High EPSS Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2018-1000533
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.92
klaussilveira GitList <=0.6 - RCE
klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request using search form. This vulnerability appears to have been fixed in 0.7 after commit 87b8c26b023c3fc37f0796b14bb13710f397b322.
CWE-20
Jun 26, 2018
CVE-2015-3113
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.92
Adobe Flash Player Nellymoser Audio Decoding Buffer Overflow
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015.
CWE-122
Jun 23, 2015
CVE-2017-0147
7.5
HIGH
KEV
RANSOMWARE
8 PoCs
Analysis
EPSS 0.92
Microsoft Windows 10 1507 < 4.0e - Information Disclosure
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability."
Mar 17, 2017
CVE-2023-41265
9.6
CRITICAL
KEV
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.92
Qlik Sense - HTTP Request Smuggling
An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
CWE-444
Aug 29, 2023
CVE-2015-2080
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.92
Fedora < 9.2.9.v20150224 - Information Disclosure
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
CWE-200
Oct 07, 2016
CVE-2013-7091
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Zimbra 7.2.2-8.0.2 - Path Traversal
Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. NOTE: this can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.
CWE-22
Dec 13, 2013
CVE-2023-34843
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.92
Traggo - Path Traversal
Traggo Server 0.3.0 is vulnerable to directory traversal via a crafted GET request.
CWE-22
Jun 29, 2023
CVE-2022-0540
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Atlassian Jira <8.13.18, <8.14.0-8.20.5, <8.21.0-8.22.0 - Auth Bypass
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
CWE-287
Apr 20, 2022
CVE-2021-40346
7.5
HIGH
6 PoCs
Analysis
EPSS 0.92
HAProxy <2.6 - HTTP Request Smuggling
An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
CWE-190
Sep 08, 2021
CVE-2013-0640
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.92
Adobe Reader/Acrobat <9.5.4-10.1.6-11.0.02 - RCE
Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.
CWE-787
Feb 14, 2013
CVE-2021-32305
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Websvn < 2.6.1 - OS Command Injection
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
CWE-78
May 18, 2021
CVE-2015-2794
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Dotnetnuke < 07.04.00 - Access Control
The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.
CWE-264
Feb 06, 2017
CVE-2018-16858
7.8
HIGH
6 PoCs
Analysis
EPSS 0.92
LibreOffice Macro Python Code Execution
It was found that libreoffice before versions 6.0.7 and 6.1.3 was vulnerable to a directory traversal attack which could be used to execute arbitrary macros bundled with a document. An attacker could craft a document, which when opened by LibreOffice, would execute a Python method from a script in any arbitrary file system location, specified relative to the LibreOffice install location.
CWE-22
Mar 25, 2019
CVE-2009-1122
1 PoC
Analysis
EPSS 0.92
Microsoft Internet Information Services - Authentication Bypass
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Windows 2000 SP4 does not properly decode URLs, which allows remote attackers to bypass authentication, and possibly read or create files, via a crafted HTTP request, aka "IIS 5.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1535.
CWE-287
Jun 10, 2009
CVE-2023-35844
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Lightdash < 0.510.3 - Path Traversal
packages/backend/src/routers in Lightdash before 0.510.3 has insecure file endpoints, e.g., they allow .. directory traversal and do not ensure that an intended file extension (.csv or .png) is used.
CWE-22
Jun 19, 2023
CVE-2021-22911
9.8
CRITICAL
EXPLOITED
16 PoCs
Analysis
NUCLEI
EPSS 0.92
Rocket.Chat <3.14 - SQL Injection
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
CWE-75
May 27, 2021
CVE-2013-1599
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.92
Dlink Dcs-3411 Firmware - OS Command Injection
A Command Injection vulnerability exists in the /var/www/cgi-bin/rtpd.cgi script in D-Link IP Cameras DCS-3411/3430 firmware 1.02, DCS-5605/5635 1.01, DCS-1100L/1130L 1.04, DCS-1100/1130 1.03, DCS-1100/1130 1.04_US, DCS-2102/2121 1.05_RU, DCS-3410 1.02, DCS-5230 1.02, DCS-5230L 1.02, DCS-6410 1.00, DCS-7410 1.00, DCS-7510 1.00, and WCS-1100 1.02, which could let a remote malicious user execute arbitrary commands through the camera’s web interface.
CWE-78
Jan 28, 2020
CVE-2015-1427
9.8
CRITICAL
KEV
RANSOMWARE
9 PoCs
Analysis
NUCLEI
EPSS 0.92
Elasticsearch <1.3.8, <1.4.3 - Command Injection
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
Feb 17, 2015
CVE-2023-4542
6.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.92
D-Link DAR-8000-10 <20230809 - Code Injection
A vulnerability was found in D-Link DAR-8000-10 up to 20230809. It has been classified as critical. This affects an unknown part of the file /app/sys1.php. The manipulation of the argument cmd with the input id leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238047. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-78
Aug 25, 2023
CVE-2018-1000006
8.8
HIGH
4 PoCs
Analysis
EPSS 0.92
Atom Electron < 1.7.10 - OS Command Injection
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
CWE-78
Jan 24, 2018