest_automatic_parse_request' function and the 'process_form.php' script in versions up to, and including, 1.14.3. This makes it possible for unauthenticated attackers to update arbitrary options on a site that can be used to create new administrative user accounts or redirect unsuspecting site visitors.
CWE-284
Jun 07, 2023
CVE-2019-5096
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.80
GoAhead <v5.0.1,v4.1.1,v3.6.5 - Code Injection
An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.
CWE-416
Dec 03, 2019
CVE-2018-8355
7.5
HIGH
1 PoC
Analysis
EPSS 0.80
Microsoft Browsers - Memory Corruption
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8353, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
CWE-787
Aug 15, 2018
CVE-2010-0033
2 PoCs
Analysis
EPSS 0.80
Microsoft Powerpoint - Memory Corruption
Stack-based buffer overflow in Microsoft Office PowerPoint 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint Viewer TextBytesAtom Record Stack Overflow Vulnerability."
CWE-119
Feb 10, 2010
CVE-2013-2730
3 PoCs
Analysis
EPSS 0.80
Adobe Reader/Acrobat <9.5.5, <10.1.7, <11.0.03 - Buffer Overflow
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2733.
CWE-119
May 16, 2013
CVE-2012-2329
2 PoCs
Analysis
EPSS 0.80
PHP <5.4.3 - Buffer Overflow
Buffer overflow in the apache_request_headers function in sapi/cgi/cgi_main.c in PHP 5.4.x before 5.4.3 allows remote attackers to cause a denial of service (application crash) via a long string in the header of an HTTP request.
CWE-119
May 11, 2012
CVE-2019-16891
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.80
Liferay Portal CE 6.2.5 - Code Injection
Liferay Portal CE 6.2.5 allows remote command execution because of deserialization of a JSON payload.
CWE-502
Oct 04, 2019
CVE-2018-15727
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.80
Grafana < 2.1.2 - Authentication Bypass
Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
CWE-287
Aug 29, 2018
CVE-2018-17553
8.8
HIGH
2 PoCs
Analysis
EPSS 0.80
Naviwebs Navigate CMS <2.8 - RCE
An "Unrestricted Upload of File with Dangerous Type" issue with directory traversal in navigate_upload.php in Naviwebs Navigate CMS 2.8 allows authenticated attackers to achieve remote code execution via a POST request with engine=picnik and id=../../../navigate_info.php.
CWE-22
Oct 03, 2018
CVE-2019-12255
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.80
Wind River VxWorks - Buffer Overflow
Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow.
CWE-120
Aug 09, 2019
CVE-2007-2508
5 PoCs
Analysis
EPSS 0.80
Trend Micro ServerProtect <5.58 - Buffer Overflow
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll.
CWE-119
May 08, 2007
CVE-2024-11393
8.8
HIGH
1 PoC
Analysis
EPSS 0.80
Hugging Face Transformers - RCE
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of model files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25191.
CWE-502
Nov 22, 2024