High EPSS Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
3,481 results Clear all
CVE-2007-2217 2 PoCs Analysis EPSS 0.85
Kodak Image Viewer - Code Injection
Kodak Image Viewer in Microsoft Windows 2000 SP4, and in some cases XP SP2 and Server 2003 SP1 and SP2, allows remote attackers to execute arbitrary code via crafted image files that trigger memory corruption, as demonstrated by a certain .tif (TIFF) file.
CWE-94 Oct 09, 2007
CVE-2009-1551 1 PoC Analysis EPSS 0.85
Qt-cute Quickteam - Code Injection
Multiple PHP remote file inclusion vulnerabilities in Qt quickteam 2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) qte_web_path parameter to qte_web.php and the (2) qte_root parameter to bin/qte_init.php.
CWE-94 May 06, 2009
CVE-2021-22555 8.3 HIGH KEV 18 PoCs Analysis EPSS 0.85
Netfilter x_tables Heap OOB Write Privilege Escalation
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
CWE-787 Jul 07, 2021
CVE-2026-27174 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.85
MajorDoMo - Unauthenticated RCE
MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters.
CWE-94 Feb 18, 2026
CVE-2018-17254 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.85
JCK Editor <6.4.4 - SQL Injection
The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter.
CWE-89 Sep 20, 2018
CVE-2025-37164 10.0 CRITICAL KEV 5 PoCs Analysis NUCLEI EPSS 0.85
HPE OneView unauthenticated RCE
A remote code execution issue exists in HPE OneView.
CWE-94 Dec 16, 2025
CVE-1999-0070 1 PoC Analysis EPSS 0.85
test-cgi - Info Disclosure
test-cgi program allows an attacker to list files on the server.
Apr 01, 1996
CVE-2020-35578 7.2 HIGH 2 PoCs Analysis EPSS 0.85
Nagios XI < 5.8.0 - OS Command Injection
An issue was discovered in the Manage Plugins page in Nagios XI before 5.8.0. Because the line-ending conversion feature is mishandled during a plugin upload, a remote, authenticated admin user can execute operating-system commands.
CWE-78 Jan 13, 2021
CVE-2021-31806 6.5 MEDIUM 1 PoC Analysis EPSS 0.85
Squid < 4.15 - Denial of Service
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
CWE-116 May 27, 2021
CVE-2012-0432 3 PoCs Analysis EPSS 0.85
NetIQ eDirectory <8.8.7.2 - Buffer Overflow
Stack-based buffer overflow in the Novell NCP implementation in NetIQ eDirectory 8.8.7.x before 8.8.7.2 allows remote attackers to have an unspecified impact via unknown vectors.
CWE-119 Dec 25, 2012
CVE-2024-39250 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.85
Efrotech Timetrax - SQL Injection
EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface.
CWE-89 Jul 22, 2024
CVE-2015-7755 9.8 CRITICAL KEV 3 PoCs Analysis EPSS 0.85
Juniper ScreenOS <6.3.0r21 - RCE
Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.
CWE-287 Dec 19, 2015
CVE-2019-5029 9.8 CRITICAL 3 PoCs Analysis EPSS 0.85
Exhibitor Web UI <1.7.1 - Command Injection
An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
CWE-78 Nov 13, 2019
CVE-2020-27838 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.85
Redhat Keycloak < 13.0.0 - Authentication Bypass
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
CWE-287 Mar 08, 2021
CVE-2017-8543 9.8 CRITICAL KEV 1 PoC Analysis EPSS 0.85
Microsoft Windows 10 1507 - Remote Code Execution
Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to take control of the affected system when Windows Search fails to handle objects in memory, aka "Windows Search Remote Code Execution Vulnerability".
CWE-281 Jun 15, 2017
CVE-2019-15975 9.8 CRITICAL 2 PoCs Analysis EPSS 0.85
Cisco DCNM - Privilege Escalation
Multiple vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-798 Jan 06, 2020
CVE-2025-71243 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.85
SPIP Saisies 5.4.0-5.11.0 - RCE
The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.
CWE-94 Feb 19, 2026
CVE-2004-0790 3 PoCs Analysis EPSS 0.85
Multiple TCP/IP - DoS
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Apr 12, 2005
CVE-2000-0380 2 PoCs Analysis EPSS 0.85
Cisco Ios - Improper Input Validation
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.
CWE-20 Apr 26, 2000
CVE-2016-1593 7.2 HIGH 3 PoCs Analysis EPSS 0.85
Micro Focus Novell Service Desk <7.2 - Path Traversal
Directory traversal vulnerability in the import users feature in Micro Focus Novell Service Desk before 7.2 allows remote authenticated administrators to upload and execute arbitrary JSP files via a .. (dot dot) in a filename within a multipart/form-data POST request to a LiveTime.woa URL.
CWE-22 Apr 22, 2016