High EPSS Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
3,485 results Clear all
CVE-2011-0609 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.92
Adobe Flash Player AVM Bytecode Verification Vulnerability
Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.
Mar 15, 2011
CVE-2010-0840 9.8 CRITICAL KEV RANSOMWARE 2 PoCs Analysis EPSS 0.92
Oracle Java SE/Jav for Bus <6-5.0-1.4.2 - Info Disclosure
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."
Apr 01, 2010
CVE-2024-44849 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Qualitor <8.24 - RCE
Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php.
CWE-434 Sep 09, 2024
CVE-2024-28000 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.92
WordPress LiteSpeed Cache - Unauthenticated Privilege Escalation to Admin
Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache.This issue affects LiteSpeed Cache: from n/a through <= 6.3.0.1.
CWE-266 Aug 21, 2024
CVE-2023-4634 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Media Library Assistant <3.09 - RCE
The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.
CWE-73 Sep 06, 2023
CVE-2021-21307 8.6 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Lucee Server <5.3.7.47-5.3.6.68-5.3.5.96 - RCE
Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator.
CWE-862 Feb 11, 2021
CVE-2024-3673 9.1 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.92
Web Directory Free <1.7.3 - Code Injection
The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.
Aug 30, 2024
CVE-2022-47075 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Smart Office Web <20.28 - Info Disclosure
An issue was discovered in Smart Office Web 20.28 and earlier allows attackers to download sensitive information via the action name parameter to ExportEmployeeDetails.aspx, and to ExportReportingManager.aspx.
Feb 28, 2023
CVE-2015-5531 EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.92
Elasticsearch <1.6.1 - Path Traversal
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
CWE-22 Aug 17, 2015
CVE-2015-2342 3 PoCs Analysis EPSS 0.92
VMware vCenter Server <6.0 - RCE
The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.
Oct 12, 2015
CVE-2022-21445 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.92
Oracle Application Development Framework - Insecure Deserialization
Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Development Framework (ADF). Successful attacks of this vulnerability can result in takeover of Oracle Application Development Framework (ADF). Note: Oracle Application Development Framework (ADF) is downloaded via Oracle JDeveloper Product. Please refer to Fusion Middleware Patch Advisor for more details. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-502 Apr 19, 2022
CVE-2021-41649 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Online-shopping-system-advanced - SQL Injection
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
CWE-89 Oct 01, 2021
CVE-2014-2321 EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
ZTE F460/F660 - RCE
web_shell_cmd.gch on ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests, as demonstrated by using "set TelnetCfg" commands to enable a TELNET service with specified credentials.
CWE-264 Mar 11, 2014
CVE-2009-0658 7.8 HIGH EXPLOITED 6 PoCs Analysis EPSS 0.92
Adobe Reader <9.0 - Buffer Overflow
Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.
CWE-119 Feb 20, 2009
CVE-2024-41107 8.1 HIGH 1 PoC Analysis NUCLEI EPSS 0.92
Apache Cloudstack < 4.18.2.2 - Authentication Bypass by Spoofing
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account. Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.
CWE-290 Jul 19, 2024
CVE-2020-17144 8.4 HIGH KEV 5 PoCs Analysis EPSS 0.92
Microsoft Exchange - RCE
Microsoft Exchange Remote Code Execution Vulnerability
CWE-502 Dec 10, 2020
CVE-2020-36289 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.92
Atlassian Data Center < 8.5.13 - Incorrect Authorization
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and from version 8.14.0 before 8.15.1.
CWE-863 May 12, 2021
CVE-2020-8654 8.8 HIGH 3 PoCs Analysis NUCLEI EPSS 0.92
EyesOfNetwork <5.3 - Command Injection
An issue was discovered in EyesOfNetwork 5.3. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the /module/module_frame/index.php autodiscovery.php target field.
CWE-78 Feb 07, 2020
CVE-1999-0517 1 PoC Analysis EPSS 0.92
SNMP - Info Disclosure
An SNMP community name is the default (e.g. public), null, or missing.
Jan 01, 1997
CVE-2019-1458 7.8 HIGH KEV RANSOMWARE 6 PoCs Analysis EPSS 0.92
Windows Win32k - Privilege Escalation
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
Dec 10, 2019