High EPSS Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2005-4360
2 PoCs
Analysis
EPSS 0.78
Microsoft IIS 5.1 - RCE
The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using "/_vti_bin/.dll/*/~0". NOTE: the consequence was originally believed to be only a denial of service (application crash and reboot).
CWE-252
Dec 20, 2005
CVE-2020-9015
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.78
Arista restricted shell escape (with privesc)
Arista DCS-7050QX-32S-R 4.20.9M, DCS-7050CX3-32S-R 4.20.11M, and DCS-7280SRAM-48C6-R 4.22.0.1F devices (and possibly other products) allow attackers to bypass intended TACACS+ shell restrictions via a | character. NOTE: the vendor reports that this is a configuration issue relating to an overly permissive regular expression in the TACACS+ server permitted commands
Feb 20, 2020
CVE-2021-43258
8.8
HIGH
2 PoCs
Analysis
EPSS 0.78
ChurchInfo <1.3.0 - RCE
CartView.php in ChurchInfo 1.3.0 allows attackers to achieve remote code execution through insecure uploads. This requires authenticated access tot he ChurchInfo application. Once authenticated, a user can add names to their cart, and compose an email. Uploading an attachment for the email stores the attachment on the site in the /tmp_attach/ folder where it can be accessed with a GET request. There are no limitations on files that can be attached, allowing for malicious PHP code to be uploaded and interpreted by the server.
CWE-434
Nov 23, 2022
CVE-2014-5301
8.8
HIGH
2 PoCs
Analysis
EPSS 0.78
Manageengine Servicedesk Plus - Path Traversal
Directory traversal vulnerability in ServiceDesk Plus MSP v5 to v9.0 v9030; AssetExplorer v4 to v6.1; SupportCenter v5 to v7.9; IT360 v8 to v10.4.
CWE-22
Aug 28, 2017
CVE-2025-68613
9.9
CRITICAL
KEV
36 PoCs
Analysis
NUCLEI
EPSS 0.78
n8n Workflow Expression Remote Code Execution
n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.
CWE-913
Dec 19, 2025
CVE-2010-0248
8.1
HIGH
2 PoCs
Analysis
EPSS 0.78
Microsoft Internet Explorer - Code Injection
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
CWE-94
Jan 22, 2010
CVE-2006-1190
1 PoC
Analysis
EPSS 0.78
Microsoft Internet Explorer <6 - RCE
Microsoft Internet Explorer 5.01 through 6 does not always return the correct IOleClientSite information when dynamically creating an embedded object, which could cause Internet Explorer to run the object in the wrong security context or zone, and allow remote attackers to execute arbitrary code.
Apr 11, 2006
CVE-2018-1612
5.8
MEDIUM
2 PoCs
Analysis
EPSS 0.78
IBM QRadar <7.3 - Auth Bypass
IBM QRadar Incident Forensics (IBM QRadar SIEM 7.2, and 7.3) could allow a remote attacker to bypass authentication and obtain sensitive information. IBM X-Force ID: 144164.
CWE-200
Jul 17, 2018
CVE-2005-0595
3 PoCs
Analysis
EPSS 0.78
Working Resources. Badblue - Buffer Overflow
Buffer overflow in ext.dll in BadBlue 2.55 allows remote attackers to execute arbitrary code via a long mfcisapicommand parameter.
May 02, 2005
CVE-2018-15710
7.8
HIGH
3 PoCs
Analysis
EPSS 0.78
Nagios XI - OS Command Injection
Nagios XI 5.5.6 allows local authenticated attackers to escalate privileges to root via Autodiscover_new.php.
CWE-78
Nov 14, 2018
CVE-2016-7190
7.5
HIGH
2 PoCs
Analysis
EPSS 0.78
Microsoft Edge - Memory Corruption
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3386, CVE-2016-3389, and CVE-2016-7194.
CWE-119
Oct 14, 2016
CVE-2002-2226
3 PoCs
Analysis
EPSS 0.78
Tftpd32 < 2.21 - Memory Corruption
Buffer overflow in tftpd of TFTP32 2.21 and earlier allows remote attackers to execute arbitrary code via a long filename argument.
CWE-119
Dec 31, 2002
CVE-2024-39943
9.9
CRITICAL
3 PoCs
Analysis
EPSS 0.78
Rejetto HTTP File Server < 0.52.10 - Improper Access Control
rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).
CWE-78
Jul 04, 2024
CVE-2013-0625
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.78
Adobe ColdFusion <9.0.2 - Auth Bypass
Adobe ColdFusion 9.0, 9.0.1, and 9.0.2, when a password is not configured, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013.
CWE-287
Jan 09, 2013
CVE-2005-0353
3 PoCs
Analysis
EPSS 0.78
Safenet Sentinel License Manager - Buffer Overflow
Buffer overflow in the Sentinel LM (Lservnt) service in the Sentinel License Manager 7.2.0.2 allows remote attackers to execute arbitrary code by sending a large amount of data to UDP port 5093.
May 02, 2005
CVE-2018-10933
9.1
CRITICAL
43 PoCs
Analysis
EPSS 0.78
libssh Authentication Bypass Scanner
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
CWE-287
Oct 17, 2018
CVE-2022-22733
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.78
Apache Shardingsphere Elasticjob-ui - Information Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache ShardingSphere ElasticJob-UI allows an attacker who has guest account to do privilege escalation. This issue affects Apache ShardingSphere ElasticJob-UI Apache ShardingSphere ElasticJob-UI 3.x version 3.0.0 and prior versions.
CWE-200
Jan 20, 2022
CVE-2008-1610
4 PoCs
Analysis
EPSS 0.78
TallSoft Quick TFTP Server Pro 2.1 - Buffer Overflow
Stack-based buffer overflow in TallSoft Quick TFTP Server Pro 2.1 allows remote attackers to cause a denial of service or execute arbitrary code via a long mode field in a read or write request.
CWE-119
Apr 01, 2008
CVE-2023-5991
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.78
Motopress Hotel Booking Lite < 4.8.5 - Path Traversal
The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server
CWE-22
Dec 26, 2023
CVE-2016-3213
8.8
HIGH
1 PoC
Analysis
EPSS 0.78
Microsoft Internet Explorer - Access Control
The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 9 through 11 has an improper fallback mechanism, which allows remote attackers to gain privileges via NetBIOS name responses, aka "WPAD Elevation of Privilege Vulnerability."
CWE-264
Jun 16, 2016