High EPSS Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2022-41678
8.8
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.93
Jolokia - RCE
Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.
In details, in ActiveMQ configurations, jetty allows
org.jolokia.http.AgentServlet to handler request to /api/jolokia
org.jolokia.http.HttpRequestHandler#handlePostRequest is able to
create JmxRequest through JSONObject. And calls to
org.jolokia.http.HttpRequestHandler#executeRequest.
Into deeper calling stacks,
org.jolokia.handler.ExecHandler#doHandleRequest can be invoked
through refection. This could lead to RCE through via
various mbeans. One example is unrestricted deserialization in jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11.
1 Call newRecording.
2 Call setConfiguration. And a webshell data hides in it.
3 Call startRecording.
4 Call copyTo method. The webshell will be written to a .jsp file.
The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia.
A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
CWE-287
Nov 28, 2023
CVE-2023-6553
9.8
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.93
WordPress Backup Migration Plugin PHP Filter Chain RCE
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.
CWE-94
Dec 15, 2023
CVE-2019-17621
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.93
Dlink Dir-859 Firmware < 1.05b03 - OS Command Injection
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
CWE-78
Dec 30, 2019
CVE-2020-26217
8.0
HIGH
9 PoCs
Analysis
NUCLEI
EPSS 0.93
Xstream < 1.4.14 - OS Command Injection
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
CWE-78
Nov 16, 2020
CVE-2020-8209
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Citrix XenMobile <10.12 - Info Disclosure
Improper access control in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files.
CWE-22
Aug 17, 2020
CVE-2019-8942
8.8
HIGH
EXPLOITED
9 PoCs
Analysis
EPSS 0.93
Wordpress < 4.9.9 - Unrestricted File Upload
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
CWE-434
Feb 20, 2019
CVE-2021-36356
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
KRAMER VIAware - RCE
KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.
CWE-434
Aug 31, 2021
CVE-2018-15811
7.5
HIGH
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Dnnsoftware Dotnetnuke < 9.2.1 - Weak Encryption
DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters.
CWE-326
Jul 03, 2019
CVE-2023-26067
8.1
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Lexmark <2023-02-19 - Info Disclosure
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4).
CWE-20
Apr 10, 2023
CVE-2018-19410
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.93
PRTG Network Monitor <18.2.40.1683 - Local File Inclusion
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
Nov 21, 2018
CVE-2020-28653
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.93
Zohocorp Manageengine Opmanager < 12.5 - Remote Code Execution
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
Feb 03, 2021
CVE-2024-21413
9.8
CRITICAL
KEV
35 PoCs
Analysis
EPSS 0.93
Microsoft 365 Apps - Improper Input Validation
Microsoft Outlook Remote Code Execution Vulnerability
CWE-20
Feb 13, 2024
CVE-2015-2051
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.93
Dlink Dir-645 Firmware < 1.05b01 - Command Injection
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.
CWE-77
Feb 23, 2015
CVE-2016-10372
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.93
EIR D1000 Modem Firmware - Access Control
The Eir D1000 modem does not properly restrict the TR-064 protocol, which allows remote attackers to execute arbitrary commands via TCP port 7547, as demonstrated by opening WAN access to TCP port 80, retrieving the login password (which defaults to the Wi-Fi password), and using the NewNTPServer feature.
CWE-264
May 16, 2017
CVE-2016-7552
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.93
Trendmicro Threat Discovery Appliance - Path Traversal
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
CWE-22
Apr 12, 2017
CVE-2013-1493
EXPLOITED
RANSOMWARE
2 PoCs
Analysis
EPSS 0.93
Oracle Jre < 1.7.0 - Memory Corruption
The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
CWE-119
Mar 05, 2013
CVE-2023-29552
7.5
HIGH
KEV
RANSOMWARE
1 PoC
1 Writeup
Analysis
EPSS 0.93
SLP - DoS
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
Apr 25, 2023
CVE-2018-18325
7.5
HIGH
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Dnnsoftware Dotnetnuke < 9.2.2 - Weak Encryption
DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a weak encryption algorithm to protect input parameters. NOTE: this issue exists because of an incomplete fix for CVE-2018-15811.
CWE-326
Jul 03, 2019
CVE-2024-38112
7.5
HIGH
KEV
1 PoC
Analysis
EPSS 0.93
Windows MSHTML - SSRF
Windows MSHTML Platform Spoofing Vulnerability
CWE-451
Jul 09, 2024
CVE-2009-1151
9.8
CRITICAL
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.93
Phpmyadmin < 2.11.9.5 - Code Injection
Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
CWE-94
Mar 26, 2009