High EPSS Vulnerabilities with Public Exploits
Updated 44m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,481 results
Clear all
CVE-2000-0126
1 PoC
Analysis
EPSS 0.85
IIS 3-4 - Info Disclosure
Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. (dot dot) attack.
Jan 26, 2000
CVE-2008-3466
1 PoC
Analysis
EPSS 0.85
Microsoft HIS <2006 - Auth Bypass
Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."
CWE-287
Oct 15, 2008
CVE-2020-13925
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.85
Apache Kylin < 3.1.0 - OS Command Injection
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.
CWE-78
Jul 14, 2020
CVE-2011-2653
2 PoCs
Analysis
EPSS 0.85
Novell Zenworks Asset Management - Path Traversal
Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file.
CWE-22
Dec 08, 2011
CVE-2024-55556
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.85
Crater Invoice - Code Injection
A vulnerability in Crater Invoice allows an unauthenticated attacker with knowledge of the APP_KEY to achieve remote command execution on the server by manipulating the laravel_session cookie, exploiting arbitrary deserialization through the encrypted session data. The exploitation vector of this vulnerability relies on an attacker obtaining Laravel's secret APP_KEY, which would allow them to decrypt and manipulate session cookies (laravel_session) containing serialized data. By altering this data and re-encrypting it with the APP_KEY, the attacker could trigger arbitrary deserialization on the server, potentially leading to remote command execution (RCE). The vulnerability is primarily exploited by accessing an exposed cookie and manipulating it using the secret key to gain malicious access to the server.
CWE-502
Jan 07, 2025
CVE-2007-2139
2 PoCs
Analysis
EPSS 0.85
Broadcom Brightstor Arcserve Backup - Buffer Overflow
Multiple stack-based buffer overflows in the SUN RPC service in CA (formerly Computer Associates) BrightStor ARCserve Media Server, as used in BrightStor ARCserve Backup 9.01 through 11.5 SP2, BrightStor Enterprise Backup 10.5, Server Protection Suite 2, and Business Protection Suite 2, allow remote attackers to execute arbitrary code via malformed RPC strings, a different vulnerability than CVE-2006-5171, CVE-2006-5172, and CVE-2007-1785.
Apr 25, 2007
CVE-2005-3683
3 PoCs
Analysis
EPSS 0.85
Freeftpd - Buffer Overflow
Stack-based buffer overflow in freeFTPd before 1.0.9 with Logging enabled, allows remote attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via a long USER command.
Nov 19, 2005
CVE-2024-37393
7.5
HIGH
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.85
Securenvoy Multi-factor Authenticatio... - Cleartext Transmission
Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.
CWE-319
Jun 10, 2024
CVE-2022-40624
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.85
Pfsense Pfblockerng < 2.1.4_27 - OS Command Injection
pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814.
CWE-78
Dec 20, 2022
CVE-2023-6360
8.6
HIGH
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.85
WordPress My Calendar <3.4.22 - SQL Injection
The 'My Calendar' WordPress Plugin, version < 3.4.22 is affected by an unauthenticated SQL injection vulnerability in the 'from' and 'to' parameters in the '/my-calendar/v1/events' rest route.
CWE-89
Nov 30, 2023
CVE-2024-31839
4.8
MEDIUM
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.85
CHAOS 5.0.1 - XSS
Cross Site Scripting vulnerability in tiagorlampert CHAOS v.5.0.1 allows a remote attacker to escalate privileges via the sendCommandHandler function in the handler.go component.
CWE-79
Apr 12, 2024
CVE-2018-15133
8.1
HIGH
KEV
SSVC ACTIVE
16 PoCs
Analysis
EPSS 0.85
Laravel Framework <5.6.30 - RCE
In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.
CWE-502
Aug 09, 2018
CVE-2024-4323
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.85
Treasuredata Fluent Bit < 2.2.3 - Out-of-Bounds Write
A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution.
CWE-122
May 20, 2024
CVE-2006-5143
5 PoCs
Analysis
EPSS 0.85
CA BrightStor ARCserve Backup <r11.5 SP1 - RCE
Multiple buffer overflows in CA BrightStor ARCserve Backup r11.5 SP1 and earlier, r11.1, and 9.01; BrightStor ARCserve Backup for Windows r11; BrightStor Enterprise Backup 10.5; Server Protection Suite r2; and Business Protection Suite r2 allow remote attackers to execute arbitrary code via crafted data on TCP port 6071 to the Backup Agent RPC Server (DBASVR.exe) using the RPC routines with opcode (1) 0x01, (2) 0x02, or (3) 0x18; invalid stub data on TCP port 6503 to the RPC routines with opcode (4) 0x2b or (5) 0x2d in ASCORE.dll in the Message Engine RPC Server (msgeng.exe); (6) a long hostname on TCP port 41523 to ASBRDCST.DLL in the Discovery Service (casdscsvc.exe); or unspecified vectors related to the (7) Job Engine Service.
CWE-119
Oct 10, 2006
CVE-2022-3218
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.85
WiFi Mouse - RCE
Due to a reliance on client-side authentication, the WiFi Mouse (Mouse Server) from Necta LLC's authentication mechanism is trivially bypassed, which can result in remote code execution.
CWE-603
Sep 19, 2022
CVE-2017-14535
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.85
Trixbox - 2.8.0.4 OS Command Injection
trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
CWE-78
Feb 16, 2018
CVE-2022-3602
7.5
HIGH
8 PoCs
Analysis
EPSS 0.85
Openssl < 3.0.7 - Out-of-Bounds Write
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
CWE-787
Nov 01, 2022
CVE-2025-64328
7.2
HIGH
KEV
SSVC ACTIVE
2 PoCs
Analysis
NUCLEI
EPSS 0.85
Sangoma Freepbx < 17.0.3 - OS Command Injection
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3.
CWE-78
Nov 07, 2025
CVE-2024-29415
8.1
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.85
ip package <2.0.1 - SSRF
The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.
CWE-918
May 27, 2024
CVE-2013-3163
8.8
HIGH
KEV
SSVC ACTIVE
2 PoCs
Analysis
EPSS 0.85
Microsoft Internet Explorer 8-10 - Code Injection
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
CWE-787
Jul 10, 2013