High EPSS Vulnerabilities with Public Exploits
Updated 54m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2010-2883
7.3
HIGH
KEV
6 PoCs
Analysis
EPSS 0.93
Adobe Reader/Acrobat <9.4-8.2.5 - Buffer Overflow
Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
CWE-787
Sep 09, 2010
CVE-2016-0957
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.93
Adobe Experience Manager <6.1.0 - SSRF
Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors.
Feb 10, 2016
CVE-2023-34039
9.8
CRITICAL
6 PoCs
Analysis
NUCLEI
EPSS 0.93
VMWare Aria Operations for Networks (vRealize Network Insight) SSH Private Key Exposure
Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI.
CWE-327
Aug 29, 2023
CVE-2021-40323
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.93
Cobbler <3.3.0 - RCE
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
CWE-94
Oct 04, 2021
CVE-2014-0497
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.93
Adobe Flash Player Integer Underflow Remote Code Execution
Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
CWE-191
Feb 05, 2014
CVE-2024-10400
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Themeum Tutor Lms < 2.7.6 - SQL Injection
The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the ‘rating_filter’ parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Nov 21, 2024
CVE-2023-47218
5.8
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Qnap Qts < 5.1.5.2645 - Command Injection
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.5.2645 build 20240116 and later
QuTS hero h5.1.5.2647 build 20240118 and later
QuTScloud c5.1.5.2651 and later
CWE-78
Feb 13, 2024
CVE-2015-5119
9.8
CRITICAL
KEV
RANSOMWARE
7 PoCs
Analysis
EPSS 0.93
Adobe Flash Player ByteArray Use After Free
Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
CWE-416
Jul 08, 2015
CVE-2023-43261
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Milesight <v35.3.0.7 - Info Disclosure
An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.
CWE-532
Oct 04, 2023
CVE-2016-6415
7.5
HIGH
KEV
4 PoCs
Analysis
EPSS 0.93
Cisco IKE Information Disclosure
The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.
CWE-200
Sep 19, 2016
CVE-2014-0094
EXPLOITED
4 PoCs
Analysis
EPSS 0.93
Apache Struts <2.3.16.2 - RCE
The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method.
Mar 11, 2014
CVE-2024-5084
9.8
CRITICAL
8 PoCs
Analysis
NUCLEI
EPSS 0.93
Hashthemes Hash Form < 1.1.1 - Unrestricted File Upload
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
May 23, 2024
CVE-2020-12641
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Roundcube Webmail <1.4.4 - RCE
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
CWE-78
May 04, 2020
CVE-2015-3035
7.5
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.93
TP-LINK Various - Path Traversal
Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.
CWE-22
Apr 22, 2015
CVE-2023-27372
9.8
CRITICAL
EXPLOITED
16 PoCs
Analysis
NUCLEI
EPSS 0.93
Spip < 3.2.18 - Insecure Deserialization
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
CWE-502
Feb 28, 2023
CVE-2012-1889
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.93
Microsoft Xml Core Services - Out-of-Bounds Write
Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
CWE-787
Jun 13, 2012
CVE-2007-5659
7.8
HIGH
KEV
3 PoCs
Analysis
EPSS 0.93
Adobe Acrobat < 8.1.2 - Buffer Overflow
Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.
CWE-120
Feb 12, 2008
CVE-2023-25135
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Vbulletin - Insecure Deserialization
vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
CWE-502
Feb 03, 2023
CVE-2022-24716
7.5
HIGH
EXPLOITED
10 PoCs
Analysis
NUCLEI
EPSS 0.93
Icinga Web 2 <2.9.5 - Info Disclosure
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
CWE-22
Mar 08, 2022
CVE-2022-23134
3.7
LOW
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.93
Zabbix < 5.4.8 - Improper Access Control
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
CWE-284
Jan 13, 2022