High EPSS Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
3,483 results
Clear all
CVE-2021-21978
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.90
Vmware View Planner < 4.6 - Missing Authorization
VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
CWE-862
Mar 03, 2021
CVE-2019-1937
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.90
Cisco UCS Director Unauthenticated Remote Code Execution
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.
CWE-287
Aug 21, 2019
CVE-2025-24367
8.8
HIGH
7 PoCs
Analysis
EPSS 0.90
Cacti Graph Template authenticated RCE versions prior to 1.2.29
Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29.
CWE-144
Jan 27, 2025
CVE-2021-21402
7.7
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.90
Jellyfin < 10.7.1 - Path Traversal
Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, with certain endpoints, well crafted requests will allow arbitrary file read from a Jellyfin server's file system. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. As a workaround, users may be able to restrict some access by enforcing strict security permissions on their filesystem, however, it is recommended to update as soon as possible.
CWE-22
Mar 23, 2021
CVE-2011-3587
EXPLOITED
2 PoCs
Analysis
EPSS 0.90
Zope <2.13.x - RCE
Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules.
Oct 10, 2011
CVE-2004-0493
2 PoCs
Analysis
EPSS 0.90
Apache httpd 2.0.49 - DoS/Buffer Overflow
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.
Aug 06, 2004
CVE-2021-43778
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
GLPI <2.6.1 - Path Traversal
Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. This issue was patched in version 2.6.1. As a workaround, delete the `front/send.php` file.
CWE-22
Nov 24, 2021
CVE-2023-33440
7.2
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.90
Sourcecodester Faculty Evaluation System v1.0 - RCE
Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php?action=save_user.
CWE-94
May 26, 2023
CVE-2023-49785
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Nextchat < 2.11.2 - SSRF
NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.
CWE-918
Mar 12, 2024
CVE-2016-0099
7.8
HIGH
KEV
RANSOMWARE
7 PoCs
Analysis
EPSS 0.90
MS16-032 Secondary Logon Handle Privilege Escalation
The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
CWE-120
Mar 09, 2016
CVE-2009-3960
6.5
MEDIUM
KEV
RANSOMWARE
3 PoCs
Analysis
EPSS 0.90
BlazeDS <3.2 - Info Disclosure
Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, allows remote attackers to obtain sensitive information via vectors that are associated with a request, and related to injected tags and external entity references in XML documents.
Feb 15, 2010
CVE-2025-49113
9.9
CRITICAL
KEV
30 PoCs
Analysis
NUCLEI
EPSS 0.90
Roundcube Webmail < 1.5.10 - Insecure Deserialization
Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
CWE-502
Jun 02, 2025
CVE-2018-7422
7.5
HIGH
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.90
Siteeditor Site Editor < 1.1.1 - Path Traversal
A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php, aka absolute path traversal.
CWE-22
Mar 19, 2018
CVE-2024-43451
6.5
MEDIUM
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.90
NTLM Hash Disclosure Spoofing - Info Disclosure
NTLM Hash Disclosure Spoofing Vulnerability
CWE-73
Nov 12, 2024
CVE-2024-23108
10.0
CRITICAL
EXPLOITED
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.90
Fortinet FortiSIEM - OS Command Injection
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet allows attacker to execute unauthorized code or commands via via crafted API requests.
CWE-78
Feb 05, 2024
CVE-2024-53376
8.8
HIGH
1 PoC
Analysis
EPSS 0.90
Cyberpanel < 2.3.8 - OS Command Injection
CyberPanel before 2.3.8 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the phpSelection field to the websites/submitWebsiteCreation URI.
CWE-78
Dec 16, 2024
CVE-2024-6205
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
PayPlus Payment Gateway <6.6.9 - SQL Injection
The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
CWE-89
Jul 19, 2024
CVE-2015-8103
9.8
CRITICAL
6 PoCs
Analysis
EPSS 0.90
Jenkins CLI RMI Java Deserialization Vulnerability
The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".
CWE-502
Nov 25, 2015
CVE-2014-2323
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.90
lighttpd <1.4.35 - SQL Injection
SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.
CWE-89
Mar 14, 2014
CVE-2007-3925
3 PoCs
Analysis
EPSS 0.90
Ipswitch Imail Server < 2006.2 - Memory Corruption
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
CWE-119
Jul 21, 2007