High EPSS Vulnerabilities with Public Exploits
Updated 6h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2021-34429
5.3
MEDIUM
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Eclipse Jetty < 9.4.43 - Information Disclosure
For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.
CWE-551
Jul 15, 2021
CVE-2022-39952
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Fortinet FortiNAC keyUpload.jsp arbitrary file write
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.
CWE-668
Feb 16, 2023
CVE-2023-37679
9.8
CRITICAL
EXPLOITED
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Mirth Connect Deserialization RCE
A remote command execution (RCE) vulnerability in NextGen Mirth Connect v4.3.0 allows attackers to execute arbitrary commands on the hosting server.
CWE-77
Aug 03, 2023
CVE-2001-0537
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Cisco Ios - Authentication Bypass
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
CWE-287
Jul 21, 2001
CVE-2020-25540
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Thinkadmin - Path Traversal
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
CWE-22
Sep 14, 2020
CVE-2020-9496
6.1
MEDIUM
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Ofbiz - Insecure Deserialization
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
CWE-502
Jul 15, 2020
CVE-2016-3714
8.4
HIGH
KEV
9 PoCs
Analysis
EPSS 0.94
ImageMagick <6.9.3-10 & <7.0.1-1 - RCE
The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
CWE-20
May 05, 2016
CVE-2021-22502
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Micro Focus Operation Bridge Reporter <10.40 - RCE
Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server.
CWE-78
Feb 08, 2021
CVE-2020-5849
7.5
HIGH
KEV
2 PoCs
Analysis
EPSS 0.94
Unraid 6.8.0 - Auth Bypass
Unraid 6.8.0 allows authentication bypass.
CWE-697
Mar 16, 2020
CVE-2020-2096
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Jenkins Gitlab Hook < 1.4.2 - XSS
Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability.
CWE-79
Jan 15, 2020
CVE-2023-1698
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
WAGO - Privilege Escalation
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
CWE-78
May 15, 2023
CVE-2023-41892
10.0
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Craft CMS unauthenticated Remote Code Execution (RCE)
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
CWE-94
Sep 13, 2023
CVE-2017-12636
7.2
HIGH
6 PoCs
Analysis
EPSS 0.94
Apache Couchdb < 1.7.0 - OS Command Injection
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
CWE-78
Nov 14, 2017
CVE-2019-5420
9.8
CRITICAL
14 PoCs
Analysis
EPSS 0.94
Ruby On Rails DoubleTap Development Mode secret_key_base Vulnerability
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
CWE-330
Mar 27, 2019
CVE-2015-4000
3.7
LOW
1 PoC
Analysis
EPSS 0.94
Openssl < 1.0.1m - Cryptographic Issue
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
CWE-310
May 21, 2015
CVE-2008-2992
7.8
HIGH
KEV
RANSOMWARE
7 PoCs
Analysis
EPSS 0.94
Adobe Acrobat < 8.1.2 - Out-of-Bounds Write
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
CWE-787
Nov 04, 2008
CVE-2021-36942
7.5
HIGH
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.94
Windows LSA - Privilege Escalation
Windows LSA Spoofing Vulnerability
Aug 12, 2021
CVE-2024-32640
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.94
MASA CMS <7.4.5-7.2.7 - SQL Injection
MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.5, 7.3.12, and 7.2.7 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7.4.5, 7.3.12, and 7.2.7 contain a fix for the issue.
CWE-89
Aug 11, 2025
CVE-2022-24816
10.0
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Geosolutionsgroup Jai-ext < 1.1.22 - Code Injection
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
CWE-94
Apr 13, 2022
CVE-2022-2992
9.9
CRITICAL
3 PoCs
Analysis
EPSS 0.94
GitLab GitHub Repo Import Deserialization RCE
A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.
CWE-74
Oct 17, 2022