High EPSS Vulnerabilities with Public Exploits

Updated 21m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
3,483 results Clear all
CVE-2017-6884 8.8 HIGH KEV RANSOMWARE 1 PoC Analysis EPSS 0.90
Zyxel EMG2926 V1.00(AAQT.4)b8 - Command Injection
A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.
CWE-78 Apr 06, 2017
CVE-2019-13373 9.8 CRITICAL 1 PoC Analysis EPSS 0.90
Dlink Central Wifimanager - SQL Injection
An issue was discovered in the D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6. Input does not get validated and arbitrary SQL statements can be executed in the database via the /web/Public/Conn.php parameter dbSQL.
CWE-89 Jul 06, 2019
CVE-2022-21882 7.0 HIGH KEV 7 PoCs Analysis EPSS 0.90
Win32k ConsoleControl Offset Confusion
Win32k Elevation of Privilege Vulnerability
CWE-787 Jan 11, 2022
CVE-2012-0779 EXPLOITED 2 PoCs Analysis EPSS 0.90
Adobe Flash Player <10.3.183.19-11.2.202.235 - RCE
Adobe Flash Player before 10.3.183.19 and 11.x before 11.2.202.235 on Windows, Mac OS X, and Linux; before 11.1.111.9 on Android 2.x and 3.x; and before 11.1.115.8 on Android 4.x allows remote attackers to execute arbitrary code via a crafted file, related to an "object confusion vulnerability," as exploited in the wild in May 2012.
May 04, 2012
CVE-2009-3733 EXPLOITED 2 PoCs Analysis EPSS 0.90
Vmware Esx - Path Traversal
Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.
CWE-22 Nov 02, 2009
CVE-2019-14322 7.5 HIGH 4 PoCs Analysis NUCLEI EPSS 0.90
Pallets Werkzeug <0.15.5 - Path Traversal
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
CWE-22 Jul 28, 2019
CVE-2010-0249 8.8 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.90
Microsoft Internet Explorer - Use After Free
Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka "HTML Object Memory Corruption Vulnerability."
CWE-416 Jan 15, 2010
CVE-2020-36708 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
WordPress Themes - Function Injection
The following themes for WordPress are vulnerable to Function Injections in versions up to and including Shapely <= 1.2.7, NewsMag <= 2.4.1, Activello <= 1.4.0, Illdy <= 2.1.4, Allegiant <= 1.2.2, Newspaper X <= 1.3.1, Pixova Lite <= 2.0.5, Brilliance <= 1.2.7, MedZone Lite <= 1.2.4, Regina Lite <= 2.0.4, Transcend <= 1.1.8, Affluent <= 1.1.0, Bonkers <= 1.0.4, Antreas <= 1.0.2, Sparkling <= 2.4.8, and NatureMag Lite <= 1.0.4. This is due to epsilon_framework_ajax_action. This makes it possible for unauthenticated attackers to call functions and achieve remote code execution.
CWE-94 Jun 07, 2023
CVE-2016-6210 5.9 MEDIUM 9 PoCs Analysis EPSS 0.90
OpenSSH <7.3 - Info Disclosure
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
CWE-200 Feb 13, 2017
CVE-2017-1000170 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
jqueryFileTree <2.1.5 - Path Traversal
jqueryFileTree 2.1.5 and older Directory Traversal
CWE-22 Nov 17, 2017
CVE-2006-3747 6 PoCs Analysis EPSS 0.90
Apache HTTP Server < 1.3.37 - Numeric Error
Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
CWE-189 Jul 28, 2006
CVE-2012-0262 EXPLOITED 2 PoCs Analysis EPSS 0.90
op5config/welcome <2.0.3 - Command Injection
op5config/welcome in system-op5config before 2.0.3 in op5 Monitor and op5 Appliance before 5.5.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the password parameter.
CWE-94 Dec 31, 2013
CVE-2023-2732 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.90
Inspireui Mstore API < 3.9.2 - Authentication Bypass
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
CWE-288 May 25, 2023
CVE-2024-38077 9.8 CRITICAL 14 PoCs Analysis EPSS 0.90
Windows Remote Desktop < - RCE
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CWE-122 Jul 09, 2024
CVE-2009-1429 3 PoCs Analysis EPSS 0.90
Symantec Antivirus < 9.0 - Code Injection
The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary commands via a crafted packet whose contents are interpreted as a command to be launched in a new process by the CreateProcessA function.
CWE-94 Apr 29, 2009
CVE-2011-0063 2 PoCs Analysis EPSS 0.90
Majordomo <20110203 - Path Traversal
The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.
CWE-22 Mar 15, 2011
CVE-2021-35042 9.8 CRITICAL 6 PoCs Analysis NUCLEI EPSS 0.90
Django <3.1.13, <3.2.5 - SQL Injection
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
CWE-89 Jul 02, 2021
CVE-2018-1270 9.8 CRITICAL 6 PoCs Analysis EPSS 0.90
Vmware Spring Framework < 4.3.16 - Remote Code Execution
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
CWE-358 Apr 06, 2018
CVE-2020-13151 9.8 CRITICAL 4 PoCs Analysis EPSS 0.90
Aerospike Database UDF Lua Code Execution
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.
CWE-78 Aug 05, 2020
CVE-2022-31126 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Roxy-wi <6.1.1.0 - RCE
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to code execution by sending a specially crafted HTTP request to /app/options.py file. This affects Roxy-wi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-74 Jul 06, 2022