High EPSS Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2010-1885
EXPLOITED
3 PoCs
Analysis
EPSS 0.92
Microsoft Windows 2003 Server - OS Command Injection
The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka "Help Center URL Validation Vulnerability."
CWE-78
Jun 15, 2010
CVE-2023-48022
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Anyscale Ray - SSRF
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)
CWE-918
Nov 28, 2023
CVE-2018-8033
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.92
Apache OFBiz 16.11.01-16.11.04 - Info Disclosure
In Apache OFBiz 16.11.01 to 16.11.04, the OFBiz HTTP engine (org.apache.ofbiz.service.engine.HttpEngine.java) handles requests for HTTP services via the /webtools/control/httpService endpoint. Both POST and GET requests to the httpService endpoint may contain three parameters: serviceName, serviceMode, and serviceContext. The exploitation occurs by having DOCTYPEs pointing to external references that trigger a payload that returns secret information from the host.
CWE-200
Dec 13, 2018
CVE-2023-2825
10.0
CRITICAL
8 PoCs
Analysis
NUCLEI
EPSS 0.92
GitLab Authenticated File Read
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
CWE-22
May 26, 2023
CVE-2022-23854
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.92
AVEVA InTouch Access Anywhere <2020 R2 - Path Traversal
AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.
CWE-22
Dec 23, 2022
CVE-2021-27651
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Pega Infinity <8.5.2 - Auth Bypass
In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.
CWE-287
Apr 29, 2021
CVE-2021-46417
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Franklinfueling Colibri Firmware - Path Traversal
Insecure handling of a download function leads to disclosure of internal files due to path traversal with root privileges in Franklin Fueling Systems Colibri Controller Module 1.8.19.8580.
CWE-22
Apr 07, 2022
CVE-2023-20273
7.2
HIGH
KEV
1 PoC
Analysis
EPSS 0.92
Cisco IOS XE - Command Injection
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
CWE-78
Oct 25, 2023
CVE-2017-17411
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
EPSS 0.92
Linksys WVBR0 - RCE
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.
CWE-78
Dec 21, 2017
CVE-2020-21224
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
NUCLEI
EPSS 0.92
Inspur Clusterengine - Remote Code Execution
A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server
CWE-88
Feb 22, 2021
CVE-2013-5211
EXPLOITED
17 PoCs
Analysis
EPSS 0.92
NTP Monitor List Scanner
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
CWE-20
Jan 02, 2014
CVE-2010-2568
7.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.92
Windows XP SP3-Vista SP2 - RCE
Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.
Jul 22, 2010
CVE-2024-8503
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
VICIdial Authenticated Remote Code Execution
An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial to enumerate database records. By default, VICIdial stores plaintext credentials within the database.
CWE-89
Sep 10, 2024
CVE-2024-22120
9.1
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.92
Zabbix Server - Command Injection
Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
CWE-20
May 17, 2024
CVE-2015-0016
7.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.92
Microsoft Windows 7 - Path Traversal
Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."
CWE-22
Jan 13, 2015
CVE-2016-20017
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.92
D-Link DSL-2750B <1.05 - Command Injection
D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.
CWE-77
Oct 19, 2022
CVE-2014-4114
7.8
HIGH
KEV
8 PoCs
Analysis
EPSS 0.92
MS14-060 Microsoft Windows OLE Package Manager Code Execution
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
Oct 15, 2014
CVE-2023-30013
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.92
Totolink X5000r Firmware - OS Command Injection
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.
CWE-78
May 05, 2023
CVE-2018-17431
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.92
Comodo UTM Firewall <2.7.0 - RCE
Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.
CWE-287
Jan 30, 2019
CVE-2018-10956
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.92
Ipconfigure Orchid Core Vms - Path Traversal
IPConfigure Orchid Core VMS 2.0.5 allows Directory Traversal.
CWE-22
Jun 25, 2018