High EPSS Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
3,485 results Clear all
CVE-2020-14644 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jul 15, 2020
CVE-2017-1000486 9.8 CRITICAL KEV 10 PoCs Analysis NUCLEI EPSS 0.94
Primefaces Remote Code Execution Exploit
Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
CWE-326 Jan 03, 2018
CVE-2024-34470 8.6 HIGH 5 PoCs Analysis NUCLEI EPSS 0.94
HSC Mailinspector <5.2.18 - Path Traversal
An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.
CWE-29 May 06, 2024
CVE-2023-32243 9.8 CRITICAL EXPLOITED 11 PoCs Analysis NUCLEI EPSS 0.94
Wpdeveloper Essential Addons For Elementor - Authentication Bypass
Improper Authentication vulnerability in WPDeveloper Essential Addons for Elementor allows Privilege Escalation. This issue affects Essential Addons for Elementor: from 5.4.0 through 5.7.1.
CWE-287 May 12, 2023
CVE-2024-36412 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.94
SuiteCRM <7.14.4-8.6.1 - SQL Injection
SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
CWE-89 Jun 10, 2024
CVE-2010-1871 8.8 HIGH KEV 3 PoCs Analysis EPSS 0.94
JBoss Seam 2 - RCE
JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.
CWE-917 Aug 05, 2010
CVE-2024-0305 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Ncast < 2017 - Information Disclosure
A vulnerability was found in Guangzhou Yingke Electronic Technology Ncast up to 2017 and classified as problematic. Affected by this issue is some unknown functionality of the file /manage/IPSetup.php of the component Guest Login. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249872.
CWE-200 Jan 08, 2024
CVE-2020-11455 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Limesurvey < 4.1.11 - Path Traversal
LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/admin/LimeSurveyFileManager.php.
CWE-22 Apr 01, 2020
CVE-2015-1641 7.8 HIGH KEV RANSOMWARE 1 PoC Analysis EPSS 0.94
Microsoft Office <2013 - RCE
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."
CWE-787 Apr 14, 2015
CVE-2024-37032 8.8 HIGH EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
Ollama < 0.1.34 - Path Traversal
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
CWE-22 May 31, 2024
CVE-2022-22972 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
Vmware Identity Manager - Authentication Bypass
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.
May 20, 2022
CVE-2024-9047 9.8 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.94
Iptanus Wordpress File Upload < 4.24.12 - Path Traversal
The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
CWE-22 Oct 12, 2024
CVE-2021-42321 8.8 HIGH KEV RANSOMWARE 4 PoCs Analysis EPSS 0.94
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Nov 10, 2021
CVE-2023-6875 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
Wordpress POST SMTP Account Takeover
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover. CVE-2023-52233 appears to be a duplicate of this issue.
CWE-639 Jan 11, 2024
CVE-2013-0422 9.8 CRITICAL KEV RANSOMWARE 2 PoCs Analysis EPSS 0.94
Oracle Jdk - Improper Access Control
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
CWE-284 Jan 10, 2013
CVE-2019-20224 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.94
Artica Pandora Fms - OS Command Injection
netflow_get_stats in functions_netflow.php in Pandora FMS 7.0NG allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ip_src parameter in an index.php?operation/netflow/nf_live_view request. This issue has been fixed in Pandora FMS 7.0 NG 742.
CWE-78 Jan 09, 2020
CVE-2021-33766 7.3 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Microsoft Exchange Server - Info Disclosure
Microsoft Exchange Server Information Disclosure Vulnerability
Jul 14, 2021
CVE-2022-1386 9.8 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.94
Fusion Builder < 3.6.2 - SSRF
The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
CWE-918 May 16, 2022
CVE-2020-35713 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Linksys Re6500 Firmware < 1.0.012.001 - OS Command Injection
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
CWE-78 Dec 26, 2020
CVE-2021-22893 10.0 CRITICAL KEV RANSOMWARE 12 PoCs Analysis EPSS 0.94
Pulse Connect Secure >=9.0R3/9.1R1 - Auth Bypass
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
CWE-287 Apr 23, 2021