High EPSS Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,484 results
Clear all
CVE-2021-1498
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78
May 06, 2021
CVE-2022-28219
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.94
ManageEngine ADAudit Plus CVE-2022-28219
Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthenticated XXE attack that leads to Remote Code Execution.
CWE-611
Apr 05, 2022
CVE-2024-9463
7.5
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Paloaltonetworks Expedition < 1.2.96 - OS Command Injection
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
CWE-78
Oct 09, 2024
CVE-2017-12615
8.1
HIGH
KEV
RANSOMWARE
21 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Tomcat < 7.0.79 - Unrestricted File Upload
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
CWE-434
Sep 19, 2017
CVE-2017-5689
9.8
CRITICAL
KEV
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Intel AMT Digest Authentication Bypass Scanner
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
CWE-269
May 02, 2017
CVE-2025-24813
9.8
CRITICAL
KEV
61 PoCs
Analysis
NUCLEI
EPSS 0.94
Tomcat Partial PUT Java Deserialization
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may also be affected.
If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT
If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- application was using Tomcat's file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialization attack
Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
CWE-502
Mar 10, 2025
CVE-2021-34473
9.1
CRITICAL
KEV
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
Microsoft Exchange ProxyShell RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-918
Jul 14, 2021
CVE-2021-26086
5.3
MEDIUM
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Jira Data Center < 8.5.14 - Path Traversal
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
CWE-22
Aug 16, 2021
CVE-2021-20837
9.8
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Movable Type <7 r.5002 - RCE
Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
CWE-78
Oct 26, 2021
CVE-2024-9474
7.2
HIGH
KEV
RANSOMWARE
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Paloaltonetworks Pan-os < 10.1.14 - OS Command Injection
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
CWE-78
Nov 18, 2024
CVE-2016-5195
7.0
HIGH
KEV
74 PoCs
Analysis
EPSS 0.94
Canonical Ubuntu Linux < 3.2.83 - Race Condition
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
CWE-362
Nov 10, 2016
CVE-2020-17496
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
vBulletin <5.6.2 - RCE
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
CWE-74
Aug 12, 2020
CVE-2021-21311
7.2
HIGH
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Adminer < 4.7.9 - SSRF
Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
CWE-918
Feb 11, 2021
CVE-2017-7494
9.8
CRITICAL
KEV
RANSOMWARE
28 PoCs
Analysis
EPSS 0.94
Samba is_known_pipename() Arbitrary Module Load
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
CWE-94
May 30, 2017
CVE-2024-13159
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Ivanti EPM - Path Traversal
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
CWE-36
Jan 14, 2025
CVE-2024-5932
10.0
CRITICAL
EXPLOITED
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Givewp < 3.14.2 - Insecure Deserialization
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
CWE-502
Aug 20, 2024
CVE-2020-6207
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
SAP Solution Manager 7.2 - Auth Bypass
SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
CWE-306
Mar 10, 2020
CVE-2024-56145
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Craft CMS Twig Template Injection RCE via FTP Templates Path
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue.
CWE-94
Dec 18, 2024
CVE-2018-8120
7.0
HIGH
KEV
RANSOMWARE
18 PoCs
Analysis
EPSS 0.94
Windows SetImeInfoEx Win32k NULL Pointer Dereference
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8124, CVE-2018-8164, CVE-2018-8166.
CWE-404
May 09, 2018
CVE-2024-45195
7.5
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Apache OFBiz <18.12.16 - Info Disclosure
Direct Request ('Forced Browsing') vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: before 18.12.16.
Users are recommended to upgrade to version 18.12.16, which fixes the issue.
CWE-425
Sep 04, 2024