High EPSS Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,484 results
Clear all
CVE-2016-0854
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.72
Advantech WebAccess <8.1 - File Upload
Unrestricted file upload vulnerability in the uploadImageCommon function in the UploadAjaxAction script in the WebAccess Dashboard Viewer in Advantech WebAccess before 8.1 allows remote attackers to write to files of arbitrary types via unspecified vectors.
Jan 15, 2016
CVE-2006-1551
2 PoCs
Analysis
EPSS 0.72
PAJAX <0.5.1 - Code Injection
Eval injection vulnerability in pajax_call_dispatcher.php in PAJAX 0.5.1 and earlier allows remote attackers to execute arbitrary code via the (1) $method and (2) $args parameters.
Apr 13, 2006
CVE-2013-0136
3 PoCs
Analysis
EPSS 0.72
Mutiny < 5.0-1.10 - Path Traversal
Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation.
CWE-22
Jun 01, 2013
CVE-2006-4704
EXPLOITED
2 PoCs
Analysis
EPSS 0.72
Microsoft Visual Studio 2005 - XSS
Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils.WMIObjectBroker2) ActiveX control (WmiScriptUtils.dll) in Microsoft Visual Studio 2005 allows remote attackers to bypass Internet zone restrictions and execute arbitrary code by instantiating dangerous objects, aka "WMI Object Broker Vulnerability."
Nov 01, 2006
CVE-2018-8145
7.5
HIGH
1 PoC
Analysis
EPSS 0.72
Chakra < - Memory Corruption
An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer or data, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-0943, CVE-2018-8130, CVE-2018-8133, CVE-2018-8177.
CWE-200
May 09, 2018
CVE-2012-4031
2 PoCs
Analysis
EPSS 0.72
Wangkongbao Cns-1000 - Path Traversal
Multiple directory traversal vulnerabilities in src/acloglogin.php in Wangkongbao CNS-1000 and 1100 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) langid cookie to port 85.
CWE-22
Jul 17, 2012
CVE-2018-1285
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.72
Apache Log4net < 2.0.10 - XXE
Apache log4net versions before 2.0.10 do not disable XML external entities when parsing log4net configuration files. This allows for XXE-based attacks in applications that accept attacker-controlled log4net configuration files.
CWE-611
May 11, 2020
CVE-2022-33174
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.72
Powertek firmware <3.30.30 - Auth Bypass
Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext.
CWE-863
Jun 13, 2022
CVE-2023-21707
8.8
HIGH
1 PoC
Analysis
EPSS 0.72
Microsoft Exchange Server - RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502
Feb 14, 2023
CVE-2015-6127
2 PoCs
Analysis
EPSS 0.72
Microsoft Windows 7 - Information Disclosure
Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows remote attackers to read arbitrary files via a crafted .mcl file, aka "Windows Media Center Information Disclosure Vulnerability."
CWE-200
Dec 09, 2015
CVE-2011-2386
2 PoCs
Analysis
EPSS 0.72
Visiwave Site Survey < 2.1 - Code Injection
VisiWaveReport.exe in AZO Technologies, Inc. VisiWave Site Survey before 2.1.9 allows user-assisted remote attackers to execute arbitrary code via a (1) vws and (2) vwr file with an invalid Type property, which triggers an untrusted pointer dereference.
CWE-94
Jun 08, 2011
CVE-2011-5001
2 PoCs
Analysis
EPSS 0.72
Trend Micro Control Manager < 5.5 - Memory Corruption
Stack-based buffer overflow in the CGenericScheduler::AddTask function in cmdHandlerRedAlertController.dll in CmdProcessor.exe in Trend Micro Control Manager 5.5 before Build 1613 allows remote attackers to execute arbitrary code via a crafted IPC packet to TCP port 20101.
CWE-119
Dec 25, 2011
CVE-2024-7094
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.72
JS Help Desk & Support Plugin <2.8.7 - RCE
The JS Help Desk – The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.8.6 via the 'storeTheme' function. This is due to a lack of sanitization on user-supplied values, which replace values in the style.php file, along with missing capability checks. This makes it possible for unauthenticated attackers to execute code on the server. This issue was partially patched in 2.8.6 when the code injection issue was resolved, and fully patched in 2.8.7 when the missing authorization and cross-site request forgery protection was added. CVE-2024-43274 is likely a duplicate of this issue.
CWE-94
Aug 13, 2024
CVE-2009-1029
5 PoCs
Analysis
EPSS 0.72
Poppeeper Pop Peeper < 3.4.0.0 - Memory Corruption
Stack-based buffer overflow in POP Peeper 3.4.0.0 and earlier allows remote POP3 servers to execute arbitrary code via a long Date header, related to Imap.dll.
CWE-119
Mar 20, 2009
CVE-2009-3429
7 PoCs
Analysis
EPSS 0.72
Pirateradio Destiny Media Player - Memory Corruption
Stack-based buffer overflow in Pirate Radio Destiny Media Player 1.61 allows remote attackers to execute arbitrary code via a long string in a .pls playlist file.
CWE-119
Sep 25, 2009
CVE-2006-6133
1 PoC
Analysis
EPSS 0.72
Businessobjects Crystal Reports XI - Memory Corruption
Stack-based buffer overflow in Visual Studio Crystal Reports for Microsoft Visual Studio .NET 2002 and 2002 SP1, .NET 2003 and 2003 SP1, and 2005 and 2005 SP1 (formerly Business Objects Crystal Reports XI Professional) allows user-assisted remote attackers to execute arbitrary code via a crafted RPT file.
CWE-119
Nov 28, 2006
CVE-2008-3878
3 PoCs
Analysis
EPSS 0.72
Ultra Office Control <2.0.2008.801 - Buffer Overflow
Stack-based buffer overflow in the Ultra.OfficeControl ActiveX control in OfficeCtrl.ocx 2.0.2008.801 in Ultra Shareware Ultra Office Control allows remote attackers to execute arbitrary code via long strUrl, strFile, and strPostData parameters to the HttpUpload method.
CWE-119
Sep 02, 2008
CVE-2021-28482
8.8
HIGH
EXPLOITED
RANSOMWARE
2 PoCs
Analysis
EPSS 0.72
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Apr 13, 2021
CVE-2024-37085
6.8
MEDIUM
KEV
RANSOMWARE
4 PoCs
Analysis
EPSS 0.72
Vmware Esxi < 5.2 - Authentication Bypass
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
CWE-305
Jun 25, 2024
CVE-2008-0112
1 PoC
Analysis
EPSS 0.72
Microsoft Excel - Code Injection
Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file that is not properly handled when importing the file, aka "Excel File Import Vulnerability."
CWE-94
Mar 11, 2008