High EPSS Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,481 results
Clear all
CVE-2015-5374
EXPLOITED
3 PoCs
Analysis
EPSS 0.84
Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module - Denial of Service
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Specially crafted packets sent to port 50000/UDP could cause a denial-of-service of the affected device. A manual reboot may be required to recover the service of the device.
CWE-19
Jul 18, 2015
CVE-2007-3382
1 PoC
Analysis
EPSS 0.84
Apache Tomcat - Information Disclosure
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
CWE-200
Aug 14, 2007
CVE-2020-8012
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.84
Broadcom Unified Infrastructure Management < 9.20 - Buffer Overflow
CA Unified Infrastructure Management (Nimsoft/UIM) 20.1, 20.3.x, and 9.20 and below contains a buffer overflow vulnerability in the robot (controller) component. A remote attacker can execute arbitrary code.
CWE-120
Feb 18, 2020
CVE-2020-8958
7.2
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.84
Gpononu 1ge Router Wifi Onu V2801rw Firmware - OS Command Injection
Guangzhou 1GE ONU V2801RW 1.9.1-181203 through 2.9.0-181024 and V2804RGW 1.9.1-181203 through 2.9.0-181024 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the boaform/admin/formPing Dest IP Address field.
CWE-78
Jul 15, 2020
CVE-2020-10915
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.84
VEEAM One Agent 9.5.4.4587 - Deserialization
This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HandshakeResult method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10401.
CWE-502
Apr 22, 2020
CVE-2013-2010
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.84
Automattic WP Super Cache < 1.2 - Injection
WordPress W3 Total Cache Plugin 0.9.2.8 has a Remote PHP Code Execution Vulnerability
CWE-74
Feb 12, 2020
CVE-2006-4379
3 PoCs
Analysis
EPSS 0.84
Ipswitch Imail Plus - Buffer Overflow
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
Sep 08, 2006
CVE-2024-3094
10.0
CRITICAL
84 PoCs
Analysis
NUCLEI
EPSS 0.84
xz <5.6.0 - Code Injection
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
CWE-506
Mar 29, 2024
CVE-2005-0045
1 PoC
Analysis
EPSS 0.84
Windows NT 4.0-Server 2003 - RCE
The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.
May 02, 2005
CVE-2013-2367
2 PoCs
Analysis
EPSS 0.84
HP SiteScope <11.21 - RCE
Multiple unspecified vulnerabilities in HP SiteScope 11.20 and 11.21, when SOAP is used, allow remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1678.
Jul 31, 2013
CVE-2019-18393
5.3
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.84
Igniterealtime Openfire < 4.4.2 - Path Traversal
PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.
CWE-22
Oct 24, 2019
CVE-2024-5522
6.5
MEDIUM
3 PoCs
Analysis
NUCLEI
EPSS 0.84
Bplugins Html5 Video Player < 2.5.27 - SQL Injection
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
CWE-89
Jun 20, 2024
CVE-2022-22956
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.84
Vmware Identity Manager < 9.0 - Authentication Bypass
VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.
CWE-287
Apr 13, 2022
CVE-2012-0694
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.84
SugarCRM CE <= 6.3.1 - Code Injection
SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code.
CWE-20
Oct 29, 2019
CVE-2014-6038
7.5
HIGH
2 PoCs
Analysis
EPSS 0.84
ManageEngine Eventlog Analyzer Managed Hosts Administrator Credential Disclosure
Zoho ManageEngine EventLog Analyzer versions 7 through 9.9 build 9002 have a database Information Disclosure Vulnerability. Fixed in EventLog Analyzer 10.0 Build 10000.
CWE-200
Jan 13, 2020
CVE-2005-3252
6 PoCs
Analysis
EPSS 0.84
Sourcefire Snort - Buffer Overflow
Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet.
Oct 18, 2005
CVE-2014-0257
2 PoCs
Analysis
EPSS 0.84
Microsoft .NET Framework - RCE
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote attackers to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework application that exposes a COM server endpoint, aka "Type Traversal Vulnerability."
CWE-20
Feb 12, 2014
CVE-2023-21931
7.5
HIGH
3 PoCs
Analysis
EPSS 0.84
Oracle Weblogic PreAuth Remote Command Execution via ForeignOpaqueReference IIOP Deserialization
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CWE-306
Apr 18, 2023
CVE-2014-1812
8.8
HIGH
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.84
Microsoft Windows - Privilege Escalation
The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability."
CWE-255
May 14, 2014
CVE-2006-5156
3 PoCs
Analysis
EPSS 0.84
Mcafee Epolicy Orchestrator - Buffer Overflow
Buffer overflow in McAfee ePolicy Orchestrator before 3.5.0.720 and ProtectionPilot before 1.1.1.126 allows remote attackers to execute arbitrary code via a request to /spipe/pkg/ with a long source header.
Oct 05, 2006