High EPSS Vulnerabilities with Public Exploits

Updated 54m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
3,485 results Clear all
CVE-2010-2883 7.3 HIGH KEV 6 PoCs Analysis EPSS 0.93
Adobe Reader/Acrobat <9.4-8.2.5 - Buffer Overflow
Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
CWE-787 Sep 09, 2010
CVE-2016-0957 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.93
Adobe Experience Manager <6.1.0 - SSRF
Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors.
Feb 10, 2016
CVE-2023-34039 9.8 CRITICAL 6 PoCs Analysis NUCLEI EPSS 0.93
VMWare Aria Operations for Networks (vRealize Network Insight) SSH Private Key Exposure
Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI.
CWE-327 Aug 29, 2023
CVE-2021-40323 9.8 CRITICAL 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.93
Cobbler <3.3.0 - RCE
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
CWE-94 Oct 04, 2021
CVE-2014-0497 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.93
Adobe Flash Player Integer Underflow Remote Code Execution
Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
CWE-191 Feb 05, 2014
CVE-2024-10400 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Themeum Tutor Lms < 2.7.6 - SQL Injection
The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the ‘rating_filter’ parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Nov 21, 2024
CVE-2023-47218 5.8 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Qnap Qts < 5.1.5.2645 - Command Injection
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later
CWE-78 Feb 13, 2024
CVE-2015-5119 9.8 CRITICAL KEV RANSOMWARE 7 PoCs Analysis EPSS 0.93
Adobe Flash Player ByteArray Use After Free
Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
CWE-416 Jul 08, 2015
CVE-2023-43261 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Milesight <v35.3.0.7 - Info Disclosure
An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.
CWE-532 Oct 04, 2023
CVE-2016-6415 7.5 HIGH KEV 4 PoCs Analysis EPSS 0.93
Cisco IKE Information Disclosure
The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.
CWE-200 Sep 19, 2016
CVE-2014-0094 EXPLOITED 4 PoCs Analysis EPSS 0.93
Apache Struts <2.3.16.2 - RCE
The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method.
Mar 11, 2014
CVE-2024-5084 9.8 CRITICAL 8 PoCs Analysis NUCLEI EPSS 0.93
Hashthemes Hash Form < 1.1.1 - Unrestricted File Upload
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 May 23, 2024
CVE-2020-12641 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.93
Roundcube Webmail <1.4.4 - RCE
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
CWE-78 May 04, 2020
CVE-2015-3035 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.93
TP-LINK Various - Path Traversal
Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.
CWE-22 Apr 22, 2015
CVE-2023-27372 9.8 CRITICAL EXPLOITED 16 PoCs Analysis NUCLEI EPSS 0.93
Spip < 3.2.18 - Insecure Deserialization
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
CWE-502 Feb 28, 2023
CVE-2012-1889 8.8 HIGH KEV 4 PoCs Analysis EPSS 0.93
Microsoft Xml Core Services - Out-of-Bounds Write
Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
CWE-787 Jun 13, 2012
CVE-2007-5659 7.8 HIGH KEV 3 PoCs Analysis EPSS 0.93
Adobe Acrobat < 8.1.2 - Buffer Overflow
Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.
CWE-120 Feb 12, 2008
CVE-2023-25135 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Vbulletin - Insecure Deserialization
vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
CWE-502 Feb 03, 2023
CVE-2022-24716 7.5 HIGH EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.93
Icinga Web 2 <2.9.5 - Info Disclosure
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
CWE-22 Mar 08, 2022
CVE-2022-23134 3.7 LOW KEV 1 PoC Analysis NUCLEI EPSS 0.93
Zabbix < 5.4.8 - Improper Access Control
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
CWE-284 Jan 13, 2022