High EPSS Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2014-0515
EXPLOITED
RANSOMWARE
2 PoCs
Analysis
EPSS 0.93
Adobe Flash Player Shader Buffer Overflow
Buffer overflow in Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in April 2014.
CWE-119
Apr 29, 2014
CVE-2023-40477
7.8
HIGH
2 PoCs
Analysis
EPSS 0.93
Rarlab Winrar < 6.23 - Improper Array Index Validation
RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.
CWE-129
May 03, 2024
CVE-2018-11686
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Flowpaper Flexpaper < 2.3.6 - Improper Input Validation
The Publish Service in FlexPaper (later renamed FlowPaper) 2.3.6 allows remote code execution via setup.php and change_config.php.
CWE-20
Jul 03, 2019
CVE-2023-50917
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.93
Mjdm Majordomo < 2023-11-15 - Command Injection
MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.
CWE-77
Dec 15, 2023
CVE-2020-8617
7.5
HIGH
4 PoCs
Analysis
EPSS 0.93
BIND - DoS
Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.
CWE-617
May 19, 2020
CVE-2024-11320
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Pandora FMS authenticated command injection leading to RCE via LDAP using default DB password
Arbitrary commands execution on the server by exploiting a command injection vulnerability in the LDAP authentication mechanism. This issue affects Pandora FMS: from 700 through <=777.4
CWE-77
Nov 21, 2024
CVE-2024-9989
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.93
WordPress Crypto <2.15 - Auth Bypass
The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.18. This is due to a limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
CWE-288
Oct 29, 2024
CVE-2021-21220
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.93
Google Chrome <89.0.4389.128 - Heap Corruption
Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-787
Apr 26, 2021
CVE-2011-4862
EXPLOITED
10 PoCs
Analysis
EPSS 0.93
GNU Inetutils < 1.9 - Buffer Overflow
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
CWE-120
Dec 25, 2011
CVE-2023-5074
9.8
CRITICAL
EXPLOITED
1 PoC
NUCLEI
EPSS 0.93
D-Link D-View 8 <v2.0.1.28 - Auth Bypass
Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28
CWE-798
Sep 20, 2023
CVE-2018-18778
6.5
MEDIUM
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Acme Mini-httpd < 1.30 - Information Disclosure
ACME mini_httpd before 1.30 lets remote users read arbitrary files.
CWE-200
Oct 29, 2018
CVE-2020-14179
5.3
MEDIUM
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Atlassian Jira Data Center < 8.5.8 - Information Disclosure
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1.
Sep 21, 2020
CVE-2012-0394
3 PoCs
Analysis
NUCLEI
EPSS 0.93
Apache Struts <2.3.1.1 - RCE
The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself.
CWE-94
Jan 08, 2012
CVE-2024-38819
7.5
HIGH
6 PoCs
Analysis
NUCLEI
EPSS 0.93
Org.springframework Spring-webflux < 6.1.14 - Path Traversal
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
CWE-22
Dec 19, 2024
CVE-2022-26809
9.8
CRITICAL
EXPLOITED
RANSOMWARE
10 PoCs
Analysis
EPSS 0.93
Microsoft Windows RPC Runtime - Remote Code Execution
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Apr 15, 2022
CVE-2019-9053
8.1
HIGH
42 PoCs
Analysis
EPSS 0.93
Cmsmadesimple Cms Made Simple - SQL Injection
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
CWE-89
Mar 26, 2019
CVE-2011-3544
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.93
Java Applet Rhino Script Engine Remote Code Execution
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
CWE-284
Oct 19, 2011
CVE-2022-37434
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.93
Zlib < 1.2.12 - Out-of-Bounds Write
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
CWE-120
Aug 05, 2022
CVE-2015-0313
9.8
CRITICAL
KEV
4 PoCs
Analysis
EPSS 0.93
Adobe Flash Player < 11.2.202.442 - Use After Free
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.
CWE-416
Feb 02, 2015
CVE-2010-1870
3 PoCs
Analysis
NUCLEI
EPSS 0.93
Struts 2.0.0-2.1.8.1 - RCE
The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.
Aug 17, 2010