High EPSS Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2019-1003030
9.9
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.93
Jenkins Pipeline: Groovy Plugin <2.63 - RCE
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
CWE-693
Mar 08, 2019
CVE-2024-9014
9.9
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Pgadmin 4 < 8.12 - Insufficiently Protected Credentials
pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.
CWE-522
Sep 23, 2024
CVE-2017-8291
7.8
HIGH
KEV
6 PoCs
Analysis
EPSS 0.93
Ghostscript Type Confusion Arbitrary Command Execution
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
CWE-843
Apr 27, 2017
CVE-2023-50290
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.93
Apache Solr < 9.3.0 - Information Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.
The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess.
The Solr Metrics API is protected by the "metrics-read" permission.
Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission.
This issue affects Apache Solr: from 9.0.0 before 9.3.0.
Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.
CWE-200
Jan 15, 2024
CVE-2023-50164
9.8
CRITICAL
EXPLOITED
19 PoCs
Analysis
EPSS 0.93
Apache Struts < 2.5.33 - Remote Code Execution
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
CWE-552
Dec 07, 2023
CVE-2009-4324
7.8
HIGH
KEV
5 PoCs
Analysis
EPSS 0.93
Adobe Reader/Acrobat <9.3-8.2 - RCE
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
CWE-416
Dec 15, 2009
CVE-2009-3103
EXPLOITED
RANSOMWARE
14 PoCs
Analysis
EPSS 0.93
Microsoft Windows Server 2008 - Resource Management Error
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
CWE-399
Sep 08, 2009
CVE-2021-1499
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.93
Cisco HyperFlex HX Data Platform unauthenticated file upload to RCE (CVE-2021-1499)
A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user.
CWE-306
May 06, 2021
CVE-2021-22204
6.8
MEDIUM
KEV
20 PoCs
Analysis
EPSS 0.93
GitLab Unauthenticated Remote ExifTool Command Injection
Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
CWE-94
Apr 23, 2021
CVE-2019-9194
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.93
Std42 Elfinder < 2.1.48 - OS Command Injection
elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.
CWE-78
Feb 26, 2019
CVE-2021-3378
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.93
Fortilogger < 5.2.0 - Unrestricted File Upload
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
CWE-434
Feb 01, 2021
CVE-2020-13379
8.2
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Grafana 3.0.1-7.0.1 - SSRF
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
CWE-918
Jun 03, 2020
CVE-2018-14847
9.1
CRITICAL
KEV
18 PoCs
Analysis
EPSS 0.93
MikroTik RouterOS <6.42 - Path Traversal
MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
CWE-22
Aug 02, 2018
CVE-2022-3236
9.8
CRITICAL
KEV
2 PoCs
NUCLEI
EPSS 0.93
Sophos Firewall <19.0 MR1 - Code Injection
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.
CWE-94
Sep 23, 2022
CVE-2017-14492
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.93
dnsmasq <2.78 - Buffer Overflow
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
CWE-119
Oct 03, 2017
CVE-2010-1297
7.8
HIGH
KEV
6 PoCs
Analysis
EPSS 0.93
Adobe Flash Player
Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
CWE-787
Jun 08, 2010
CVE-2018-0101
10.0
CRITICAL
EXPLOITED
3 PoCs
Analysis
EPSS 0.93
Cisco Adaptive Security Appliance Software < 9.1.7.23 - Double Free
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device. This vulnerability affects Cisco ASA Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, Firepower Threat Defense Software (FTD). Cisco Bug IDs: CSCvg35618.
CWE-415
Jan 29, 2018
CVE-2022-34265
9.8
CRITICAL
6 PoCs
Analysis
NUCLEI
EPSS 0.93
Django < 3.2.14 - SQL Injection
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
CWE-89
Jul 04, 2022
CVE-2025-64446
9.8
CRITICAL
KEV
RANSOMWARE
23 PoCs
Analysis
NUCLEI
EPSS 0.93
Fortinet FortiWeb unauthenticated RCE
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
CWE-23
Nov 14, 2025
CVE-2021-24155
7.2
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.93
Backup-guard Backup Guard < 1.6.0 - Unrestricted File Upload
The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.
CWE-434
Apr 05, 2021