High EPSS Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
3,485 results Clear all
CVE-2010-1885 EXPLOITED 3 PoCs Analysis EPSS 0.92
Microsoft Windows 2003 Server - OS Command Injection
The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka "Help Center URL Validation Vulnerability."
CWE-78 Jun 15, 2010
CVE-2023-48022 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Anyscale Ray - SSRF
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)
CWE-918 Nov 28, 2023
CVE-2018-8033 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.92
Apache OFBiz 16.11.01-16.11.04 - Info Disclosure
In Apache OFBiz 16.11.01 to 16.11.04, the OFBiz HTTP engine (org.apache.ofbiz.service.engine.HttpEngine.java) handles requests for HTTP services via the /webtools/control/httpService endpoint. Both POST and GET requests to the httpService endpoint may contain three parameters: serviceName, serviceMode, and serviceContext. The exploitation occurs by having DOCTYPEs pointing to external references that trigger a payload that returns secret information from the host.
CWE-200 Dec 13, 2018
CVE-2023-2825 10.0 CRITICAL 8 PoCs Analysis NUCLEI EPSS 0.92
GitLab Authenticated File Read
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
CWE-22 May 26, 2023
CVE-2022-23854 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.92
AVEVA InTouch Access Anywhere <2020 R2 - Path Traversal
AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.
CWE-22 Dec 23, 2022
CVE-2021-27651 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.92
Pega Infinity <8.5.2 - Auth Bypass
In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.
CWE-287 Apr 29, 2021
CVE-2021-46417 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Franklinfueling Colibri Firmware - Path Traversal
Insecure handling of a download function leads to disclosure of internal files due to path traversal with root privileges in Franklin Fueling Systems Colibri Controller Module 1.8.19.8580.
CWE-22 Apr 07, 2022
CVE-2023-20273 7.2 HIGH KEV 1 PoC Analysis EPSS 0.92
Cisco IOS XE - Command Injection
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
CWE-78 Oct 25, 2023
CVE-2017-17411 9.8 CRITICAL EXPLOITED 3 PoCs Analysis EPSS 0.92
Linksys WVBR0 - RCE
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.
CWE-78 Dec 21, 2017
CVE-2020-21224 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup NUCLEI EPSS 0.92
Inspur Clusterengine - Remote Code Execution
A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server
CWE-88 Feb 22, 2021
CVE-2013-5211 EXPLOITED 17 PoCs Analysis EPSS 0.92
NTP Monitor List Scanner
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
CWE-20 Jan 02, 2014
CVE-2010-2568 7.8 HIGH KEV 4 PoCs Analysis EPSS 0.92
Windows XP SP3-Vista SP2 - RCE
Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.
Jul 22, 2010
CVE-2024-8503 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
VICIdial Authenticated Remote Code Execution
An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial to enumerate database records. By default, VICIdial stores plaintext credentials within the database.
CWE-89 Sep 10, 2024
CVE-2024-22120 9.1 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.92
Zabbix Server - Command Injection
Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
CWE-20 May 17, 2024
CVE-2015-0016 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.92
Microsoft Windows 7 - Path Traversal
Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."
CWE-22 Jan 13, 2015
CVE-2016-20017 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.92
D-Link DSL-2750B <1.05 - Command Injection
D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.
CWE-77 Oct 19, 2022
CVE-2014-4114 7.8 HIGH KEV 8 PoCs Analysis EPSS 0.92
MS14-060 Microsoft Windows OLE Package Manager Code Execution
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
Oct 15, 2014
CVE-2023-30013 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
Totolink X5000r Firmware - OS Command Injection
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.
CWE-78 May 05, 2023
CVE-2018-17431 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.92
Comodo UTM Firewall <2.7.0 - RCE
Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.
CWE-287 Jan 30, 2019
CVE-2018-10956 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.92
Ipconfigure Orchid Core Vms - Path Traversal
IPConfigure Orchid Core VMS 2.0.5 allows Directory Traversal.
CWE-22 Jun 25, 2018