High EPSS Vulnerabilities with Public Exploits

Updated 54m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
3,485 results Clear all
CVE-2017-0146 8.8 HIGH KEV RANSOMWARE 6 PoCs Analysis EPSS 0.93
Microsoft Server Message Block < 4.0e - Remote Code Execution
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.
Mar 17, 2017
CVE-2021-25296 8.8 HIGH KEV 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.93
Nagios XI xi-5.7.5 - Command Injection
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
Feb 15, 2021
CVE-2020-11530 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Idangero Chop Slider - SQL Injection
A blind SQL injection vulnerability is present in Chop Slider 3, a WordPress plugin. The vulnerability is introduced in the id GET parameter supplied to get_script/index.php, and allows an attacker to execute arbitrary SQL queries in the context of the WP database user.
CWE-89 May 08, 2020
CVE-2019-8451 6.5 MEDIUM EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.93
Atlassian Jira Server < 8.4.0 - SSRF
The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.
CWE-918 Sep 11, 2019
CVE-2015-7450 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.93
IBM Products - Command Injection
Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.
CWE-502 Jan 02, 2016
CVE-2023-7028 10.0 CRITICAL KEV 19 PoCs Analysis NUCLEI EPSS 0.93
GitLab Password Reset Account Takeover
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
CWE-640 Jan 12, 2024
CVE-2017-0145 8.8 HIGH KEV RANSOMWARE 6 PoCs Analysis EPSS 0.93
Microsoft Server Message Block < 4.0e - Remote Code Execution
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.
Mar 17, 2017
CVE-2021-33690 9.9 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
SAP Netweaver Development Infrastructure - SSRF
Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.
CWE-918 Sep 15, 2021
CVE-2009-2288 EXPLOITED 4 PoCs Analysis EPSS 0.93
Nagios <3.1.1 - RCE
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
CWE-78 Jul 01, 2009
CVE-2022-43939 8.6 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.93
Hitachi Vantara Pentaho <9.4.0.1-9.3.0.2 - SSRF
Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.2, including 8.3.x contain security restrictions using non-canonical URLs which can be circumvented.
CWE-647 Apr 03, 2023
CVE-2021-40822 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
GeoServer <2.19.2 - SSRF
GeoServer through 2.18.5 and 2.19.x through 2.19.2 allows SSRF via the option for setting a proxy host.
CWE-918 May 02, 2022
CVE-2022-31499 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Nortek Linear eMerge E3-Series <0.32-08f - Command Injection
Nortek Linear eMerge E3-Series devices before 0.32-08f allow an unauthenticated attacker to inject OS commands via ReaderNo. NOTE: this issue exists because of an incomplete fix for CVE-2019-7256.
CWE-78 Aug 25, 2022
CVE-2023-36884 7.5 HIGH KEV RANSOMWARE 9 PoCs Analysis EPSS 0.93
Windows Search - RCE
Windows Search Remote Code Execution Vulnerability
CWE-362 Jul 11, 2023
CVE-2023-6895 6.3 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Hikvision Intercom Broadcast System < 4.1.0 - OS Command Injection
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.
CWE-78 Dec 17, 2023
CVE-2020-3580 6.1 MEDIUM KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.93
Cisco Firepower Threat Defense < 6.4.0.12 - XSS
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.
CWE-79 Oct 21, 2020
CVE-2023-4220 8.1 HIGH EXPLOITED 32 PoCs Analysis NUCLEI EPSS 0.93
Chamilo v1.11.24 Unrestricted File Upload PHP Webshell
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
CWE-434 Nov 28, 2023
CVE-2024-8517 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.93
SPIP <4.3.2-4.1.18 - Command Injection
SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.
CWE-78 Sep 06, 2024
CVE-2024-29895 10.0 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
Cacti 1.3.x DEV - Command Injection
Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.
CWE-77 May 14, 2024
CVE-2013-2465 9.8 CRITICAL KEV RANSOMWARE 2 PoCs Analysis EPSS 0.93
Java storeImageArray() Invalid Array Indexing Vulnerability
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
CWE-693 Jun 18, 2013
CVE-2014-0322 8.8 HIGH KEV 3 PoCs Analysis EPSS 0.93
MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.
CWE-416 Feb 14, 2014