High EPSS Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
3,483 results Clear all
CVE-2016-20016 9.8 CRITICAL EXPLOITED 4 PoCs Analysis EPSS 0.91
MVPower CCTV DVR - RCE
MVPower CCTV DVR models, including TV-7104HE 1.8.4 115215B9 and TV7108HE, contain a web shell that is accessible via a /shell URI. A remote unauthenticated attacker can execute arbitrary operating system commands as root. This vulnerability has also been referred to as the "JAWS webserver RCE" because of the easily identifying HTTP response server field. Other firmware versions, at least from 2014 through 2019, can be affected. This was exploited in the wild in 2017 through 2022.
CWE-78 Oct 19, 2022
CVE-2018-7251 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.91
Anchor < 0.12.7 - Information Disclosure
An issue was discovered in config/error.php in Anchor 0.12.3. The error log is exposed at an errors.log URI, and contains MySQL credentials if a MySQL error (such as "Too many connections") has occurred.
CWE-200 Feb 19, 2018
CVE-2010-3964 2 PoCs Analysis EPSS 0.91
Microsoft Sharepoint Server - Unrestricted File Upload
Unrestricted file upload vulnerability in the Document Conversions Launcher Service in Microsoft Office SharePoint Server 2007 SP2, when the Document Conversions Load Balancer Service is enabled, allows remote attackers to execute arbitrary code via a crafted SOAP request to TCP port 8082, aka "Malformed Request Code Execution Vulnerability."
Dec 16, 2010
CVE-2006-2237 EXPLOITED 4 PoCs Analysis EPSS 0.91
AWStats <6.5 - RCE
The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.
May 08, 2006
CVE-2020-7246 8.8 HIGH 8 PoCs Analysis EPSS 0.91
Qdpm < 9.1 - Path Traversal
A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
CWE-22 Jan 21, 2020
CVE-2017-0037 8.1 HIGH KEV 4 PoCs Analysis EPSS 0.91
Microsoft Edge - Type Confusion
Microsoft Internet Explorer 10 and 11 and Microsoft Edge have a type confusion issue in the Layout::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement function in mshtml.dll, which allows remote attackers to execute arbitrary code via vectors involving a crafted Cascading Style Sheets (CSS) token sequence and crafted JavaScript code that operates on a TH element.
CWE-843 Feb 26, 2017
CVE-2011-0049 1 PoC Analysis NUCLEI EPSS 0.91
Majordomo <20110131 - Path Traversal
Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.
CWE-22 Feb 04, 2011
CVE-2008-5499 2 PoCs Analysis EPSS 0.91
Adobe Flash Player ActionScript Launch Command Execution Vulnerability
Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
CWE-94 Dec 18, 2008
CVE-2019-7254 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.91
Linear eMerge E3-Series - Path Traversal
Linear eMerge E3-Series devices allow File Inclusion.
CWE-22 Jul 02, 2019
CVE-2003-0352 EXPLOITED 4 PoCs Analysis EPSS 0.91
Microsoft Windows - Buffer Overflow
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
Aug 18, 2003
CVE-2018-8617 7.5 HIGH 3 PoCs Analysis EPSS 0.91
Microsoft Edge - Memory Corruption
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8618, CVE-2018-8624, CVE-2018-8629.
CWE-787 Dec 12, 2018
CVE-2020-9480 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Apache Spark < 2.4.5 - Missing Authentication
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
CWE-306 Jun 23, 2020
CVE-2021-36934 7.8 HIGH KEV 29 PoCs Analysis EPSS 0.91
Windows - Privilege Escalation
<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p> <p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. <strong>Simply installing this security update will not fully mitigate this vulnerability.</strong> See <a href="https://support.microsoft.com/topic/1ceaa637-aaa3-4b58-a48b-baf72a2fa9e7">KB5005357- Delete Volume Shadow Copies</a>.</p>
Jul 22, 2021
CVE-2011-3192 EXPLOITED 7 PoCs Analysis EPSS 0.91
Apache HTTP Server < 2.0.65 - Denial of Service
The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
CWE-400 Aug 29, 2011
CVE-2022-21661 8.0 HIGH EXPLOITED 15 PoCs Analysis NUCLEI EPSS 0.91
Wordpress < 3.7.37 - SQL Injection
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
CWE-89 Jan 06, 2022
CVE-2009-3953 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.91
Adobe Reader/Acrobat <9.3 - RCE
The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.
CWE-787 Jan 13, 2010
CVE-2017-6361 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.91
Qnap Qts < 4.2.4 - OS Command Injection
QNAP QTS before 4.2.4 Build 20170313 allows attackers to execute arbitrary commands via unspecified vectors.
CWE-78 Mar 23, 2017
CVE-2021-29447 7.1 HIGH 24 PoCs Analysis EPSS 0.91
Wordpress < 5.7.1 - XXE
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.
CWE-611 Apr 15, 2021
CVE-2021-46381 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
D-Link DAP-1620 - Path Traversal
Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].
CWE-22 Mar 04, 2022
CVE-2023-27034 9.8 CRITICAL EXPLOITED 1 PoC NUCLEI EPSS 0.90
PrestaShop jmsblog 2.5.5 - SQL Injection
PrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability.
CWE-89 Mar 23, 2023