High EPSS Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
3,485 results Clear all
CVE-2025-29927 9.1 CRITICAL EXPLOITED 138 PoCs Analysis NUCLEI EPSS 0.93
Next.js Middleware Bypass
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
CWE-285 Mar 21, 2025
CVE-2020-14181 5.3 MEDIUM 5 PoCs Analysis NUCLEI EPSS 0.93
Atlassian Data Center < 7.13.6 - Information Disclosure
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5.7, and from version 8.6.0 before 8.12.0.
CWE-200 Sep 17, 2020
CVE-2015-8562 EXPLOITED 13 PoCs Analysis NUCLEI EPSS 0.93
Joomla! <3.4.6 - Code Injection
Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
CWE-20 Dec 16, 2015
CVE-2015-4852 9.8 CRITICAL KEV 11 PoCs Analysis EPSS 0.93
Oracle Virtual Desktop Infrastructure - Insecure Deserialization
The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.
CWE-502 Nov 18, 2015
CVE-2022-23178 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Crestron Hd-md4x2-4k-e Firmware - Authentication Bypass
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.
CWE-287 Jan 15, 2022
CVE-2017-17215 8.8 HIGH EXPLOITED 4 PoCs Analysis EPSS 0.93
Huawei HG532 - RCE
Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code.
CWE-20 Mar 20, 2018
CVE-2024-7029 8.8 HIGH EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
Avtech Avm1203 Firmware - Command Injection
Commands can be injected over the network and executed without authentication.
CWE-77 Aug 02, 2024
CVE-2016-4117 9.8 CRITICAL KEV RANSOMWARE 4 PoCs Analysis EPSS 0.93
Adobe Flash Player DeleteRangeTimelineOperation Type-Confusion
Adobe Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in May 2016.
May 11, 2016
CVE-2019-15642 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Webmin < 1.920 - Code Injection
rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."
CWE-94 Aug 26, 2019
CVE-2022-36446 9.8 CRITICAL 5 PoCs Analysis NUCLEI EPSS 0.93
Webmin <1.997 - XSS
software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.
CWE-116 Jul 25, 2022
CVE-2023-29489 5.3 MEDIUM 20 PoCs Analysis NUCLEI EPSS 0.93
Cpanel < 11.102.0.31 - XSS
An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the cpsrvd error page via an invalid webcall ID, aka SEC-669. The fixed versions are 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31.
CWE-79 Apr 27, 2023
CVE-2024-4295 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.93
Email Subscribers by Icegram Express <5.7.20 - SQL Injection
The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘hash’ parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Jun 05, 2024
CVE-2025-1661 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
Pluginus Husky - Products Filter Prof... - Path Traversal
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22 Mar 11, 2025
CVE-2024-32709 9.3 CRITICAL 1 PoC NUCLEI EPSS 0.93
Plechev Andrey WP-Recall <16.26.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
CWE-89 Apr 24, 2024
CVE-2023-42793 9.8 CRITICAL KEV RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.93
Jetbrains Teamcity < 2023.05.4 - Missing Authentication
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
CWE-306 Sep 19, 2023
CVE-2024-1071 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
WordPress Ultimate Member SQL Injection (CVE-2024-1071)
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Mar 13, 2024
CVE-2019-13372 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Dlink Central Wifimanager < 1.03 - Code Injection
/web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication.
CWE-287 Jul 06, 2019
CVE-2020-15999 9.6 CRITICAL KEV 5 PoCs Analysis EPSS 0.93
Google Chrome < 86.0.4240.111 - Out-of-Bounds Write
Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-120 Nov 03, 2020
CVE-2019-1579 8.1 HIGH KEV RANSOMWARE 2 PoCs Analysis EPSS 0.93
PAN-OS <7.1.18, <8.0.11-h1, <8.1.2 - RCE
Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code.
CWE-134 Jul 19, 2019
CVE-2024-44000 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
Litespeedtech Litespeed Cache - Insufficiently Protected Credentials
Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a through < 6.5.0.1.
CWE-522 Oct 20, 2024