High EPSS Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,481 results
Clear all
CVE-2014-7236
9.1
CRITICAL
3 PoCs
Analysis
EPSS 0.84
TWiki Debugenableplugins Remote Code Execution
Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki before 6.0.1 allows remote attackers to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome.
CWE-74
Feb 17, 2020
CVE-2025-59528
10.0
CRITICAL
EXPLOITED
11 PoCs
Analysis
NUCLEI
EPSS 0.84
Flowise < 3.0.6 - Code Injection
Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.
CWE-94
Sep 22, 2025
CVE-2007-4320
1 PoC
Analysis
EPSS 0.84
Ncaster 1.7.2 - RCE
PHP remote file inclusion vulnerability in admin/addons/archive/archive.php in Ncaster 1.7.2 allows remote attackers to execute arbitrary PHP code via a URL in the adminfolder parameter.
Aug 14, 2007
CVE-2007-3236
1 PoC
Analysis
EPSS 0.84
Horoscope 1.0 - RCE
PHP remote file inclusion vulnerability in footer.php in the Horoscope 1.0 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the xoopsConfig[root_path] parameter.
Jun 15, 2007
CVE-2025-8943
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.84
Flowise < 3.0.1 - Missing Authorization
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
CWE-862
Aug 14, 2025
CVE-2008-2240
2 PoCs
Analysis
EPSS 0.84
IBM Lotus Domino - Memory Corruption
Stack-based buffer overflow in the Web Server service in IBM Lotus Domino before 7.0.3 FP1, and 8.x before 8.0.1, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long Accept-Language HTTP header.
CWE-119
May 22, 2008
CVE-2020-11698
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.84
Titanhq Spamtitan - Command Injection
An issue was discovered in Titan SpamTitan 7.07. Improper input sanitization of the parameter community on the page snmp-x.php would allow a remote attacker to inject commands into the file snmpd.conf that would allow executing commands on the target server.
CWE-77
Sep 17, 2020
CVE-2023-23488
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.84
Strangerstudios Paid Memberships Pro < 2.9.8 - SQL Injection
The Paid Memberships Pro WordPress Plugin, version < 2.9.8, is affected by an unauthenticated SQL injection vulnerability in the 'code' parameter of the '/pmpro/v1/order' REST route.
CWE-89
Jan 20, 2023
CVE-2024-32399
7.6
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.84
RaidenMAILD Mail Server <4.9.4 - Path Traversal
Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component.
CWE-22
Apr 22, 2024
CVE-2010-4094
3 PoCs
Analysis
EPSS 0.84
IBM Rational Quality Manager - Credentials Management
The Tomcat server in IBM Rational Quality Manager and Rational Test Lab Manager has a default password for the ADMIN account, which makes it easier for remote attackers to execute arbitrary code by leveraging access to the manager role. NOTE: this might overlap CVE-2009-3548.
CWE-255
Oct 26, 2010
CVE-2013-6221
2 PoCs
Analysis
EPSS 0.84
HP Service Virtualization - Path Traversal
Directory traversal vulnerability in CommunicationServlet in HP Service Virtualization 3.x before 3.50.1, when the AutoPass license server is enabled, allows remote attackers to create arbitrary files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-2031.
CWE-22
Jun 18, 2014
CVE-2006-1148
5 PoCs
Analysis
EPSS 0.84
PeerCast <0.1217 - RCE
Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request with a long (1) parameter name or (2) value in a URL, which triggers the overflow in the nextCGIarg function in servhs.cpp.
CWE-119
Mar 10, 2006
CVE-2024-44902
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.84
Thinkphp 6.1.3-8.0.4 - Code Injection
A deserialization vulnerability in Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code.
CWE-502
Sep 09, 2024
CVE-2011-2039
2 PoCs
Analysis
EPSS 0.84
Cisco AnyConnect Secure Mobility Client <2.3.185 - RCE
The helper application in Cisco AnyConnect Secure Mobility Client (formerly AnyConnect VPN Client) before 2.3.185 on Windows, and on Windows Mobile, downloads a client executable file (vpndownloader.exe) without verifying its authenticity, which allows remote attackers to execute arbitrary code via the url property to a certain ActiveX control in vpnweb.ocx, aka Bug ID CSCsy00904.
CWE-20
Jun 02, 2011
CVE-2007-4809
1 PoC
Analysis
EPSS 0.84
Online Fantasy Football League Offl - Code Injection
Multiple PHP remote file inclusion vulnerabilities in Online Fantasy Football League (OFFL) 0.2.6 allow remote attackers to execute arbitrary PHP code via a URL in the DOC_ROOT parameter to (1) lib/functions.php or (2) lib/header.php.
CWE-94
Sep 11, 2007
CVE-2022-28171
7.5
HIGH
3 PoCs
Analysis
EPSS 0.84
Hikvision Ds-a71024 Firmware < 2.3.8-6 - Command Injection
The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to execute restricted commands by sending messages with malicious commands to the affected device.
CWE-78
Jun 27, 2022
CVE-2007-3614
4 PoCs
Analysis
EPSS 0.84
Sap DB - Buffer Overflow
Multiple stack-based buffer overflows in waHTTP.exe (aka the SAP DB Web Server) in SAP DB, possibly 7.3 through 7.5, allow remote attackers to execute arbitrary code via (1) a certain cookie value; (2) a certain additional parameter, related to sapdbwa_GetQueryString; and other unspecified vectors related to "numerous other fields."
Jul 06, 2007
CVE-2007-4744
1 PoC
Analysis
EPSS 0.84
Anyinventory - Code Injection
PHP remote file inclusion vulnerability in environment.php in AnyInventory 1.9.1 and 2.0, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the DIR_PREFIX parameter.
CWE-20
Sep 06, 2007
CVE-2008-2463
EXPLOITED
3 PoCs
Analysis
EPSS 0.84
Microsoft Office Snapshot Viewer Activex - Code Injection
The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
CWE-94
Jul 07, 2008
CVE-2017-1000112
7.0
HIGH
10 PoCs
Analysis
EPSS 0.84
Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
CWE-362
Oct 05, 2017