High EPSS Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
3,485 results Clear all
CVE-2024-8504 8.8 HIGH 2 PoCs Analysis EPSS 0.93
VICIdial - RCE
An attacker with authenticated access to VICIdial as an "agent" can execute arbitrary shell commands as the "root" user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective.
CWE-78 Sep 10, 2024
CVE-2024-53677 9.8 CRITICAL EXPLOITED 22 PoCs Analysis EPSS 0.93
Apache Struts < 6.4.0 - Unrestricted File Upload
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
CWE-434 Dec 11, 2024
CVE-2024-36104 9.1 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Apache OFBiz <18.12.14 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14. Users are recommended to upgrade to version 18.12.14, which fixes the issue.
CWE-22 Jun 04, 2024
CVE-2021-31166 9.8 CRITICAL KEV RANSOMWARE 20 PoCs Analysis EPSS 0.93
Windows IIS HTTP Protocol Stack DOS
HTTP Protocol Stack Remote Code Execution Vulnerability
CWE-416 May 11, 2021
CVE-2022-39986 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.93
Raspap < 2.8.7 - Command Injection
A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
CWE-77 Aug 01, 2023
CVE-2013-0074 7.8 HIGH KEV RANSOMWARE 3 PoCs Analysis EPSS 0.93
Microsoft Silverlight <5.1.20125.0 - RCE
Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."
Mar 13, 2013
CVE-2021-3019 7.5 HIGH 8 PoCs Analysis NUCLEI EPSS 0.93
ffay lanproxy 0.1 - Path Traversal
ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet.
CWE-22 Jan 05, 2021
CVE-2024-0204 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
Fortra GoAnywhere MFT Unauthenticated Remote Code Execution
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
CWE-425 Jan 22, 2024
CVE-2024-27198 9.8 CRITICAL KEV RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.93
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
CWE-288 Mar 04, 2024
CVE-2020-9376 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.93
Dlink Dir-610 Firmware - Injection
D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CWE-74 Jul 09, 2020
CVE-2015-8399 4.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.93
Atlassian Confluence <5.8.17 - Info Disclosure
Atlassian Confluence before 5.8.17 allows remote authenticated users to read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action.
CWE-200 Apr 11, 2016
CVE-2024-8856 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.93
WordPress WP Time Capsule Arbitrary File Upload to RCE
The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Nov 16, 2024
CVE-2024-51568 10.0 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.93
CyberPanel <2.3.5 - Command Injection
CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters.
CWE-78 Oct 29, 2024
CVE-2013-2028 12 PoCs Analysis EPSS 0.93
F5 Nginx < 1.4.0 - Out-of-Bounds Write
The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
CWE-787 Jul 20, 2013
CVE-2024-12849 7.5 HIGH 3 PoCs Analysis NUCLEI EPSS 0.93
Error Log Viewer By WP Guru <1.0.1.3 - Info Disclosure
The Error Log Viewer By WP Guru plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.0.1.3 via the wp_ajax_nopriv_elvwp_log_download AJAX action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-22 Jan 07, 2025
CVE-2021-32648 8.2 HIGH KEV 2 PoCs 1 Writeup Analysis NUCLEI EPSS 0.93
October < 1.1.5 - Authentication Bypass
octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
CWE-287 Aug 26, 2021
CVE-2020-11546 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Superwebmailer < 7.40.0.01550 - Code Injection
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
CWE-94 Jul 14, 2020
CVE-2024-1512 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.93
Stylemixthemes Masterstudy Lms < 3.2.5 - SQL Injection
The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 17, 2024
CVE-2018-0171 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.93
Cisco Ios - Out-of-Bounds Write
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.
CWE-20 Mar 28, 2018
CVE-2023-6933 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Wpengine Better Search Replace < 1.4.5 - Insecure Deserialization
The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Feb 05, 2024