High EPSS Vulnerabilities with Public Exploits

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
3,485 results Clear all
CVE-2021-34429 5.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Eclipse Jetty < 9.4.43 - Information Disclosure
For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.
CWE-551 Jul 15, 2021
CVE-2022-39952 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.94
Fortinet FortiNAC keyUpload.jsp arbitrary file write
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.
CWE-668 Feb 16, 2023
CVE-2023-37679 9.8 CRITICAL EXPLOITED RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.94
Mirth Connect Deserialization RCE
A remote command execution (RCE) vulnerability in NextGen Mirth Connect v4.3.0 allows attackers to execute arbitrary commands on the hosting server.
CWE-77 Aug 03, 2023
CVE-2001-0537 EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.94
Cisco Ios - Authentication Bypass
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
CWE-287 Jul 21, 2001
CVE-2020-25540 7.5 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.94
Thinkadmin - Path Traversal
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
CWE-22 Sep 14, 2020
CVE-2020-9496 6.1 MEDIUM EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
Apache Ofbiz - Insecure Deserialization
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
CWE-502 Jul 15, 2020
CVE-2016-3714 8.4 HIGH KEV 9 PoCs Analysis EPSS 0.94
ImageMagick <6.9.3-10 & <7.0.1-1 - RCE
The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
CWE-20 May 05, 2016
CVE-2021-22502 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Micro Focus Operation Bridge Reporter <10.40 - RCE
Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server.
CWE-78 Feb 08, 2021
CVE-2020-5849 7.5 HIGH KEV 2 PoCs Analysis EPSS 0.94
Unraid 6.8.0 - Auth Bypass
Unraid 6.8.0 allows authentication bypass.
CWE-697 Mar 16, 2020
CVE-2020-2096 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Jenkins Gitlab Hook < 1.4.2 - XSS
Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability.
CWE-79 Jan 15, 2020
CVE-2023-1698 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.94
WAGO - Privilege Escalation
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
CWE-78 May 15, 2023
CVE-2023-41892 10.0 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.94
Craft CMS unauthenticated Remote Code Execution (RCE)
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
CWE-94 Sep 13, 2023
CVE-2017-12636 7.2 HIGH 6 PoCs Analysis EPSS 0.94
Apache Couchdb < 1.7.0 - OS Command Injection
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
CWE-78 Nov 14, 2017
CVE-2019-5420 9.8 CRITICAL 14 PoCs Analysis EPSS 0.94
Ruby On Rails DoubleTap Development Mode secret_key_base Vulnerability
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
CWE-330 Mar 27, 2019
CVE-2015-4000 3.7 LOW 1 PoC Analysis EPSS 0.94
Openssl < 1.0.1m - Cryptographic Issue
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
CWE-310 May 21, 2015
CVE-2008-2992 7.8 HIGH KEV RANSOMWARE 7 PoCs Analysis EPSS 0.94
Adobe Acrobat < 8.1.2 - Out-of-Bounds Write
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
CWE-787 Nov 04, 2008
CVE-2021-36942 7.5 HIGH KEV RANSOMWARE 2 PoCs Analysis EPSS 0.94
Windows LSA - Privilege Escalation
Windows LSA Spoofing Vulnerability
Aug 12, 2021
CVE-2024-32640 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
MASA CMS <7.4.5-7.2.7 - SQL Injection
MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.5, 7.3.12, and 7.2.7 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7.4.5, 7.3.12, and 7.2.7 contain a fix for the issue.
CWE-89 Aug 11, 2025
CVE-2022-24816 10.0 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Geosolutionsgroup Jai-ext < 1.1.22 - Code Injection
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
CWE-94 Apr 13, 2022
CVE-2022-2992 9.9 CRITICAL 3 PoCs Analysis EPSS 0.94
GitLab GitHub Repo Import Deserialization RCE
A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.
CWE-74 Oct 17, 2022