High EPSS Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,481 results
Clear all
CVE-2021-46704
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.87
GenieACS <1.2.8 - Command Injection
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
CWE-78
Mar 06, 2022
CVE-2024-22853
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.87
D-LINK Go-RT-AC750 - Code Injection
D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session.
CWE-798
Feb 06, 2024
CVE-2010-2309
5 PoCs
Analysis
EPSS 0.87
Evological Evocam - Memory Corruption
Buffer overflow in the web server for EvoLogical EvoCam 3.6.6 and 3.6.7 allows remote attackers to execute arbitrary code via a long GET request.
CWE-119
Jun 16, 2010
CVE-2017-6090
8.8
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.87
Phpcollab < 2.5.1 - Unrestricted File Upload
Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/.
CWE-434
Oct 03, 2017
CVE-2016-4010
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.87
Magento <2.0.6 - Code Injection
Magento CE and EE before 2.0.6 allows remote attackers to conduct PHP objection injection attacks and execute arbitrary PHP code via crafted serialized shopping cart data.
CWE-74
Jan 23, 2017
CVE-2009-3548
4 PoCs
Analysis
EPSS 0.87
Apache Tomcat - Credentials Management
The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
CWE-255
Nov 12, 2009
CVE-2024-2054
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.87
Articatech Artica Proxy - Insecure Deserialization
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
CWE-502
Mar 21, 2024
CVE-2022-48323
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.87
Sunlogin Sunflower - Path Traversal
Sunlogin Sunflower Simplified (aka Sunflower Simple and Personal) 1.0.1.43315 is vulnerable to a path traversal issue. A remote and unauthenticated attacker can execute arbitrary programs on the victim host by sending a crafted HTTP request, as demonstrated by /check?cmd=ping../ followed by the pathname of the powershell.exe program.
CWE-22
Feb 13, 2023
CVE-2006-3730
8.8
HIGH
EXPLOITED
6 PoCs
Analysis
EPSS 0.87
Microsoft IE - Code Injection
Integer overflow in Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a 0x7fffffff argument to the setSlice method on a WebViewFolderIcon ActiveX object, which leads to an invalid memory copy.
CWE-94
Jul 21, 2006
CVE-2004-1373
4 PoCs
Analysis
EPSS 0.87
Nullsoft Shoutcast Server - Denial of Service
Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.
Dec 23, 2004
CVE-2024-25723
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.87
ZenML ZenML Server - Improper Authentication
ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.
CWE-284
Feb 27, 2024
CVE-2018-7719
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.87
Acrolinx Server <5.2.5 - Path Traversal
Acrolinx Server before 5.2.5 on Windows allows Directory Traversal.
CWE-22
Mar 25, 2018
CVE-2009-3843
3 PoCs
Analysis
EPSS 0.87
HP Operations Manager - Access Control
HP Operations Manager 8.10 on Windows contains a "hidden account" in the XML file that specifies Tomcat users, which allows remote attackers to conduct unrestricted file upload attacks, and thereby execute arbitrary code, by using the org.apache.catalina.manager.HTMLManagerServlet class to make requests to manager/html/upload.
CWE-264
Nov 24, 2009
CVE-2021-43287
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.87
ThoughtWorks GoCD <21.3.0 - Info Disclosure
An issue was discovered in ThoughtWorks GoCD before 21.3.0. The business continuity add-on, which is enabled by default, leaks all secrets known to the GoCD server to unauthenticated attackers.
CWE-200
Apr 14, 2022
CVE-2024-42640
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.87
angular-base64-upload <v0.1.21 - RCE
angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-434
Oct 11, 2024
CVE-2010-0425
2 PoCs
Analysis
EPSS 0.87
Apache HTTP Server <2.3.7 - RCE
modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
Mar 05, 2010
CVE-2014-8440
2 PoCs
Analysis
EPSS 0.87
Adobe Flash Player < 13.0.0.252 - Denial of Service
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8441.
Nov 11, 2014
CVE-2022-1026
8.6
HIGH
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.87
Kyocera Net Viewer - Insufficiently Protected Credentials
Kyocera multifunction printers running vulnerable versions of Net View unintentionally expose sensitive user information, including usernames and passwords, through an insufficiently protected address book export function.
CWE-522
Apr 04, 2022
CVE-2014-6277
EXPLOITED
3 PoCs
Analysis
EPSS 0.87
GNU Bash <4.3 - RCE
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
CWE-78
Sep 27, 2014
CVE-2010-2156
2 PoCs
Analysis
EPSS 0.87
ISC Dhcp - Numeric Error
ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.
CWE-189
Jun 07, 2010