High EPSS Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
3,485 results Clear all
CVE-2016-10045 9.8 CRITICAL 3 PoCs Analysis EPSS 0.93
PHPMailer <5.2.20 - RCE
The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
CWE-77 Dec 30, 2016
CVE-2019-4716 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.93
IBM Planning Analytics <2.0.9 - Privilege Escalation
IBM Planning Analytics 2.0.0 through 2.0.8 is vulnerable to a configuration overwrite that allows an unauthenticated user to login as "admin", and then execute code as root or SYSTEM via TM1 scripting. IBM X-Force ID: 172094.
CWE-94 Dec 18, 2019
CVE-2023-0297 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
pyLoad js2py Python Execution
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
CWE-94 Jan 14, 2023
CVE-2020-28949 7.8 HIGH KEV RANSOMWARE 2 PoCs Analysis EPSS 0.93
Archive_Tar <1.4.10 - Code Injection
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.
Nov 19, 2020
CVE-2022-30190 7.8 HIGH KEV RANSOMWARE 96 PoCs Analysis EPSS 0.93
Microsoft Office Word MSDTJS
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.
Jun 01, 2022
CVE-2021-33564 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Dragonfly <1.4.0 - Command Injection
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
CWE-88 May 29, 2021
CVE-2022-1329 8.8 HIGH EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.93
Elementor Website Builder < 3.6.2 - Missing Authorization
The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
CWE-862 Apr 19, 2022
CVE-2023-33831 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
FUXA 1.1.13 - RCE
A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
CWE-77 Sep 18, 2023
CVE-2024-3552 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.93
Web Directory Free WP <1.7.0 - SQL Injection
The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
CWE-89 Jun 13, 2024
CVE-2014-1761 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.93
Microsoft Word <2013 - Memory Corruption
Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
CWE-787 Mar 25, 2014
CVE-2020-13937 5.3 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.93
Apache Kylin <4.0.0 - Info Disclosure
Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it is dangerous because some confidential information entries will be disclosed to everyone.
CWE-922 Oct 19, 2020
CVE-2018-19276 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
OpenMRS Java Deserialization RCE
OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerability that allows an unauthenticated user to execute arbitrary commands on the targeted system via crafted XML data in a request body.
CWE-502 Mar 21, 2019
CVE-2023-27163 6.5 MEDIUM EXPLOITED 30 PoCs Analysis NUCLEI EPSS 0.93
request-baskets <1.2.1 - SSRF
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
CWE-918 Mar 31, 2023
CVE-2023-1177 9.3 CRITICAL EXPLOITED 8 PoCs Analysis NUCLEI EPSS 0.93
Lfprojects Mlflow < 2.2.1 - Path Traversal
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
CWE-29 Mar 24, 2023
CVE-2009-0927 8.8 HIGH KEV 6 PoCs Analysis EPSS 0.93
Adobe Acrobat Reader < 7.1.1 - Improper Input Validation
Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
CWE-121 Mar 19, 2009
CVE-2018-10561 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis EPSS 0.93
Dasan GPON - Auth Bypass
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
CWE-287 May 04, 2018
CVE-2020-15568 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
TerraMaster TOS <4.1.29 - Code Injection
TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter.
CWE-913 Jan 30, 2021
CVE-2022-40127 8.8 HIGH 2 PoCs Analysis NUCLEI EPSS 0.93
Apache Airflow < 2.4.0 - Code Injection
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.
CWE-94 Nov 14, 2022
CVE-2021-21389 8.1 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Buddypress < 7.2.1 - Incorrect Authorization
BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
CWE-863 Mar 26, 2021
CVE-2018-7490 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.93
Unbit Uwsgi < 2.0.17 - Path Traversal
uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
CWE-22 Feb 26, 2018