High EPSS Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
3,484 results Clear all
CVE-2020-35847 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.94
Cockpit CMS NoSQLi to RCE
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php resetpassword function.
CWE-89 Dec 30, 2020
CVE-2018-16763 9.8 CRITICAL EXPLOITED 30 PoCs Analysis NUCLEI EPSS 0.94
FUEL CMS 1.4.1 - RCE
FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.
CWE-74 Sep 09, 2018
CVE-2019-11539 7.2 HIGH KEV RANSOMWARE 4 PoCs Analysis EPSS 0.94
Pulse Secure <9.0R3.4-5.1R15.1 - Authenticated Command Injection
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.
CWE-78 Apr 26, 2019
CVE-2021-27905 9.8 CRITICAL 5 PoCs Analysis NUCLEI EPSS 0.94
Apache Solr - SSRF
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
CWE-918 Apr 13, 2021
CVE-2019-10068 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Kentico <12.0.15, 11.0.48, 10.0.52, 9.x - Code Injection
An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.
CWE-502 Mar 26, 2019
CVE-2024-25600 10.0 CRITICAL EXPLOITED 26 PoCs Analysis NUCLEI EPSS 0.94
Unauthenticated Remote Code Execution - Bricks <= 1.9.6
Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6.
CWE-94 Jun 04, 2024
CVE-2020-10987 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Tenda AC15 AC1900 <15.03.05.19 - RCE
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CWE-78 Jul 13, 2020
CVE-2023-47253 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Qualitor < 8.20 - Command Injection
Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.
CWE-77 Nov 06, 2023
CVE-2017-12629 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Solr < 5.5.4 - XXE
Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.
CWE-611 Oct 14, 2017
CVE-2024-10924 9.8 CRITICAL EXPLOITED 25 PoCs Analysis NUCLEI EPSS 0.94
WordPress Really Simple SSL Plugin Authentication Bypass to RCE
The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
CWE-306 Nov 15, 2024
CVE-2019-8943 6.5 MEDIUM 6 PoCs Analysis NUCLEI EPSS 0.94
Wordpress < 5.0.3 - Path Traversal
WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.
CWE-22 Feb 20, 2019
CVE-2018-0802 7.8 HIGH KEV 9 PoCs Analysis EPSS 0.94
Microsoft Office - Out-of-Bounds Write
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.
CWE-787 Jan 10, 2018
CVE-2020-1956 8.8 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
Apache Kylin < 2.3.2 - OS Command Injection
Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
CWE-78 May 22, 2020
CVE-2020-11652 6.5 MEDIUM KEV 10 PoCs Analysis EPSS 0.94
Salt < 2019.2.4 - Path Traversal
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
CWE-22 Apr 30, 2020
CVE-2020-12800 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Wordpress Drag and Drop Multi File Uploader RCE
The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
CWE-434 Jun 08, 2020
CVE-2019-18394 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Igniterealtime Openfire < 4.4.2 - SSRF
A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.
CWE-918 Oct 24, 2019
CVE-2023-38831 7.8 HIGH KEV RANSOMWARE 61 PoCs Analysis EPSS 0.94
WinRAR CVE-2023-38831 Exploit
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
CWE-345 Aug 23, 2023
CVE-2023-29084 7.2 HIGH 2 PoCs Analysis NUCLEI EPSS 0.94
ManageEngine ADManager Plus ChangePasswordAction Authenticated Command Injection
Zoho ManageEngine ADManager Plus before 7181 allows for authenticated users to exploit command injection via Proxy settings.
CWE-77 Apr 13, 2023
CVE-2017-8464 8.8 HIGH KEV 14 PoCs Analysis EPSS 0.94
Microsoft Windows 10 1511 - Remote Code Execution
Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."
Jun 15, 2017
CVE-2024-38816 7.5 HIGH EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.94
Org.springframework Spring-webmvc < 6.1.13 - Path Traversal
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. Specifically, an application is vulnerable when both of the following are true: * the web application uses RouterFunctions to serve static resources * resource handling is explicitly configured with a FileSystemResource location However, malicious requests are blocked and rejected when any of the following is true: * the Spring Security HTTP Firewall https://docs.spring.io/spring-security/reference/servlet/exploits/firewall.html  is in use * the application runs on Tomcat or Jetty
CWE-22 Sep 13, 2024