High EPSS Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
3,485 results Clear all
CVE-2021-25641 9.8 CRITICAL 2 PoCs Analysis EPSS 0.75
Apache Dubbo < 2.6.9 - Insecure Deserialization
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
CWE-502 Jun 01, 2021
CVE-2011-1213 3 PoCs Analysis EPSS 0.75
IBM Lotus Notes < 8.5.2.2 - Numeric Error
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
CWE-189 May 31, 2011
CVE-2022-29009 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.75
Cyber Cafe Management System Project v1.0 - SQL Injection
Multiple SQL injection vulnerabilities via the username and password parameters in the Admin panel of Cyber Cafe Management System Project v1.0 allows attackers to bypass authentication.
CWE-89 May 11, 2022
CVE-2017-14980 9.8 CRITICAL 10 PoCs Analysis EPSS 0.75
Flexense Syncbreeze - Memory Corruption
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
CWE-119 Oct 10, 2017
CVE-2013-0757 3 PoCs Analysis EPSS 0.75
Firefox 17.0.1 Flash Privileged Code Injection
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
CWE-20 Jan 13, 2013
CVE-2015-7768 3 PoCs Analysis EPSS 0.75
Konica Minolta FTP Utility 1.0 - RCE
Buffer overflow in Konica Minolta FTP Utility 1.0 allows remote attackers to execute arbitrary code via a long CWD command.
CWE-119 Oct 09, 2015
CVE-2021-40345 7.2 HIGH 1 PoC Analysis EPSS 0.75
Nagios XI <5.8.5 - Command Injection
An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of the Admin panel, an administrator can upload ZIP files. A command injection (within the name of the first file in the archive) allows an attacker to execute system commands.
CWE-77 Oct 26, 2021
CVE-2008-4841 EXPLOITED 1 PoC Analysis EPSS 0.75
Microsoft Wordpad - Resource Management Error
The WordPad Text Converter for Word 97 files in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted (1) .doc, (2) .wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008. NOTE: As of 20081210, it is unclear whether this vulnerability is related to a WordPad issue disclosed on 20080925 with a 2008-crash.doc.rar example, but there are insufficient details to be sure.
CWE-399 Dec 10, 2008
CVE-2011-3322 2 PoCs Analysis EPSS 0.75
Scadatec Procyon Scada - Memory Corruption
Core Server HMI Service (Coreservice.exe) in Scadatec Limited Procyon SCADA 1.06, and other versions before 1.14, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password to the Telnet (TCP/23) port, which triggers an out-of-bounds read or write, leading to a stack-based buffer overflow.
CWE-119 Sep 15, 2011
CVE-2012-2311 EXPLOITED 4 PoCs Analysis EPSS 0.75
Php < 5.3.12 - SQL Injection
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
CWE-89 May 11, 2012
CVE-2018-0833 5.3 MEDIUM 1 PoC Analysis EPSS 0.75
Microsoft Windows 8.1 - NULL Pointer Dereference
The Microsoft Server Message Block 2.0 and 3.0 (SMBv2/SMBv3) client in Windows 8.1 and RT 8.1 and Windows Server 2012 R2 allows a denial of service vulnerability due to how specially crafted requests are handled, aka "SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability".
CWE-476 Feb 15, 2018
CVE-2009-1260 3 PoCs Analysis EPSS 0.75
Ezbsystems Ultraiso < 9.3.3 - Memory Corruption
Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.
CWE-119 Apr 07, 2009
CVE-2011-5130 3 PoCs Analysis EPSS 0.75
Haudenschilt Family Connections Cms - Code Injection
dev/less.php in Family Connections CMS (FCMS) 2.5.0 - 2.7.1, when register_globals is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in the argv[1] parameter.
CWE-94 Aug 30, 2012
CVE-2007-4466 2 PoCs Analysis EPSS 0.75
EA SnoopyCtrl < - RCE
Multiple stack-based buffer overflows in Electronic Arts (EA) SnoopyCtrl ActiveX control (NPSnpy.dll) allow remote attackers to execute arbitrary code via unspecified methods and parameters.
CWE-119 Oct 09, 2007
CVE-2004-1043 EXPLOITED 1 PoC Analysis EPSS 0.75
Internet Explorer 6.0 on Windows XP SP2 - RCE
Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to execute arbitrary code by using the "Related Topics" command in the Help ActiveX Control (hhctrl.ocx) to open a Help popup window containing the PCHealth tools.htm file in the local zone and injecting Javascript to be executed, as demonstrated using "writehta.txt" and the ADODB recordset, which saves a .HTA file to the local system, aka the "HTML Help ActiveX control Cross Domain Vulnerability."
Dec 31, 2004
CVE-2013-4730 13 PoCs Analysis EPSS 0.74
PCMan's FTP Server 2.0.7 - RCE
Buffer overflow in PCMan's FTP Server 2.0.7 allows remote attackers to execute arbitrary code via a long string in a USER command.
CWE-119 May 15, 2014
CVE-2020-9715 7.8 HIGH KEV 3 PoCs Analysis EPSS 0.74
Adobe Acrobat DC < 15.006.30523 - Use After Free
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
CWE-416 Aug 19, 2020
CVE-2022-27927 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.74
Microfinance Management System - SQL Injection
A SQL injection vulnerability exists in Microfinance Management System 1.0 when MySQL is being used as the application database. An attacker can issue SQL commands to the MySQL database through the vulnerable course_code and/or customer_number parameter.
CWE-89 Apr 19, 2022
CVE-2007-1683 2 PoCs Analysis EPSS 0.74
Incredimail Immenushellext Activex Control - Buffer Overflow
Stack-based buffer overflow in the DoWebMenuAction function in the IncrediMail IMMenuShellExt ActiveX control (ImShExt.dll) allows remote attackers to execute arbitrary code via unspecified vectors.
Apr 26, 2007
CVE-2004-0380 3 PoCs Analysis EPSS 0.74
Microsoft Outlook Express <6 - Auth Bypass
The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
May 04, 2004