High EPSS Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2021-37589
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.78
Virtuasoftware Cobranca < 12r - SQL Injection
Virtua Cobranca before 12R allows SQL Injection on the login page.
CWE-89
Jun 07, 2022
CVE-2011-5165
9 PoCs
Analysis
EPSS 0.78
Cleanersoft Free Mp3 CD Ripper < 2.6 - Memory Corruption
Stack-based buffer overflow in Free MP3 CD Ripper 1.1, 2.6 and earlier, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted .wav file.
CWE-119
Sep 15, 2012
CVE-2013-4824
1 PoC
Analysis
EPSS 0.78
HP iMC - Auth Bypass
Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-1644.
CWE-287
Oct 13, 2013
CVE-2015-7765
2 PoCs
Analysis
EPSS 0.78
ZOHO ManageEngine OpManager <11.5.11600 - Auth Bypass
ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password.
Oct 09, 2015
CVE-2024-3393
7.5
HIGH
KEV
2 PoCs
EPSS 0.78
Palo Alto Networks PAN-OS - DoS
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
CWE-754
Dec 27, 2024
CVE-2008-5619
2 PoCs
Analysis
EPSS 0.78
Chuggnutt HTML to Text Converter <5.2.10 - RCE
html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.
CWE-94
Dec 17, 2008
CVE-2007-1819
3 PoCs
Analysis
EPSS 0.78
HP Mercury Quality Center - Memory Corruption
Stack-based buffer overflow in the SPIDERLib.Loader ActiveX control (Spider90.ocx) 9.1.0.4353 in TestDirector (TD) for Mercury Quality Center 9.0 before Patch 12.1, and 8.2 SP1 before Patch 32, allows remote attackers to execute arbitrary code via a long ProgColor property.
CWE-119
Apr 02, 2007
CVE-2024-48766
8.6
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.78
Netalertx < 24.10.12 - Path Traversal
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
CWE-22
May 13, 2025
CVE-2012-2611
4 PoCs
Analysis
EPSS 0.78
SAP NetWeaver <7.0 EHP2 - RCE
The DiagTraceR3Info function in the Dialog processor in disp+work.exe 7010.29.15.58313 and 7200.70.18.23869 in the Dispatcher in SAP NetWeaver 7.0 EHP1 and EHP2, when a certain Developer Trace configuration is enabled, allows remote attackers to execute arbitrary code via a crafted SAP Diag packet.
CWE-20
May 15, 2012
CVE-2007-6026
EXPLOITED
1 PoC
Analysis
EPSS 0.78
Microsoft msjet40.dll <4.0.8618.0 - Buffer Overflow
Stack-based buffer overflow in Microsoft msjet40.dll 4.0.8618.0 (aka Microsoft Jet Engine), as used by Access 2003 in Microsoft Office 2003 SP3, allows user-assisted attackers to execute arbitrary code via a crafted MDB file database file containing a column structure with a modified column count. NOTE: this might be the same issue as CVE-2005-0944.
CWE-119
Nov 20, 2007
CVE-2011-1566
4 PoCs
Analysis
EPSS 0.78
7-Technologies IGSS <9.00.00.11059 - Path Traversal
Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397.
CWE-22
Apr 05, 2011
CVE-2019-25066
6.3
MEDIUM
2 PoCs
Analysis
EPSS 0.78
ajenti <2.1.31 - Privilege Escalation
A vulnerability has been found in ajenti 2.1.31 and classified as critical. This vulnerability affects unknown code of the component API. The manipulation leads to privilege escalation. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.32 is able to address this issue. The name of the patch is 7aa146b724e0e20cfee2c71ca78fafbf53a8767c. It is recommended to upgrade the affected component.
CWE-78
Jun 09, 2022
CVE-2025-48827
10.0
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.78
vBulletin <6.0.3 - RCE
vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025.
CWE-424
May 27, 2025
CVE-2009-2727
2 PoCs
Analysis
EPSS 0.78
IBM AIX <6.1.3 - Buffer Overflow
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.
CWE-119
Aug 10, 2009
CVE-2001-0506
1 PoC
Analysis
EPSS 0.78
Microsoft Internet Information Server - Buffer Overflow
Buffer overflow in ssinc.dll in IIS 5.0 and 4.0 allows local users to gain system privileges via a Server-Side Includes (SSI) directive for a long filename, which triggers the overflow when the directory name is added, aka the "SSI privilege elevation" vulnerability.
Sep 20, 2001
CVE-2023-40028
4.9
MEDIUM
11 PoCs
Analysis
EPSS 0.78
Ghost < 5.59.1 - Path Traversal
Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-22
Aug 15, 2023
CVE-2021-42342
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.78
Embedthis Goahead < 4.1.3 - Unrestricted File Upload
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
CWE-434
Oct 14, 2021
CVE-2010-1318
3 PoCs
Analysis
EPSS 0.78
AgentX++ <1.4.16 - Buffer Overflow
Stack-based buffer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via unspecified vectors.
CWE-119
Apr 20, 2010
CVE-2007-5244
3 PoCs
Analysis
EPSS 0.78
Borland Software Interbase - Memory Corruption
Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 through 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote attackers to execute arbitrary code via a long attach request on TCP port 3050 to the open_marker_file function.
CWE-119
Oct 06, 2007
CVE-2014-6041
3 PoCs
Analysis
EPSS 0.78
Android Browser RCE Through Google Play Store XFO
The Android WebView in Android before 4.4 allows remote attackers to bypass the Same Origin Policy via a crafted attribute containing a \u0000 character, as demonstrated by an onclick="window.open('\u0000javascript: sequence to the Android Browser application 4.2.1 or a third-party web browser.
CWE-264
Sep 02, 2014