High EPSS Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
3,485 results Clear all
CVE-2020-14645 9.8 CRITICAL 6 PoCs Analysis EPSS 0.92
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jul 15, 2020
CVE-2019-7276 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Optergy Proton/Enterprise - RCE
Optergy Proton/Enterprise devices allow Remote Root Code Execution via a Backdoor Console.
Jul 01, 2019
CVE-2024-46986 9.9 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
Tuzitio Camaleon Cms < 2.8.2 - Path Traversal
Camaleon CMS is a dynamic and advanced content management system based on Ruby on Rails. An arbitrary file write vulnerability accessible via the upload method of the MediaController allows authenticated users to write arbitrary files to any location on the web server Camaleon CMS is running on (depending on the permissions of the underlying filesystem). E.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. This issue has been addressed in release version 2.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-22 Sep 18, 2024
CVE-2020-12124 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Wavlink Wn530h4 Firmware - OS Command Injection
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
CWE-78 Oct 02, 2020
CVE-2014-3206 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Seagate Blackarmor Nas 220 Firmware - Improper Input Validation
Seagate BlackArmor NAS allows remote attackers to execute arbitrary code via the session parameter to localhost/backupmgt/localJob.php or the auth_name parameter to localhost/backupmgmt/pre_connect_check.php.
CWE-20 Feb 23, 2018
CVE-2020-4428 9.1 CRITICAL KEV 1 PoC Analysis EPSS 0.92
IBM Data Risk Manager < 2.0.4 - OS Command Injection
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to execute arbitrary commands on the system. IBM X-Force ID: 180533.
CWE-78 May 07, 2020
CVE-2020-10770 5.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Keycloak <13.0.0 - SSRF
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
CWE-918 Dec 15, 2020
CVE-2023-39361 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.92
Cacti - SQL Injection
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-89 Sep 05, 2023
CVE-2024-7120 6.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Raisecom Msg2300 Firmware - OS Command Injection
A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
CWE-78 Jul 26, 2024
CVE-2021-4191 5.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
GitLab GraphQL API User Enumeration
An issue has been discovered in GitLab CE/EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration to unauthenticated users through the GraphQL API.
Mar 28, 2022
CVE-2024-27564 5.8 MEDIUM EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.92
ChatGPT个人专用版 - Server Side Request Forgery
pictureproxy.php in the dirk1983 mm1.ltd source code f9f4bbc allows SSRF via the url parameter. NOTE: the references section has an archived copy of pictureproxy.php from its original GitHub location, but the repository name might later change because it is misleading.
CWE-918 Mar 05, 2024
CVE-2018-3810 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.92
Oturia Smart Google Code Inserter < 3.5 - Authentication Bypass
Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code.
CWE-287 Jan 01, 2018
CVE-2024-4883 9.8 CRITICAL 1 PoC Analysis EPSS 0.92
Progress Whatsup Gold < 23.1.3 - Command Injection
In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe.
CWE-78 Jun 25, 2024
CVE-2022-26318 9.8 CRITICAL KEV 6 PoCs Analysis EPSS 0.92
WatchGuard XTM Firebox Unauthenticated Remote Command Execution
On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
Mar 04, 2022
CVE-2013-7389 EXPLOITED 3 PoCs Analysis EPSS 0.92
D-Link DIR-645 Router - XSS
Multiple cross-site scripting (XSS) vulnerabilities in D-Link DIR-645 Router (Rev. A1) with firmware before 1.04B11 allow remote attackers to inject arbitrary web script or HTML via the (1) deviceid parameter to parentalcontrols/bind.php, (2) RESULT parameter to info.php, or (3) receiver parameter to bsc_sms_send.php.
CWE-79 Jul 07, 2014
CVE-2018-11409 5.3 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Splunk < 7.0.1 - Information Disclosure
Splunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.
CWE-200 Jun 08, 2018
CVE-2024-48307 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Jeecg Boot - SQL Injection
JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.
CWE-89 Oct 31, 2024
CVE-2023-32560 9.8 CRITICAL 4 PoCs Analysis EPSS 0.92
Ivanti Avalanche < 6.4.1 - Out-of-Bounds Write
An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution. Thanks to a Researcher at Tenable for finding and reporting. Fixed in version 6.4.1.
CWE-20 Aug 10, 2023
CVE-2008-0226 5 PoCs Analysis EPSS 0.92
Oracle Mysql < 1.7.5 - Memory Corruption
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
CWE-119 Jan 10, 2008
CVE-2018-17463 8.8 HIGH KEV 4 PoCs Analysis EPSS 0.92
Google Chrome <70.0.3538.64 - RCE
Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Nov 14, 2018