High EPSS Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2021-38314
5.3
MEDIUM
7 PoCs
Analysis
NUCLEI
EPSS 0.92
Gutenberg Template Library & Redux Framework < 4.2.11 - Information Disclosure
The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
CWE-200
Sep 02, 2021
CVE-2015-7297
5 PoCs
Analysis
NUCLEI
EPSS 0.92
Joomla! - SQL Injection
SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7858.
CWE-89
Oct 29, 2015
CVE-2012-1535
7.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.92
Adobe Flash Player < 11.3.300.271 - Code Injection
Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted SWF content, as exploited in the wild in August 2012 with SWF content in a Word document.
CWE-20
Aug 15, 2012
CVE-2006-0003
EXPLOITED
3 PoCs
Analysis
EPSS 0.92
RDS.Dataspace ActiveX - RCE
Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.
Apr 12, 2006
CVE-2020-11981
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.92
Apache Airflow < 1.10.10 - OS Command Injection
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
CWE-78
Jul 17, 2020
CVE-2013-0431
5.3
MEDIUM
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.92
Oracle Java SE <7.12 - Auth Bypass
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.
CWE-693
Jan 31, 2013
CVE-2021-25003
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.92
WPCargo Track & Trace <6.9.0 - RCE
The WPCargo Track & Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE
CWE-434
Mar 14, 2022
CVE-2019-12989
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.92
Citrix Netscaler Sd-wan < 10.0.8 - SQL Injection
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow SQL Injection.
CWE-89
Jul 16, 2019
CVE-2014-8739
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.92
jQuery File Upload Plugin <6.4.4 - RCE
Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.
CWE-434
Feb 08, 2020
CVE-2012-0754
8.1
HIGH
KEV
2 PoCs
Analysis
EPSS 0.92
Adobe Flash Player <10.3.183.15, <11.1.102.62 - Memory Corruption
Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
CWE-787
Feb 16, 2012
CVE-2013-2134
EXPLOITED
1 PoC
Analysis
EPSS 0.92
Apache Struts < 2.3.14.3 - Code Injection
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135.
CWE-94
Jul 16, 2013
CVE-2010-0738
5.3
MEDIUM
KEV
RANSOMWARE
12 PoCs
Analysis
EPSS 0.92
JBoss JMX Console Deployer Upload and Execute
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
CWE-749
Apr 28, 2010
CVE-2023-22463
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
NUCLEI
EPSS 0.92
Fit2cloud Kubepi < 1.6.3 - Hard-coded Credentials
KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code. The vulnerability has been fixed in 1.6.3. In the patch, JWT key is specified in app.yml. If the user leaves it blank, a random key will be used. There are no workarounds aside from upgrading.
CWE-798
Jan 04, 2023
CVE-2018-0824
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.92
Microsoft Windows 10 1507 - Insecure Deserialization
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CWE-502
May 09, 2018
CVE-2016-8870
8.1
HIGH
EXPLOITED
4 PoCs
Analysis
EPSS 0.92
Joomla! <3.6.4 - RCE
The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4, when registration has been disabled, allows remote attackers to create user accounts by leveraging failure to check the Allow User Registration configuration setting.
CWE-20
Nov 04, 2016
CVE-2019-12314
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Deltek Maconomy 2.2.5 - Path Traversal
Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI.
CWE-22
May 24, 2019
CVE-2018-8581
7.4
HIGH
KEV
RANSOMWARE
6 PoCs
Analysis
EPSS 0.91
Microsoft Exchange Server - Privilege Escalation
An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." This affects Microsoft Exchange Server.
Nov 14, 2018
CVE-2011-2110
EXPLOITED
2 PoCs
Analysis
EPSS 0.91
Adobe Flash Player <10.3.181.26-10.3.185.23 - RCE
Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in June 2011.
CWE-119
Jun 16, 2011
CVE-2024-46506
10.0
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
Unauthenticated RCE in NetAlertX
NetAlertX 23.01.14 through 24.x before 24.10.12 allows unauthenticated command injection via settings update because function=savesettings lacks an authentication requirement, as exploited in the wild in May 2025. This is related to settings.php and util.php.
CWE-306
May 13, 2025
CVE-2018-14912
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
CGit <1.2.1 - Path Traversal
cgit_clone_objects in CGit before 1.2.1 has a directory traversal vulnerability when `enable-http-clone=1` is not turned off, as demonstrated by a cgit/cgit.cgi/git/objects/?path=../ request.
CWE-22
Aug 03, 2018