High EPSS Vulnerabilities with Public Exploits

Updated 56m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,544 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,344 vendors 43,890 researchers
3,481 results Clear all
CVE-2012-0261 2 PoCs Analysis EPSS 0.87
op5 Monitor/Appliance <1.6.2/<5.5.3 - Command Injection
license.php in system-portal before 1.6.2 in op5 Monitor and op5 Appliance before 5.5.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the timestamp parameter for an install action.
CWE-94 Dec 31, 2013
CVE-2007-3605 3 PoCs Analysis EPSS 0.87
Enjoysap - Buffer Overflow
Stack-based buffer overflow in the kweditcontrol.kwedit.1 ActiveX control in FrontEnd\SapGui\kwedit.dll in the EnjoySAP SAP GUI allows remote attackers to execute arbitrary code via a long argument to the PrepareToPostHTML function.
Jul 06, 2007
CVE-2022-26159 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.87
Ametys CMS <4.5.0 - Info Disclosure
The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion/<domain>/en.xml (and similar pathnames for other languages), which contain all characters typed by all users, including the content of private pages. For example, a private page may contain usernames, e-mail addresses, and possibly passwords.
CWE-425 Feb 28, 2022
CVE-2023-37629 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.87
Simple Online Piggery Management System - Unrestricted File Upload
Online Piggery Management System 1.0 is vulnerable to File Upload. An unauthenticated user can upload a php file by sending a POST request to "add-pig.php."
CWE-434 Jul 12, 2023
CVE-2013-1391 7.5 HIGH 2 PoCs Analysis EPSS 0.87
Huntcctv Dvr-04ch Firmware - Authentication Bypass
Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.
CWE-287 Oct 30, 2019
CVE-2021-28480 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.87
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Apr 13, 2021
CVE-2015-9406 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.87
Mtheme-unus < 2.3 - Path Traversal
Directory traversal vulnerability in the mTheme-Unus theme before 2.3 for WordPress allows an attacker to read arbitrary files via a .. (dot dot) in the files parameter to css/css.php.
CWE-22 Sep 20, 2019
CVE-2024-21793 7.5 HIGH 1 PoC Analysis EPSS 0.87
F5 Big-ip Next Central Manager < 20.2.0 - SQL Injection
An OData injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-89 May 08, 2024
CVE-2022-21971 7.8 HIGH KEV 3 PoCs Analysis EPSS 0.87
Windows Runtime - RCE
Windows Runtime Remote Code Execution Vulnerability
CWE-824 Feb 09, 2022
CVE-2021-42847 9.8 CRITICAL 1 PoC Analysis EPSS 0.87
ManageEngine ADAudit Plus Authenticated File Write RCE
Zoho ManageEngine ADAudit Plus before 7006 allows attackers to write to, and execute, arbitrary files.
Nov 11, 2021
CVE-2020-19360 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.87
Fhem - Path Traversal
Local file inclusion in FHEM 6.0 allows in fhem/FileLog_logWrapper file parameter can allow an attacker to include a file, which can lead to sensitive information disclosure.
CWE-22 Jan 20, 2021
CVE-2013-2186 5 PoCs Analysis EPSS 0.87
Redhat Jboss Enterprise Brms Platform - Improper Input Validation
The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
CWE-20 Oct 28, 2013
CVE-2003-0722 3 PoCs Analysis EPSS 0.87
Solaris - Privilege Escalation
The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.
Sep 22, 2003
CVE-2020-3161 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.87
Cisco IP Phones - RCE/DoS
A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.
CWE-20 Apr 15, 2020
CVE-2015-0096 EXPLOITED 5 PoCs Analysis EPSS 0.87
Microsoft Windows Shell LNK Code Execution
Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability."
CWE-426 Mar 11, 2015
CVE-2011-3556 4 PoCs Analysis EPSS 0.87
Oracle Java SE - Info Disclosure
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.
Oct 19, 2011
CVE-2015-1538 8 PoCs Analysis EPSS 0.87
Android <5.1.1 - RCE
Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.
CWE-189 Oct 01, 2015
CVE-2016-1960 8.8 HIGH 2 PoCs Analysis EPSS 0.87
Mozilla Firefox <45.0 - Firefox ESR 38.x <38.7 - RCE
Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
Mar 13, 2016
CVE-2006-5444 1 PoC Analysis EPSS 0.87
Digium Asterisk - Buffer Overflow
Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow.
Oct 23, 2006
CVE-2023-3452 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.87
Canto plugin for WordPress <=3.0.4 - RCE
The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
CWE-98 Aug 12, 2023