Remote Code Execution

other CRITICAL

Remote Code Execution represents the critical moment when an attacker successfully runs arbitrary code on a target system without physical access.

How It Works

Remote Code Execution represents the critical moment when an attacker successfully runs arbitrary code on a target system without physical access. Unlike a single vulnerability class, RCE is an outcome—the catastrophic result of exploiting underlying weaknesses in how applications process input, manage memory, or handle executable content.

Attackers typically achieve RCE by chaining vulnerabilities or exploiting a single critical flaw. Common pathways include injecting malicious payloads through deserialization flaws (where untrusted data becomes executable objects), command injection (where user input flows into system commands), buffer overflows (overwriting memory to hijack execution flow), or unsafe file uploads (placing executable code on the server). Server-Side Template Injection and SQL injection can also escalate to code execution when attackers leverage database or template engine features.

The attack flow usually begins with reconnaissance to identify vulnerable endpoints, followed by crafting a payload that exploits the specific weakness, then executing commands to establish persistence or pivot deeper into the network. Modern exploits often use multi-stage payloads—initial lightweight code that downloads and executes more sophisticated tooling.

Impact

  • Complete system compromise — attacker gains shell access with application privileges, potentially escalating to root/SYSTEM
  • Data exfiltration — unrestricted access to databases, configuration files, credentials, and sensitive business data
  • Lateral movement — compromised server becomes a beachhead to attack internal networks and other systems
  • Ransomware deployment — direct pathway to encrypt files and disable backups
  • Persistence mechanisms — installation of backdoors, web shells, and rootkits for long-term access
  • Supply chain attacks — modification of application code or dependencies to compromise downstream users

Real-World Examples

The n8n workflow automation platform (CVE-2024-21858) demonstrated how RCE can emerge in unexpected places-attackers exploited unsafe workflow execution to run arbitrary code on self-hosted instances. The Log4j vulnerability (Log4Shell) showed RCE at massive scale when attackers sent specially crafted JNDI lookup strings that triggered remote class loading in Java applications worldwide.

Atlassian Confluence instances have faced multiple RCE vulnerabilities through OGNL injection flaws, where attackers inject Object-Graph Navigation Language expressions that execute with server privileges. These required no authentication, enabling attackers to compromise thousands of internet-exposed instances within hours of disclosure.

Mitigation

  • Input validation and sanitization — strict allowlists for all user-controlled data, especially in execution contexts
  • Sandboxing and containerization — isolate application processes with minimal privileges using containers, VMs, or security contexts
  • Disable dangerous functions — remove or restrict features like code evaluation, system command execution, and dynamic deserialization
  • Network segmentation — limit blast radius by isolating sensitive systems and restricting outbound connections
  • Web Application Firewalls — detect and block common RCE patterns in HTTP traffic
  • Runtime application self-protection (RASP) — monitor application behavior for execution anomalies
  • Regular patching — prioritize updates for components with known RCE vulnerabilities

Recent CVEs (4457)

CVE-2025-56590
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Apryse HTML2PDF SDK through version 11.10 has a command injection vulnerability in the InsertFromURL function allowing remote code execution when converting HTML to PDF.

Command Injection RCE Html2pdf
NVD
CVE-2025-68986
EPSS 0% CVSS 9.9
CRITICAL Act Now

Miion WordPress theme by zozothemes has an unrestricted file upload vulnerability allowing unauthenticated web shell deployment and server compromise.

WordPress PHP RCE +1
NVD
CVE-2025-68910
EPSS 0% CVSS 9.9
CRITICAL Act Now

Blogzee WordPress theme by blazethemes has an unrestricted file upload vulnerability — the fourth blazethemes product affected by the same shared vulnerable upload component.

WordPress PHP RCE +1
NVD
CVE-2025-68909
EPSS 0% CVSS 9.9
CRITICAL Act Now

Blogistic WordPress theme by blazethemes has an unrestricted file upload vulnerability enabling attackers to deploy web shells for persistent server access.

WordPress PHP RCE +1
NVD
CVE-2025-68015
EPSS 0% CVSS 9.0
CRITICAL Act Now

Event Tickets with Ticket Scanner WordPress plugin has a code injection vulnerability allowing remote code execution through the event management system.

Code Injection RCE
NVD
CVE-2025-67968
EPSS 0% CVSS 9.9
CRITICAL Act Now

Real Homes CRM WordPress plugin has an unrestricted file upload allowing web shell deployment for persistent remote code execution.

WordPress PHP RCE +1
NVD
CVE-2025-62056
EPSS 0% CVSS 9.9
CRITICAL Act Now

News Event WordPress theme by blazethemes has an unrestricted file upload allowing web shell deployment and remote code execution.

WordPress PHP RCE +1
NVD
CVE-2025-62050
EPSS 0% CVSS 9.9
CRITICAL Act Now

Blogmatic WordPress theme by blazethemes has an unrestricted file upload vulnerability allowing attackers to upload web shells for persistent server access.

WordPress PHP RCE +1
NVD
CVE-2026-24009
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Remote code execution in Docling Core versions 2.21.0 through 2.48.3 allows unauthenticated attackers to execute arbitrary code when applications deserialize untrusted YAML data using the `DoclingDocument.load_from_yaml()` method with vulnerable PyYAML versions. The vulnerability stems from unsafe deserialization practices (CWE-502) and affects document processing systems using affected library versions. No patch is currently available; mitigation requires upgrading to version 2.48.4 or ensuring PyYAML 5.4+ is installed.

RCE Deserialization
NVD GitHub
CVE-2025-69764
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Tenda AX3 firmware has another stack-based buffer overflow in formGetIptv through a different input path, enabling remote code execution.

RCE Buffer Overflow Stack Overflow +3
NVD
CVE-2025-67684
EPSS 1% CVSS 7.2
HIGH This Week

Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection mechanism. Quick.Cart allows a privileged user to upload arbitrary file contents while only validating the filename extension. [CVSS 7.2 HIGH]

PHP RCE Lfi +2
NVD
CVE-2026-1331
EPSS 0% CVSS 9.8
CRITICAL Act Now

HAMASTAR MeetingHub has an arbitrary file upload vulnerability allowing unauthenticated remote attackers to upload web shells and achieve full server compromise.

File Upload RCE Meetinghub Paperless Meetings
NVD
CVE-2025-27380
EPSS 0% CVSS 7.6
HIGH This Week

HTML injection in Project Release in Altium Enterprise Server (AES) 7.0.3 on all platforms allows an authenticated attacker to execute arbitrary JavaScript in the victim’s browser via crafted HTML content. [CVSS 7.6 HIGH]

RCE XSS On Prem Enterprise Server
NVD
CVE-2026-23946
EPSS 0% CVSS 6.8
MEDIUM POC PATCH This Month

Remote code execution in Tendenci CMS versions 15.3.11 and below allows authenticated staff users to execute arbitrary code through unsafe pickle deserialization in the Helpdesk module's reporting function. The vulnerability stems from incomplete patching of CVE-2020-14942, where the run_report() function continues to use unsafe pickle.loads() despite the ticket_list() function being corrected. Public exploit code exists for this issue, though impact is limited to the privileges of the application's runtime user.

Python RCE Deserialization +1
NVD GitHub
CVE-2026-23524
EPSS 1% CVSS 9.8
CRITICAL PATCH Act Now

Laravel Reverb WebSocket server versions 1.6.3 and below have an insecure deserialization vulnerability enabling remote code execution on the backend server.

Redis Laravel RCE +2
NVD GitHub
CVE-2026-23516
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

CVAT is an open source interactive video and image annotation tool for computer vision. [CVSS 5.4 MEDIUM]

RCE AI / ML Computer Vision Annotation Tool
NVD GitHub
CVE-2026-22793
EPSS 0% CVSS 9.6
CRITICAL POC Act Now

5ire MCP client prior to version 0.10.0 has a code injection vulnerability through MCP tool responses that enables arbitrary code execution on the user's desktop.

RCE 5ire
NVD GitHub
CVE-2025-69209
EPSS 0%
This Week

ArduinoCore-avr contains the source code and configuration files of the Arduino AVR Boards platform. A vulnerability in versions prior to 1.8.7 allows an attacker to trigger a stack-based buffer overflow when converting floating-point values to strings with high precision. By passing very large `decimalPlaces` values to the affected String constructors or concat methods, the `dtostrf` function writes beyond fixed-size stack buffers, causing memory corruption and denial of service. Under speci...

Github Buffer Overflow Stack Overflow +3
NVD GitHub
CVE-2025-69766
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Tenda AX3 firmware has a third stack-based buffer overflow in formGetIptv, allowing unauthenticated remote code execution through the router's web interface.

RCE Buffer Overflow Stack Overflow +3
NVD
CVE-2025-69763
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Tenda AX3 firmware has a second stack overflow in formSetIptv via the vlanId parameter, allowing remote code execution through the IPTV configuration endpoint.

RCE Stack Overflow Memory Corruption +2
NVD
CVE-2025-69762
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Tenda AX3 firmware v16.03.12.11 has a stack overflow in formSetIptv via the list parameter, enabling remote attackers to crash the router or execute arbitrary code.

RCE Stack Overflow Memory Corruption +2
NVD
CVE-2021-47887
EPSS 0% CVSS 7.8
HIGH POC This Week

OkiJaSvc service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB
CVE-2021-47886
EPSS 0% CVSS 7.8
HIGH POC This Week

PingzapperSvc service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB
CVE-2021-47884
EPSS 0% CVSS 7.8
HIGH POC This Week

OKI Local Port Manager service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB
CVE-2021-47869
EPSS 0% CVSS 7.8
HIGH POC This Week

BRA_Scheduler service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB
CVE-2021-47861
EPSS 0% CVSS 7.8
HIGH POC This Week

Event Log Explorer 4.9.3 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. [CVSS 7.8 HIGH]

RCE
NVD Exploit-DB
CVE-2021-47859
EPSS 0% CVSS 7.8
HIGH POC This Week

ac.sharedstore service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB
CVE-2021-47851
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

Mini Mouse 9.2.0 remote control application has an RCE vulnerability allowing attackers to execute arbitrary OS commands through the remote control protocol.

RCE Mini Mouse
NVD Exploit-DB
CVE-2021-47830
EPSS 0% CVSS 6.5
MEDIUM POC This Month

GetSimple CMS My SMTP Contact Plugin 1.1.1 contains a cross-site request forgery (CSRF) vulnerability. Attackers can craft a malicious webpage that, when visited by an authenticated administrator, can change SMTP configuration settings in the plugin. [CVSS 6.5 MEDIUM]

RCE CSRF Getsimplecms
NVD GitHub Exploit-DB
CVE-2021-47778
EPSS 1% CVSS 7.2
HIGH POC This Week

GetSimple CMS My SMTP Contact Plugin 1.1.2 contains a PHP code injection vulnerability. An authenticated administrator can inject arbitrary PHP code through plugin configuration parameters, leading to remote code execution on the server. [CVSS 7.2 HIGH]

PHP RCE Code Injection +1
NVD GitHub Exploit-DB
CVE-2021-47770
EPSS 0% CVSS 8.8
HIGH POC This Week

OpenPLC v3 contains an authenticated remote code execution vulnerability that allows attackers with valid credentials to inject malicious code through the hardware configuration interface. [CVSS 8.8 HIGH]

RCE
NVD GitHub Exploit-DB
CVE-2021-47748
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

Hasura GraphQL 1.3.3 has a remote code execution vulnerability allowing attackers to execute arbitrary shell commands through the GraphQL endpoint.

PostgreSQL RCE Graphql Engine
NVD GitHub Exploit-DB
CVE-2025-56005
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

PLY (Python Lex-Yacc) library 3.11 has an unsafe feature enabling remote code execution through pickle deserialization of cached parser tables, with EPSS 0.91%.

Python Github RCE +5
NVD GitHub
CVE-2025-64087
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

A server-side template injection vulnerability (CWE-1336) with CVSS 9.8 allows remote attackers to execute arbitrary code through crafted template expressions.

RCE Xdocreport
NVD GitHub
CVE-2026-22844
EPSS 0% CVSS 9.9
CRITICAL Act Now

Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 have a CVSS 9.9 command injection vulnerability allowing meeting participants to execute OS commands on the router.

Zoom RCE Command Injection
NVD
CVE-2026-1222
EPSS 0% CVSS 7.2
HIGH This Week

Remote code execution in BROWAN COMMUNICATIONS PrismX MX100 AP controller allows high-privileged remote attackers to upload arbitrary files and execute web shell backdoors without user interaction. This vulnerability affects administrators with elevated credentials and enables complete compromise of the affected access point. No patch is currently available to remediate this issue.

File Upload RCE
NVD
CVE-2026-23947
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Orval, a TypeScript API client generator, has a command injection vulnerability that allows code execution through malicious OpenAPI specifications.

Command Injection RCE Orval
NVD GitHub
CVE-2026-23885
EPSS 0% CVSS 6.4
MEDIUM PATCH This Month

Arbitrary code execution in Alchemy CMS before versions 7.4.12 and 8.0.3 stems from unsafe use of Ruby's eval() function on the resource_handler.engine_name parameter in the ResourcesHelper class. An authenticated administrator can manipulate module configurations to inject and execute arbitrary system commands with the privileges of the Ruby process. The vulnerability requires high privileges and careful setup to exploit, but completely bypasses the Ruby sandbox once successful.

Code Injection RCE
NVD GitHub
CVE-2026-23852
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

SiYuan personal knowledge management system prior to 3.5.4 has a stored XSS vulnerability (CVSS 9.6) that allows code execution through crafted knowledge base entries.

RCE XSS Siyuan
NVD GitHub
CVE-2025-55251
EPSS 0% CVSS 3.1
LOW Monitor

HCL AION is affected by an Unrestricted File Upload vulnerability. This can allow malicious file uploads, potentially resulting in unauthorized code execution or system compromise. [CVSS 3.1 LOW]

File Upload RCE
NVD
CVE-2025-52660
EPSS 0% CVSS 2.7
LOW Monitor

Aion versions up to 2.0 contains a vulnerability that allows attackers to malicious file uploads, potentially resulting in unauthorized code execution or (CVSS 2.7).

File Upload RCE
NVD
CVE-2026-23733
EPSS 0% CVSS 6.4
MEDIUM This Month

Stored XSS in LobeChat's Mermaid artifact renderer prior to version 2.0.0-next.180 enables attackers to execute arbitrary JavaScript, which can be escalated to remote code execution through the exposed electronAPI IPC bridge to run system commands. This affects users of the open source chat platform running vulnerable versions, requiring local interaction and high privileges to exploit but resulting in full system compromise. No patch is currently available.

RCE XSS AI / ML
NVD GitHub
CVE-2026-23744
EPSS 17% CVSS 9.8
CRITICAL PATCH Act Now

MCPJam Inspector versions 1.4.2 and earlier allow unauthenticated remote code execution through missing authentication in the MCP server debugging platform, with EPSS 17.2% indicating active scanning.

RCE Authentication Bypass AI / ML +1
NVD GitHub VulDB
CVE-2012-10064
EPSS 1%
POC This Week

Omni Secure File versions up to 0.1.14 is affected by unrestricted upload of file with dangerous type.

WordPress PHP RCE
NVD WPScan Exploit-DB
CVE-2025-68924
EPSS 0% CVSS 7.5
HIGH This Week

Umbraco Forms versions up to 8.13.16 is affected by inclusion of functionality from untrusted control sphere (CVSS 7.5).

RCE Umbraco Forms
NVD GitHub
CVE-2021-47847
EPSS 0% CVSS 7.8
HIGH POC This Week

its binary path configuration contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB
CVE-2021-47844
EPSS 0% CVSS 6.1
MEDIUM POC This Month

Xmind 2020 contains a cross-site scripting vulnerability that allows attackers to inject malicious payloads into mind mapping files or custom headers. [CVSS 6.1 MEDIUM]

RCE XSS
NVD Exploit-DB
CVE-2021-47842
EPSS 0% CVSS 7.2
HIGH POC This Week

StudyMD 0.3.2 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into markdown files. [CVSS 7.2 HIGH]

RCE XSS
NVD GitHub Exploit-DB
CVE-2021-47840
EPSS 0% CVSS 7.2
HIGH POC This Week

Moeditor 0.2.0 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads within markdown files. [CVSS 7.2 HIGH]

RCE XSS
NVD Exploit-DB
CVE-2021-47839
EPSS 0% CVSS 7.2
HIGH POC This Week

Marky 0.0.1 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into markdown files. Attackers can upload crafted markdown files with embedded JavaScript payloads that execute when the file is opened, potentially enabling remote code execution. [CVSS 7.2 HIGH]

RCE XSS Redhat
NVD GitHub Exploit-DB
CVE-2021-47838
EPSS 0% CVSS 7.2
HIGH POC This Week

Markright 1.0 contains a persistent cross-site scripting vulnerability that allows attackers to embed malicious payloads in markdown files. [CVSS 7.2 HIGH]

RCE XSS
NVD GitHub Exploit-DB
CVE-2021-47837
EPSS 0% CVSS 7.2
HIGH POC This Week

Markdownify 1.2.0 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads within markdown files. Attackers can upload crafted markdown files with embedded scripts that execute when the file is opened, potentially enabling remote code execution. [CVSS 7.2 HIGH]

RCE XSS
NVD GitHub Exploit-DB
CVE-2021-47835
EPSS 0% CVSS 7.2
HIGH POC This Week

Freeter 1.2.1 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads in custom widget titles and files. [CVSS 7.2 HIGH]

RCE XSS
NVD Exploit-DB
CVE-2021-47826
EPSS 0% CVSS 7.8
HIGH POC This Week

NTI IScheduleSvc service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB
CVE-2026-23523
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

Dive, an MCP Host Desktop Application for LLM integration, allows code injection prior to version 0.13.0 through malicious tool responses, enabling attackers to execute arbitrary code on the user's machine.

RCE Code Injection AI / ML +1
NVD GitHub
CVE-2025-14894
EPSS 0% CVSS 9.8
CRITICAL Act Now

Livewire Filemanager for Laravel contains an unrestricted file upload vulnerability allowing unauthenticated attackers to upload and execute arbitrary files on the server.

PHP Laravel RCE +1
NVD GitHub
CVE-2025-12957
EPSS 0% CVSS 8.8
HIGH This Week

All-in-One Video Gallery (WordPress plugin) versions up to 4.5.7. is affected by unrestricted upload of file with dangerous type (CVSS 8.8).

WordPress RCE PHP
NVD
CVE-2025-65118
EPSS 0% CVSS 8.8
HIGH This Week

The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to trick Process Optimization services into loading arbitrary code and escalate privileges to OS System, potentially resulting in complete compromise of the Model Application Server. [CVSS 8.8 HIGH]

Privilege Escalation RCE Process Optimization
NVD GitHub
CVE-2025-64691
EPSS 0% CVSS 8.8
HIGH This Week

The vulnerability, if exploited, could allow an authenticated miscreant (OS standard user) to tamper with TCL Macro scripts and escalate privileges to OS system, potentially resulting in complete compromise of the model application server. [CVSS 8.8 HIGH]

RCE Code Injection Process Optimization
NVD GitHub
CVE-2025-61937
EPSS 0% CVSS 10.0
CRITICAL Act Now

A CVSS 10.0 code injection vulnerability allows unauthenticated attackers to achieve remote code execution with OS-level system privileges on the affected product.

RCE Process Optimization
NVD GitHub
CVE-2025-14233
EPSS 0% CVSS 9.8
CRITICAL Act Now

Canon printers contain an invalid free vulnerability in CPCA file deletion processing that allows network-based attackers to execute arbitrary code or crash the device.

RCE Mf452dw Firmware Mf656cdw Firmware +14
NVD
CVE-2021-47810
EPSS 0% CVSS 7.8
HIGH POC This Week

Wibukey versions up to 6.51 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE Wibukey
NVD Exploit-DB
CVE-2021-47795
EPSS 0% CVSS 6.2
MEDIUM POC This Month

GeoVision GeoWebServer 5.3.3 contains multiple vulnerabilities including local file inclusion, cross-site scripting, and remote code execution through improper input sanitization. [CVSS 6.2 MEDIUM]

RCE XSS Lfi +1
NVD Exploit-DB
CVE-2021-47794
EPSS 0% CVSS 8.8
HIGH POC This Week

ZesleCP 3.1.9 contains an authenticated remote code execution vulnerability that allows attackers to create malicious FTP accounts with shell injection payloads. [CVSS 8.8 HIGH]

RCE Zeslecp
NVD Exploit-DB
CVE-2021-47792
EPSS 0% CVSS 7.8
HIGH POC This Week

Remote Mouse versions up to 3.008 contains a vulnerability that allows attackers to execute arbitrary code with elevated system privileges (CVSS 7.8).

RCE Remote Mouse
NVD Exploit-DB
CVE-2021-47790
EPSS 0% CVSS 7.8
HIGH POC This Week

Active Webcam versions up to 11.5 contains a vulnerability that allows attackers to execute arbitrary code with elevated system privileges (CVSS 7.8).

RCE Active Webcam
NVD Exploit-DB
CVE-2021-47788
EPSS 0% CVSS 8.8
HIGH POC This Week

Websitebaker versions up to 2.13.0 is affected by unrestricted upload of file with dangerous type (CVSS 8.8).

RCE Websitebaker
NVD Exploit-DB
CVE-2021-47785
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Ether MP3 CD Burner 1.3.8 has buffer overflow in registration enabling bind shell on port 3110 via SEH overwrite. PoC available.

Dns RCE Buffer Overflow +1
NVD Exploit-DB
CVE-2021-47780
EPSS 0% CVSS 7.8
HIGH POC This Week

Macro Expert versions up to 4.7 contains a vulnerability that allows attackers to potentially execute arbitrary code with elevated system privileges (CVSS 7.8).

RCE Macro Expert
NVD Exploit-DB
CVE-2020-36930
EPSS 0% CVSS 7.8
HIGH POC This Week

Sysgauge versions up to 7.9.18 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE Sysgauge
NVD Exploit-DB
CVE-2023-7334
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Changjetong T+ (through 16.x) has .NET deserialization RCE in an AjaxPro endpoint. Attacker-controlled JSON triggers deserialization of malicious .NET types. PoC available.

Dotnet RCE Deserialization
NVD GitHub
CVE-2011-10041
EPSS 0%
This Week

Uploadify WordPress plugin versions up to and including 1.0 contain an arbitrary file upload vulnerability in process_upload.php due to missing file type validation.

WordPress PHP RCE
NVD WPScan
CVE-2026-23746
EPSS 0%
This Week

Entrust Instant Financial Issuance (IFI) On Premise software (formerly referred to as CardWizard) versions 5.x, prior to 6.10.5, and prior to 6.11.1 contain an insecure .NET Remoting exposure in the SmartCardController service (DCG.SmartCardControllerService.exe).

Dotnet RCE
NVD
CVE-2025-13845
EPSS 0%
This Week

CWE-416: Use After Free vulnerability that could cause remote code execution when the end user imports the malicious project file (SSD file) into Rapsody.

RCE Use After Free
NVD
CVE-2025-62193
EPSS 0% CVSS 9.8
CRITICAL Act Now

NOAA PMEL Live Access Server (LAS) has unauthenticated RCE through PyFerret SPAWN commands embedded in requests. Scientific data servers running LAS are vulnerable to complete compromise.

RCE Command Injection
NVD GitHub
CVE-2021-47843
EPSS 0% CVSS 5.4
MEDIUM POC This Month

Tagstoo 2.0.1 contains a stored cross-site scripting vulnerability that allows attackers to inject malicious payloads through files or custom tags. Attackers can execute arbitrary JavaScript code to spawn system processes, access files, and perform remote code execution on the victim's computer. [CVSS 5.4 MEDIUM]

RCE XSS Tagstoo
NVD Exploit-DB
CVE-2021-47774
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Kingdia CD Extractor 3.0.2 has a buffer overflow in the registration name field. PoC available.

Dns RCE Buffer Overflow
NVD Exploit-DB
CVE-2021-47772
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

10-Strike Network Inventory Explorer Pro 9.31 has a buffer overflow in text file import that enables RCE through crafted files. PoC available.

RCE Buffer Overflow Network Inventory Explorer
NVD Exploit-DB
CVE-2021-47762
EPSS 0% CVSS 7.8
HIGH POC This Week

HTTPDebuggerPro 9.11 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. [CVSS 7.8 HIGH]

RCE
NVD Exploit-DB
CVE-2021-47758
EPSS 1% CVSS 8.8
HIGH POC This Week

Patient Management System versions up to 2.0.2 is affected by unrestricted upload of file with dangerous type (CVSS 8.8).

PHP RCE Patient Management System
NVD GitHub Exploit-DB
CVE-2021-47757
EPSS 1% CVSS 8.8
HIGH POC This Week

Patient Management System versions up to 2.0.2 is affected by unrestricted upload of file with dangerous type (CVSS 8.8).

PHP RCE Patient Management System
NVD GitHub Exploit-DB
CVE-2025-67084
EPSS 0% CVSS 9.9
CRITICAL POC Act Now

InvoicePlane through 1.6.3 allows authenticated users to upload PHP files as attachments that can be executed remotely. Low privileges sufficient with scope change. PoC available.

PHP RCE Invoiceplane
NVD GitHub
CVE-2025-13062
EPSS 0% CVSS 8.8
HIGH This Week

Supreme Modules Lite (WordPress plugin) versions up to 2.5.62. is affected by unrestricted upload of file with dangerous type (CVSS 8.8).

WordPress RCE PHP
NVD
CVE-2025-65397
EPSS 0% CVSS 6.8
MEDIUM This Month

An insecure authentication mechanism in the safe_exec.sh startup script of Blurams Flare Camera version 24.1114.151.929 and earlier allows an attacker with physical access to the device to execute arbitrary commands with root privileges, if file /opt/images/public_key.der is not present in the file system. [CVSS 6.8 MEDIUM]

RCE Code Injection Dome Flare Firmware
NVD
CVE-2023-54338
EPSS 0% CVSS 8.4
HIGH POC This Week

Tftpd32 SE 4.60 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. [CVSS 8.4 HIGH]

RCE
NVD Exploit-DB
CVE-2023-54331
EPSS 0% CVSS 7.8
HIGH POC This Week

Outline versions up to - contains a vulnerability that allows attackers to potentially execute arbitrary code with elevated system privileges (CVSS 7.8).

RCE Outline
NVD Exploit-DB
CVE-2023-53984
EPSS 0% CVSS 8.4
HIGH POC This Week

Clevo HotKey Clipboard 2.1.0.6 contains an unquoted service path vulnerability in the HKClipSvc service that allows local non-privileged users to potentially execute code with system privileges. [CVSS 8.4 HIGH]

RCE
NVD Exploit-DB
CVE-2022-50938
EPSS 0% CVSS 8.4
HIGH POC This Week

CONTPAQi AdminPAQ 14.0.0 contains an unquoted service path vulnerability in the AppKeyLicenseServer service running with LocalSystem privileges. [CVSS 8.4 HIGH]

RCE
NVD Exploit-DB
CVE-2022-50936
EPSS 1% CVSS 8.8
HIGH POC This Week

Wbce Cms versions up to 1.5.2 is affected by unrestricted upload of file with dangerous type (CVSS 8.8).

PHP RCE Wbce Cms
NVD GitHub Exploit-DB
CVE-2022-50933
EPSS 0% CVSS 7.8
HIGH POC This Week

Cain \& Abel versions up to 4.9.56 contains a vulnerability that allows attackers to potentially execute arbitrary code with elevated privileges (CVSS 7.8).

RCE
NVD Exploit-DB
Prev Page 14 of 50 Next

Quick Facts

Typical Severity
CRITICAL
Category
other
Total CVEs
4457

Related CWEs

MITRE ATT&CK

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy