High EPSS Vulnerabilities with Public Exploits

Updated 49m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
3,483 results Clear all
CVE-2016-10956 7.5 HIGH 3 PoCs Analysis NUCLEI EPSS 0.91
Mail-masta - Improper Input Validation
The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php.
CWE-20 Sep 16, 2019
CVE-2021-42392 9.8 CRITICAL 2 PoCs Analysis EPSS 0.91
H2 < 2.0.204 - Insecure Deserialization
The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.
CWE-502 Jan 10, 2022
CVE-2024-5910 9.8 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.91
Palo Alto Expedition Remote Code Execution (CVE-2024-5910 and CVE-2024-9464)
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.
CWE-306 Jul 10, 2024
CVE-2024-27199 7.3 HIGH KEV RANSOMWARE 2 PoCs 1 Writeup Analysis NUCLEI EPSS 0.91
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
CWE-22 Mar 04, 2024
CVE-2021-44521 9.1 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.91
Apache Cassandra < 3.0.26 - Code Injection
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
CWE-94 Feb 11, 2022
CVE-2019-11248 8.2 HIGH EXPLOITED 3 PoCs NUCLEI EPSS 0.91
Kubernetes < 1.12.10 - Missing Authorization
The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.
CWE-862 Aug 29, 2019
CVE-2018-0886 7.0 HIGH 4 PoCs Analysis EPSS 0.91
Microsoft Windows 10 - Authentication Bypass
The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability".
CWE-287 Mar 14, 2018
CVE-2024-8752 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
WebIQ <2.15.9 - Path Traversal
The Windows version of WebIQ 2.15.9 is affected by a directory traversal vulnerability that allows remote attackers to read any file on the system.
CWE-22 Sep 16, 2024
CVE-2023-22621 7.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Strapi < 4.5.6 - Injection
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
CWE-74 Apr 19, 2023
CVE-2014-5445 2 PoCs Analysis EPSS 0.91
Zohocorp Manageengine It360 < 10.2 - Path Traversal
Multiple absolute path traversal vulnerabilities in ZOHO ManageEngine Netflow Analyzer 8.6 through 10.2 and IT360 10.3 allow remote attackers or remote authenticated users to read arbitrary files via a full pathname in the schFilePath parameter to the (1) CSVServlet or (2) CReportPDFServlet servlet.
CWE-22 Dec 04, 2014
CVE-2007-0882 4 PoCs Analysis EPSS 0.91
Solaris 10-11 - Command Injection
Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote attackers to log into certain accounts, as demonstrated by the bin account.
CWE-88 Feb 12, 2007
CVE-2024-48360 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.91
Qualitor - SSRF
Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php.
CWE-918 Oct 31, 2024
CVE-2018-6605 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
ZH Baidumap - SQL Injection
SQL Injection exists in the Zh BaiduMap 3.0.0.1 component for Joomla! via the id parameter in a getPlacemarkDetails, getPlacemarkHoverText, getPathHoverText, or getPathDetails request.
CWE-89 Feb 05, 2018
CVE-2019-0539 7.5 HIGH 4 PoCs Analysis EPSS 0.91
Microsoft Chakracore < 1.11.5 - Out-of-Bounds Write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0567, CVE-2019-0568.
CWE-787 Jan 08, 2019
CVE-2021-39327 5.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.91
Wordpress BulletProof Security Backup Disclosure
The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.
CWE-200 Sep 17, 2021
CVE-2023-2523 7.3 HIGH 2 PoCs Analysis EPSS 0.91
E-office - Unrestricted File Upload
A vulnerability was found in Weaver E-Office 9.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file App/Ajax/ajax.php?action=mobile_upload_save. The manipulation of the argument upload_quwan leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228014 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-434 May 04, 2023
CVE-2013-4547 3 PoCs Analysis EPSS 0.91
nginx <1.5.7 - Auth Bypass
nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.
CWE-116 Nov 23, 2013
CVE-2019-0211 7.8 HIGH KEV RANSOMWARE 4 PoCs Analysis EPSS 0.91
Apache HTTP Server < 2.4.38 - Use After Free
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
CWE-416 Apr 08, 2019
CVE-2017-11826 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.91
Microsoft Office <2016 - RCE
Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory.
CWE-119 Oct 13, 2017
CVE-2020-3992 9.8 CRITICAL KEV RANSOMWARE 3 PoCs Analysis EPSS 0.91
Vmware Cloud Foundation < 3.10.1.2 - Use After Free
OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.
CWE-416 Oct 20, 2020