High EPSS Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
3,485 results Clear all
CVE-2023-26602 9.8 CRITICAL 2 PoCs Analysis EPSS 0.79
ASUS ASMB8 iKVM <1.14.51 - RCE
ASUS ASMB8 iKVM firmware through 1.14.51 allows remote attackers to execute arbitrary code by using SNMP to create extensions, as demonstrated by snmpset for NET-SNMP-EXTEND-MIB with /bin/sh for command execution.
CWE-77 Feb 26, 2023
CVE-2006-3392 10 PoCs Analysis NUCLEI EPSS 0.79
Webmin <1.290 - Info Disclosure
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
Jul 06, 2006
CVE-2025-30004 8.8 HIGH 1 PoC Analysis EPSS 0.79
Xorcom CompletePBX <5.2.35 - Command Injection
Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to execute arbitrary commands as the root user. This issue affects CompletePBX: all versions up to and prior to 5.2.35
CWE-78 Mar 31, 2025
CVE-2014-3828 3 PoCs Analysis EPSS 0.79
Merethis Centreon - SQL Injection
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id parameter to views/graphs/graphStatus/displayServiceStatus.php, (4) the mnftr_id parameter to configuration/configObject/traps/GetXMLTrapsForVendor.php, or (5) the index parameter to common/javascript/commandGetArgs/cmdGetExample.php in include/.
CWE-89 Oct 23, 2014
CVE-2022-36883 7.5 HIGH 3 PoCs Analysis NUCLEI EPSS 0.79
Jenkins Git < 4.11.3 - Missing Authorization
A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
CWE-862 Jul 27, 2022
CVE-2025-9316 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.79
N-central <2025.4 - Info Disclosure
N-central < 2025.4 can generate sessionIDs for unauthenticated users This issue affects N-central: before 2025.4.
CWE-1284 Nov 12, 2025
CVE-2016-1909 9.8 CRITICAL 2 PoCs Analysis EPSS 0.79
Fortinet <5.0.12 - Hardcoded Passphrase
Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to obtain administrative access via an SSH session.
CWE-264 Jan 15, 2016
CVE-2006-6251 4 PoCs Analysis EPSS 0.79
Vuplayer < 2.44 - Buffer Overflow
Stack-based buffer overflow in VUPlayer 2.44 and earlier allows remote attackers to execute arbitrary code via a long string in an M3U file, aka an "M3U UNC Name" attack.
Dec 04, 2006
CVE-2011-4789 2 PoCs Analysis EPSS 0.79
HP Diagnostics - Memory Corruption
Stack-based buffer overflow in magentservice.exe in the server in HP LoadRunner 11.00 before patch 4 allows remote attackers to execute arbitrary code via a crafted size value in a packet. NOTE: it was originally reported that the affected product is HP Diagnostics Server, but HP states that "the vulnerable product is actually HP LoadRunner."
CWE-119 Jan 13, 2012
CVE-2016-2118 7.5 HIGH 1 PoC Analysis EPSS 0.79
Samba < 4.2.10 - Security Feature Bypass
The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
CWE-254 Apr 12, 2016
CVE-2015-1486 2 PoCs Analysis EPSS 0.79
Symantec Endpoint Protection Manager <12.1-RU6-MP1 - Auth Bypass
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote attackers to bypass authentication via a crafted password-reset action that triggers a new administrative session.
CWE-287 Aug 01, 2015
CVE-2018-17173 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.78
LG SuperSign CMS - RCE
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
CWE-94 Sep 21, 2018
CVE-2000-0402 4 PoCs Analysis EPSS 0.78
Microsoft SQL Server 7.0 - Info Disclosure
The Mixed Mode authentication capability in Microsoft SQL Server 7.0 stores the System Administrator (sa) account in plaintext in a log file which is readable by any user, aka the "SQL Server 7.0 Service Pack Password" vulnerability.
May 30, 2000
CVE-2009-3869 2 PoCs Analysis EPSS 0.78
Sun Java JRE AWT setDiffICM Buffer Overflow
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
CWE-119 Nov 05, 2009
CVE-2004-1305 1 PoC Analysis EPSS 0.78
Nortel IP Softphone 2050 - Denial of Service
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.
Dec 23, 2004
CVE-2004-1595 3 PoCs Analysis EPSS 0.78
Shixxnote - Buffer Overflow
Buffer overflow in ShixxNote 6.net build 117 allows remote attackers to execute arbitrary code via a long font field.
Oct 13, 2004
CVE-2007-1749 1 PoC Analysis EPSS 0.78
Microsoft Internet Explorer - Buffer Overflow
Integer underflow in the CDownloadSink class code in the Vector Markup Language (VML) component (VGX.DLL), as used in Internet Explorer 5.01, 6, and 7 allows remote attackers to execute arbitrary code via compressed content with an invalid buffer size, which triggers a heap-based buffer overflow.
Aug 14, 2007
CVE-2013-2068 2 PoCs Analysis EPSS 0.78
Redhat Cloudforms Management Engine - Path Traversal
Multiple directory traversal vulnerabilities in the AgentController in Red Hat CloudForms Management Engine 2.0 allow remote attackers to create and overwrite arbitrary files via a .. (dot dot) in the filename parameter to the (1) log, (2) upload, or (3) linuxpkgs method.
CWE-22 Sep 28, 2013
CVE-2014-10021 EXPLOITED 3 PoCs Analysis EPSS 0.78
Wpsymposiumpro WP Symposium - Unrestricted File Upload
Unrestricted file upload vulnerability in UploadHandler.php in the WP Symposium plugin 14.11 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in server/php/.
Jan 13, 2015
CVE-2024-29868 9.1 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.78
Apache StreamPipes <0.95.0 - Info Disclosure
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism. This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account. This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0. Users are recommended to upgrade to version 0.95.0, which fixes the issue.
CWE-338 Jun 24, 2024