High EPSS Vulnerabilities with Public Exploits
Updated 47m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2018-15812
7.5
HIGH
2 PoCs
Analysis
EPSS 0.78
DotNetNuke Cookie Deserialization Remote Code Excecution
DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy.
CWE-331
Jul 03, 2019
CVE-2018-7573
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.78
Ftpshell Client - Memory Corruption
An issue was discovered in FTPShell Client 6.7. A remote FTP server can send 400 characters of 'F' in conjunction with the FTP 220 response code to crash the application; after this overflow, one can run arbitrary code on the victim machine. This is similar to CVE-2009-3364 and CVE-2017-6465.
CWE-119
Mar 01, 2018
CVE-2007-1373
4 PoCs
Analysis
EPSS 0.78
Pmail Mercury Mail Transport System < 4.01b - Buffer Overflow
Stack-based buffer overflow in Mercury/32 (aka Mercury Mail Transport System) 4.01b and earlier allows remote attackers to execute arbitrary code via a long LOGIN command. NOTE: this might be the same issue as CVE-2006-5961.
Mar 10, 2007
CVE-2020-27386
8.8
HIGH
1 PoC
Analysis
EPSS 0.78
FlexDotnetCMS <1.5.9 - RCE
An unrestricted file upload issue in FlexDotnetCMS before v1.5.9 allows an authenticated remote attacker to upload and execute arbitrary files by using the FileManager to upload malicious code (e.g., ASP code) in the form of a safe file type (e.g., a TXT file), and then using the FileEditor (in v1.5.8 and prior) or the FileManager's rename function (in v1.5.7 and prior) to rename the file to an executable extension (e.g., ASP), and finally executing the file via an HTTP GET request to /<path_to_file>.
CWE-434
Nov 12, 2020
CVE-2012-0911
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.78
TikiWiki CMS/Groupware < 6.7 LTS & < 8.4 - RCE
TikiWiki CMS/Groupware before 6.7 LTS and before 8.4 allows remote attackers to execute arbitrary PHP code via a crafted serialized object in the (1) cookieName to lib/banners/bannerlib.php; (2) printpages or (3) printstructures parameter to (a) tiki-print_multi_pages.php or (b) tiki-print_pages.php; or (4) sendpages, (5) sendstructures, or (6) sendarticles parameter to tiki-send_objects.php, which is not properly handled when processed by the unserialize function.
CWE-502
Jul 12, 2012
CVE-2010-1587
3 PoCs
Analysis
EPSS 0.78
Apache ActiveMQ <5.3.2 and <5.4.0 - Info Disclosure
The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.
CWE-20
Apr 28, 2010
CVE-2017-5941
9.8
CRITICAL
9 PoCs
Analysis
EPSS 0.78
Node-serialize < 0.0.4 - Insecure Deserialization
An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
CWE-502
Feb 09, 2017
CVE-2016-7203
7.5
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.78
Microsoft Edge < 1.2.2 - Memory Corruption
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
CWE-119
Nov 10, 2016
CVE-2017-1092
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.78
IBM Informix Open Admin Tool <12.1 - RCE
IBM Informix Open Admin Tool 11.5, 11.7, and 12.1 could allow an unauthorized user to execute arbitrary code as system admin on Windows servers. IBM X-Force ID: 120390.
May 22, 2017
CVE-2025-2945
9.9
CRITICAL
7 PoCs
Analysis
EPSS 0.78
pgAdmin Query Tool authenticated RCE (CVE-2025-2945)
Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules).
The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution.
This issue affects pgAdmin 4: before 9.2.
CWE-94
Apr 03, 2025
CVE-2017-9757
8.8
HIGH
3 PoCs
Analysis
EPSS 0.78
IPFire 2.19 - Command Injection
IPFire 2.19 has a Remote Command Injection vulnerability in ids.cgi via the OINKCODE parameter, which is mishandled by a shell. This can be exploited directly by authenticated users, or through CSRF.
CWE-78
Jun 19, 2017
CVE-2022-33679
8.1
HIGH
5 PoCs
Analysis
EPSS 0.78
Windows Kerberos - Privilege Escalation
Windows Kerberos Elevation of Privilege Vulnerability
Sep 13, 2022
CVE-2014-6308
1 PoC
Analysis
NUCLEI
EPSS 0.78
OSClass <3.4.2 - Path Traversal
Directory traversal vulnerability in OSClass before 3.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter in a render action to oc-admin/index.php.
CWE-22
Oct 20, 2014
CVE-2009-4006
2 PoCs
Analysis
EPSS 0.78
RhinoSoft Serv-U <9.1.0.0 - Buffer Overflow
Stack-based buffer overflow in the TEA decoding algorithm in RhinoSoft Serv-U FTP server 7.0.0.1, 9.0.0.5, and other versions before 9.1.0.0 allows remote attackers to execute arbitrary code via a long hexadecimal string.
CWE-119
Nov 20, 2009
CVE-2011-3494
3 PoCs
Analysis
EPSS 0.78
eSignal <10.6.2425 - RCE/DoS
WinSig.exe in eSignal 10.6.2425 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a long StyleTemplate element in a QUO, SUM or POR file, which triggers a stack-based buffer overflow, or (2) a long Font->FaceName field (aka FaceName element), which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
CWE-119
Sep 16, 2011
CVE-2014-1683
3 PoCs
Analysis
EPSS 0.78
SkyBlueCanvas CMS <1.1 r248-04 - RCE
The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.
CWE-134
Jan 29, 2014
CVE-2004-0313
6 PoCs
Analysis
EPSS 0.78
Psoproxy Server - Buffer Overflow
Buffer overflow in PSOProxy 0.91 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP request, as demonstrated using a long (1) GET argument or (2) method name.
Nov 23, 2004
CVE-2020-10808
8.8
HIGH
1 PoC
Analysis
EPSS 0.78
VestaCP <0.9.8-26 - Command Injection
Vesta Control Panel (VestaCP) through 0.9.8-26 allows Command Injection via the schedule/backup Backup Listing Endpoint. The attacker must be able to create a crafted filename on the server, as demonstrated by an FTP session that renames .bash_logout to a .bash_logout' substring followed by shell metacharacters.
CWE-78
Mar 22, 2020
CVE-2024-54385
7.2
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.78
SoftLab Radio Player <2.0.82 - SSRF
Server-Side Request Forgery (SSRF) vulnerability in princeahmed Radio Player radio-player allows Server Side Request Forgery.This issue affects Radio Player: from n/a through <= 2.0.83.
CWE-918
Dec 16, 2024
CVE-2007-0169
2 PoCs
Analysis
EPSS 0.78
Broadcom Brightstor Arcserve Backup < 11.5 - Memory Corruption
Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allow remote attackers to execute arbitrary code via RPC requests with crafted data for opnums (1) 0x2F and (2) 0x75 in the (a) Message Engine RPC service, or opnum (3) 0xCF in the Tape Engine service.
CWE-119
Jan 11, 2007