High EPSS Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2024-0195
6.3
MEDIUM
5 PoCs
Analysis
NUCLEI
EPSS 0.92
Ssssssss Spider-flow - Code Injection
A vulnerability, which was classified as critical, was found in spider-flow 0.4.3. Affected is the function FunctionService.saveFunction of the file src/main/java/org/spiderflow/controller/FunctionController.java. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249510 is the identifier assigned to this vulnerability.
CWE-94
Jan 02, 2024
CVE-2019-18371
7.5
HIGH
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Millet Router 3G Firmware < 2.28.23 - Path Traversal
An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. There is a directory traversal vulnerability to read arbitrary files via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.
CWE-22
Oct 23, 2019
CVE-2005-0116
EXPLOITED
5 PoCs
Analysis
EPSS 0.92
Awstats < 6.3 - Improper Input Validation
AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
CWE-20
Jan 18, 2005
CVE-2020-17506
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Artica Web Proxy 4.30.00000000 - SQL Injection
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
CWE-89
Aug 12, 2020
CVE-2017-11317
9.8
CRITICAL
KEV
8 PoCs
Analysis
EPSS 0.92
Telerik UI For Asp.net Ajax < 2016.3.1027 - Weak Encryption
Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
CWE-326
Aug 23, 2017
CVE-2023-35843
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Nocodb < 0.106.1 - Path Traversal
NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information.
CWE-22
Jun 19, 2023
CVE-2013-2248
1 PoC
Analysis
NUCLEI
EPSS 0.92
Apache Struts < 2.3.15.1 - Improper Input Validation
Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix.
CWE-20
Jul 20, 2013
CVE-2018-19207
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.92
Van Ons WP GDPR Compliance <1.4.3 - RCE
The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $wpdb->prepare() input is mishandled, as exploited in the wild in November 2018.
CWE-425
Nov 12, 2018
CVE-2013-0333
4 PoCs
Analysis
EPSS 0.92
Rails < 2.3.16 - SQL Injection
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
Jan 30, 2013
CVE-2023-4169
6.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.92
Ruijie Rg-ew1200g Firmware - Improper Access Control
A vulnerability was found in Ruijie RG-EW1200G 1.0(1)B1P5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/sys/set_passwd of the component Administrator Password Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-284
Aug 05, 2023
CVE-2024-2961
7.3
HIGH
EXPLOITED
16 PoCs
Analysis
NUCLEI
EPSS 0.92
GNU C Library <2.39 - Buffer Overflow
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
CWE-787
Apr 17, 2024
CVE-2016-8869
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
EPSS 0.92
Joomla! <3.6.4 - Privilege Escalation
The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4 allows remote attackers to gain privileges by leveraging incorrect use of unfiltered data when registering on a site.
CWE-20
Nov 04, 2016
CVE-2021-41653
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Tp-link Tl-wr840n Firmware - Code Injection
The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
CWE-94
Nov 13, 2021
CVE-2017-7529
7.5
HIGH
16 PoCs
Analysis
EPSS 0.92
Nginx <1.14 - Info Disclosure
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
CWE-190
Jul 13, 2017
CVE-2013-0156
EXPLOITED
13 PoCs
Analysis
EPSS 0.92
Ruby on Rails JSON Processor YAML Deserialization Code Execution
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
CWE-20
Jan 13, 2013
CVE-2024-50498
10.0
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.92
Lubus WP Query Console < 1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Ajit Bohra WP Query Console wp-query-console allows Code Injection.This issue affects WP Query Console: from n/a through <= 1.0.
CWE-94
Oct 28, 2024
CVE-2019-19509
8.8
HIGH
EXPLOITED
3 PoCs
Analysis
EPSS 0.92
rConfig <3.9.3 - Command Injection
An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to command execution.
CWE-78
Jan 06, 2020
CVE-2023-21554
9.8
CRITICAL
6 PoCs
Analysis
EPSS 0.92
CVE-2023-21554 - QueueJumper - MSMQ RCE Check
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CWE-20
Apr 11, 2023
CVE-2024-0352
7.3
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.92
Likeshop < 2.5.7.20210311 - Unrestricted File Upload
A vulnerability classified as critical was found in Likeshop up to 2.5.7.20210311. This vulnerability affects the function FileServer::userFormImage of the file server/application/api/controller/File.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250120.
CWE-434
Jan 09, 2024
CVE-2022-21907
9.8
CRITICAL
EXPLOITED
19 PoCs
Analysis
EPSS 0.92
HTTP Protocol Stack - RCE
HTTP Protocol Stack Remote Code Execution Vulnerability
Jan 11, 2022