High EPSS Vulnerabilities with Public Exploits

Updated 34m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
3,483 results Clear all
CVE-2009-1943 2 PoCs Analysis EPSS 0.79
SafeNet SoftRemote <10.8.6 - Buffer Overflow
Stack-based buffer overflow in the IKE service (ireIke.exe) in SafeNet SoftRemote before 10.8.6 allows remote attackers to execute arbitrary code via a long request to UDP port 62514.
CWE-119 Jun 05, 2009
CVE-2008-4687 5 PoCs Analysis EPSS 0.79
Mantis < 1.1.3 - Code Injection
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
CWE-94 Oct 22, 2008
CVE-2015-1587 2 PoCs Analysis EPSS 0.79
Maarch LetterBox <2.8 - RCE
Unrestricted file upload vulnerability in file_to_index.php in Maarch LetterBox 2.8 and earlier and GEC/GED 1.4 and earlier allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a request to a predictable filename in tmp/.
Feb 19, 2015
CVE-2004-0942 1 PoC Analysis EPSS 0.79
Apache webserver <2.0.52 - DoS
Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
Feb 09, 2005
CVE-2016-0710 8.8 HIGH 2 PoCs Analysis EPSS 0.79
Apache Jetspeed Arbitrary File Upload
Multiple SQL injection vulnerabilities in the User Manager service in Apache Jetspeed before 2.3.1 allow remote attackers to execute arbitrary SQL commands via the (1) role or (2) user parameter to services/usermanager/users/.
CWE-89 Apr 11, 2016
CVE-2024-24576 10.0 CRITICAL 8 PoCs Analysis EPSS 0.79
Rust <1.77.2 - Command Injection
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted. One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution. Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process. The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.
CWE-78 Apr 09, 2024
CVE-2015-2995 3 PoCs Analysis EPSS 0.79
SysAid Help Desk <15.2 - RCE
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
CWE-22 Jun 08, 2015
CVE-2018-1000049 7.5 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.79
Nanopool Claymore Dual Miner <7.3 - RCE
Nanopool Claymore Dual Miner version 7.3 and earlier contains a remote code execution vulnerability by abusing the miner API. The flaw can be exploited only if the software is executed with read/write mode enabled.
CWE-20 Feb 09, 2018
CVE-2022-23779 5.3 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.79
Zohocorp Manageengine Desktop Central - Information Disclosure
Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.
CWE-200 Mar 02, 2022
CVE-2021-20028 9.8 CRITICAL KEV RANSOMWARE 1 PoC EPSS 0.79
Sonicwall Sma 210 Firmware < 9.0.0.10-28sv - SQL Injection
Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier
CWE-89 Aug 04, 2021
CVE-2017-6326 10.0 CRITICAL 2 PoCs Analysis EPSS 0.79
Symantec Messaging Gateway < 10.6.3 - Remote Code Execution
The Symantec Messaging Gateway can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process.
Jun 26, 2017
CVE-2024-21338 7.8 HIGH KEV RANSOMWARE 11 PoCs Analysis EPSS 0.79
Windows Kernel - Privilege Escalation
Windows Kernel Elevation of Privilege Vulnerability
CWE-822 Feb 13, 2024
CVE-2023-21608 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.79
Adobe Acrobat Reader <22.003.20282 - Use After Free
Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-416 Jan 18, 2023
CVE-2024-20404 7.2 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.79
Cisco Finesse - SSRF
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.
CWE-918 Jun 05, 2024
CVE-2022-23277 8.8 HIGH 2 PoCs Analysis EPSS 0.79
Microsoft Exchange Server ChainedSerializationBinder RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
Mar 09, 2022
CVE-2004-0695 3 PoCs Analysis EPSS 0.79
4D WebSTAR <5.3.2 - Buffer Overflow
Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command.
Jul 27, 2004
CVE-2010-1681 3 PoCs Analysis EPSS 0.79
Microsoft Visio - Memory Corruption
Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
CWE-119 May 06, 2010
CVE-2012-3752 2 PoCs Analysis EPSS 0.79
Apple Quicktime < 7.7.2 - Memory Corruption
Multiple buffer overflows in Apple QuickTime before 7.7.3 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted style element in a QuickTime TeXML file.
CWE-119 Nov 09, 2012
CVE-2004-1638 4 PoCs Analysis EPSS 0.79
MailCarrier 2.51 - RCE
Buffer overflow in MailCarrier 2.51 allows remote attackers to execute arbitrary code via a long (1) EHLO and possibly (2) HELO command.
Oct 16, 2004
CVE-2016-7241 7.5 HIGH 1 PoC Analysis EPSS 0.79
Microsoft Edge - Memory Corruption
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
CWE-119 Nov 10, 2016