High EPSS Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,481 results
Clear all
CVE-2007-2217
2 PoCs
Analysis
EPSS 0.85
Kodak Image Viewer - Code Injection
Kodak Image Viewer in Microsoft Windows 2000 SP4, and in some cases XP SP2 and Server 2003 SP1 and SP2, allows remote attackers to execute arbitrary code via crafted image files that trigger memory corruption, as demonstrated by a certain .tif (TIFF) file.
CWE-94
Oct 09, 2007
CVE-2009-1551
1 PoC
Analysis
EPSS 0.85
Qt-cute Quickteam - Code Injection
Multiple PHP remote file inclusion vulnerabilities in Qt quickteam 2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) qte_web_path parameter to qte_web.php and the (2) qte_root parameter to bin/qte_init.php.
CWE-94
May 06, 2009
CVE-2021-22555
8.3
HIGH
KEV
18 PoCs
Analysis
EPSS 0.85
Netfilter x_tables Heap OOB Write Privilege Escalation
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
CWE-787
Jul 07, 2021
CVE-2026-27174
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.85
MajorDoMo - Unauthenticated RCE
MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters.
CWE-94
Feb 18, 2026
CVE-2018-17254
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.85
JCK Editor <6.4.4 - SQL Injection
The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter.
CWE-89
Sep 20, 2018
CVE-2025-37164
10.0
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.85
HPE OneView unauthenticated RCE
A remote code execution issue exists in HPE OneView.
CWE-94
Dec 16, 2025
CVE-1999-0070
1 PoC
Analysis
EPSS 0.85
test-cgi - Info Disclosure
test-cgi program allows an attacker to list files on the server.
Apr 01, 1996
CVE-2020-35578
7.2
HIGH
2 PoCs
Analysis
EPSS 0.85
Nagios XI < 5.8.0 - OS Command Injection
An issue was discovered in the Manage Plugins page in Nagios XI before 5.8.0. Because the line-ending conversion feature is mishandled during a plugin upload, a remote, authenticated admin user can execute operating-system commands.
CWE-78
Jan 13, 2021
CVE-2021-31806
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.85
Squid < 4.15 - Denial of Service
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
CWE-116
May 27, 2021
CVE-2012-0432
3 PoCs
Analysis
EPSS 0.85
NetIQ eDirectory <8.8.7.2 - Buffer Overflow
Stack-based buffer overflow in the Novell NCP implementation in NetIQ eDirectory 8.8.7.x before 8.8.7.2 allows remote attackers to have an unspecified impact via unknown vectors.
CWE-119
Dec 25, 2012
CVE-2024-39250
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.85
Efrotech Timetrax - SQL Injection
EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface.
CWE-89
Jul 22, 2024
CVE-2015-7755
9.8
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.85
Juniper ScreenOS <6.3.0r21 - RCE
Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.
CWE-287
Dec 19, 2015
CVE-2019-5029
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.85
Exhibitor Web UI <1.7.1 - Command Injection
An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
CWE-78
Nov 13, 2019
CVE-2020-27838
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.85
Redhat Keycloak < 13.0.0 - Authentication Bypass
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
CWE-287
Mar 08, 2021
CVE-2017-8543
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.85
Microsoft Windows 10 1507 - Remote Code Execution
Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to take control of the affected system when Windows Search fails to handle objects in memory, aka "Windows Search Remote Code Execution Vulnerability".
CWE-281
Jun 15, 2017
CVE-2019-15975
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.85
Cisco DCNM - Privilege Escalation
Multiple vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-798
Jan 06, 2020
CVE-2025-71243
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.85
SPIP Saisies 5.4.0-5.11.0 - RCE
The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.
CWE-94
Feb 19, 2026
CVE-2004-0790
3 PoCs
Analysis
EPSS 0.85
Multiple TCP/IP - DoS
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Apr 12, 2005
CVE-2000-0380
2 PoCs
Analysis
EPSS 0.85
Cisco Ios - Improper Input Validation
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.
CWE-20
Apr 26, 2000
CVE-2016-1593
7.2
HIGH
3 PoCs
Analysis
EPSS 0.85
Micro Focus Novell Service Desk <7.2 - Path Traversal
Directory traversal vulnerability in the import users feature in Micro Focus Novell Service Desk before 7.2 allows remote authenticated administrators to upload and execute arbitrary JSP files via a .. (dot dot) in a filename within a multipart/form-data POST request to a LiveTime.woa URL.
CWE-22
Apr 22, 2016