High EPSS Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,483 results
Clear all
CVE-2023-46818
7.2
HIGH
12 PoCs
Analysis
NUCLEI
EPSS 0.89
ISPConfig language_edit.php PHP Code Injection
An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled.
CWE-94
Oct 27, 2023
CVE-2004-1080
3 PoCs
Analysis
EPSS 0.89
Microsoft Windows NT/2000/Server 2003 - RCE
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
Jan 10, 2005
CVE-2024-29272
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.89
VvvebJs < 1.7.5 - Arbitrary File Upload
Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php.
CWE-434
Mar 22, 2024
CVE-2021-39165
8.1
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.89
Chachethq Cachet < 2.3.18 - Authentication Bypass
Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.
CWE-287
Aug 26, 2021
CVE-2016-5674
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.89
NUUO NVRmini <3.0.0 - RCE
__debugging_center_utils___.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.7.5 through 3.0.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the log parameter.
CWE-20
Aug 31, 2016
CVE-2015-7245
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.89
D-link Dvg-n5402sp Firmware - Path Traversal
Directory traversal vulnerability in D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 allows remote attackers to read sensitive information via a .. (dot dot) in the errorpage parameter.
CWE-22
Apr 24, 2017
CVE-2018-8298
7.5
HIGH
KEV
1 PoC
Analysis
EPSS 0.89
ChakraCore - Memory Corruption
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296.
CWE-843
Jul 11, 2018
CVE-2018-11510
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
EPSS 0.89
Asustor Adm < 3.1.2.rhg1 - OS Command Injection
The ASUSTOR ADM 3.1.0.RFQ3 NAS portal suffers from an unauthenticated remote code execution vulnerability in the portal/apis/aggrecate_js.cgi file by embedding OS commands in the 'script' parameter.
CWE-78
Jun 28, 2018
CVE-2016-7255
7.8
HIGH
KEV
RANSOMWARE
11 PoCs
Analysis
EPSS 0.89
Microsoft Windows - Privilege Escalation
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
Nov 10, 2016
CVE-2018-10661
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
EPSS 0.89
Axis IP Cameras - Auth Bypass
An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control.
Jun 26, 2018
CVE-2016-7547
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.89
Trend Micro Threat Discovery Appliance admin_sys_time.cgi Remote Command Execution
A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface.
CWE-361
Apr 12, 2017
CVE-2014-7186
EXPLOITED
2 PoCs
Analysis
EPSS 0.89
GNU Bash <4.3 - DoS
The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
CWE-119
Sep 28, 2014
CVE-2011-2140
EXPLOITED
3 PoCs
Analysis
EPSS 0.89
Adobe Flash Player <10.3.183.5 - Memory Corruption
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.
CWE-119
Aug 10, 2011
CVE-2019-16072
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.89
NETSAS Enigma NMS <65.0.0 - Command Injection
An OS command injection vulnerability in the discover_and_manage CGI script in NETSAS Enigma NMS 65.0.0 and prior allows an attacker to execute arbitrary code because of improper neutralization of shell metacharacters in the ip_address variable within an snmp_browser action.
CWE-78
Mar 20, 2020
CVE-2024-43425
8.1
HIGH
9 PoCs
Analysis
NUCLEI
EPSS 0.89
Moodle Remote Code Execution (CVE-2024-43425)
A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.
CWE-94
Nov 07, 2024
CVE-2022-26135
6.5
MEDIUM
2 PoCs
Analysis
EPSS 0.89
Atlassian Jira <8.13.22, <8.20.10, <8.22.4 - SSRF
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
CWE-918
Jun 30, 2022
CVE-2022-30075
8.8
HIGH
EXPLOITED
5 PoCs
Analysis
EPSS 0.89
Tp-link Archer Ax50 Firmware < 210730 - Remote Code Execution
In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation.
Jun 09, 2022
CVE-2016-9299
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.89
Jenkins <2.32-2.19.3 - RCE
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
CWE-90
Jan 12, 2017
CVE-2014-0780
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.89
Indusoft Web Studio - Path Traversal
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests.
CWE-22
Apr 25, 2014
CVE-2008-2370
1 PoC
Analysis
EPSS 0.89
Apache Tomcat < 4.1.38 - Path Traversal
Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
CWE-22
Aug 04, 2008