High EPSS Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
3,484 results Clear all
CVE-2021-26085 5.3 MEDIUM KEV RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Confluence Server <7.4.10, >7.5.0-7.12.2 - Info Disclosure
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
CWE-425 Aug 03, 2021
CVE-2022-43769 8.8 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Pentaho Business Server Auth Bypass and Server Side Template Injection RCE
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream.
CWE-74 Apr 03, 2023
CVE-2024-29824 8.8 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Ivanti EPM RecordGoodApp SQLi RCE
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
CWE-89 May 31, 2024
CVE-2019-20085 7.5 HIGH KEV 7 PoCs Analysis NUCLEI EPSS 0.94
TVT Nvms-1000 Firmware - Path Traversal
TVT NVMS-1000 devices allow GET /.. Directory Traversal
CWE-22 Dec 30, 2019
CVE-2016-3081 8.1 HIGH 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts < 2.3.20.3 - Command Injection
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.
CWE-77 Apr 26, 2016
CVE-2022-31137 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Roxy-WI <6.1.1.0 - RCE
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-78 Jul 08, 2022
CVE-2019-20933 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
InfluxDB <1.7.6 - Auth Bypass
InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
CWE-287 Nov 19, 2020
CVE-2021-25646 8.8 HIGH EXPLOITED 13 PoCs Analysis NUCLEI EPSS 0.94
Apache Druid <0.20.0 - XSS
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
Jan 29, 2021
CVE-2024-32113 9.8 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
Apache OFBiz <18.12.13 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13. Users are recommended to upgrade to version 18.12.13, which fixes the issue.
CWE-22 May 08, 2024
CVE-2023-49070 9.8 CRITICAL EXPLOITED 8 PoCs Analysis NUCLEI EPSS 0.94
Apache Ofbiz <18.12.10 - RCE
Pre-auth RCE in Apache Ofbiz 18.12.09. It's due to XML-RPC no longer maintained still present. This issue affects Apache OFBiz: before 18.12.10.  Users are recommended to upgrade to version 18.12.10
CWE-94 Dec 05, 2023
CVE-2018-10823 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Dlink Dwr-116 Firmware < 1.06 - OS Command Injection
An issue was discovered on D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.
CWE-78 Oct 17, 2018
CVE-2022-41352 9.8 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
Zimbra Collaboration <9.0 - Privilege Escalation
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
CWE-22 Sep 26, 2022
CVE-2021-31207 6.6 MEDIUM KEV RANSOMWARE 7 PoCs Analysis EPSS 0.94
Microsoft Exchange Server - Unrestricted File Upload
Microsoft Exchange Server Security Feature Bypass Vulnerability
CWE-434 May 11, 2021
CVE-2021-31805 9.8 CRITICAL EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts < 2.5.29 - Remote Code Execution
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
CWE-917 Apr 12, 2022
CVE-2024-4443 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Business Directory Plugin - WordPress <6.4.2 - SQL Injection
The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘listingfields’ parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 22, 2024
CVE-2017-8759 7.8 HIGH KEV 22 PoCs Analysis EPSS 0.94
Microsoft .net Framework - Code Injection
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
CWE-94 Sep 13, 2017
CVE-2020-13851 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Pandora FMS Events Remote Command Execution
Artica Pandora FMS 7.44 allows remote command execution via the events feature.
CWE-78 Jun 11, 2020
CVE-2015-7547 8.1 HIGH EXPLOITED 15 PoCs Analysis EPSS 0.94
GNU C Library <2.23 - Buffer Overflow
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
CWE-119 Feb 18, 2016
CVE-2025-24893 9.8 CRITICAL KEV 51 PoCs Analysis NUCLEI EPSS 0.94
XWiki Platform - Remote Code Execution
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.
CWE-95 Feb 20, 2025
CVE-2016-3714 8.4 HIGH KEV 9 PoCs Analysis EPSS 0.94
ImageMagick <6.9.3-10 & <7.0.1-1 - RCE
The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
CWE-20 May 05, 2016