High EPSS Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,485 results
Clear all
CVE-2023-2640
7.8
HIGH
EXPLOITED
14 PoCs
Analysis
NUCLEI
EPSS 0.91
GameOver(lay) Privilege Escalation and Container Escape
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
CWE-863
Jul 26, 2023
CVE-2020-10221
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.91
Rconfig < 3.9.4 - OS Command Injection
lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.
CWE-78
Mar 08, 2020
CVE-2006-3918
1 PoC
Analysis
EPSS 0.91
Apache HTTP Server < 1.3.35 - XSS
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
CWE-79
Jul 28, 2006
CVE-2021-25094
8.1
HIGH
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.91
Tatsu Wordpress Plugin RCE
The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used without prior authentication to upload a rogue zip file which is uncompressed under the WordPress's upload directory. By adding a PHP shell with a filename starting with a dot ".", this can bypass extension control implemented in the plugin. Moreover, there is a race condition in the zip extraction process which makes the shell file live long enough on the filesystem to be callable by an attacker.
CWE-306
Apr 25, 2022
CVE-2023-24488
6.1
MEDIUM
EXPLOITED
8 PoCs
Analysis
NUCLEI
EPSS 0.91
Citrix ADC/Gateway - XSS
Cross site scripting vulnerability in Citrix ADC and Citrix Gateway in allows and attacker to perform cross site scripting
CWE-79
Jul 10, 2023
CVE-2024-42327
9.9
CRITICAL
11 PoCs
Analysis
EPSS 0.91
Zabbix < 6.0.32 - SQL Injection
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
CWE-89
Nov 27, 2024
CVE-2021-32789
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
WooCommerce Gutenberg Blocks <2.5.16 - SQL Injection
woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.
CWE-89
Jul 26, 2021
CVE-2020-24881
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.91
Osticket < 1.14.3 - SSRF
SSRF exists in osTicket before 1.14.3, where an attacker can add malicious file to server or perform port scanning.
CWE-918
Nov 02, 2020
CVE-2023-20073
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Cisco RV340-345 - File Upload
A vulnerability in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to insufficient authorization enforcement mechanisms in the context of file uploads. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to upload arbitrary files to the affected device.
CWE-434
Apr 05, 2023
CVE-2021-42071
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
Visual-tools Dvr Vx16 Firmware - OS Command Injection
In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin/slogin/login.py User-Agent HTTP header.
CWE-78
Oct 07, 2021
CVE-2023-6634
8.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
LearnPress <4.2.5.7 - Command Injection
The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
CWE-77
Jan 11, 2024
CVE-2025-4427
5.3
MEDIUM
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.91
Ivanti Endpoint Manager Mobile < 11.12.0.5 - Authentication Bypass
An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API.
CWE-288
May 13, 2025
CVE-2023-34124
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
SonicWall GMS <9.3.2-SP1 & Analytics <2.5.0.4-R7 - Auth Bypass
The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
CWE-305
Jul 13, 2023
CVE-2002-0661
1 PoC
Analysis
EPSS 0.91
Apache HTTP Server - Path Traversal
Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters.
Aug 12, 2002
CVE-2024-3408
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
D-Tale RCE
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the application fails to properly restrict custom filter queries, enabling attackers to execute arbitrary code on the server by bypassing the restriction on the `/update-settings` endpoint, even when `enable_custom_filters` is not enabled. This vulnerability allows attackers to bypass authentication mechanisms and execute remote code on the server.
CWE-94
Jun 06, 2024
CVE-2009-3129
7.8
HIGH
KEV
3 PoCs
Analysis
EPSS 0.91
Microsoft Excel - Out-of-Bounds Write
Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka "Excel Featheader Record Memory Corruption Vulnerability."
CWE-787
Nov 11, 2009
CVE-2021-24145
7.2
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.91
Webnus Modern Events Calendar Lite < 5.16.5 - Unrestricted File Upload
Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly check the imported file, allowing PHP ones to be uploaded by administrator by using the 'text/csv' content-type in the request.
CWE-434
Mar 18, 2021
CVE-2021-1472
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Cisco Rv160 Firmware < 1.0.01.03 - Authentication Bypass
Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-119
Apr 08, 2021
CVE-2006-5478
5 PoCs
Analysis
EPSS 0.91
Novell Edirectory - Memory Corruption
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
CWE-119
Oct 24, 2006
CVE-2024-2876
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.91
Wordpress Email Subscribers by Icegram Express - SQL Injection
The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'run' function of the 'IG_ES_Subscribers_Query' class in all versions up to, and including, 5.7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
May 02, 2024