Exploit Intelligence Platform
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
410 results
Clear all
CVE-2022-43138
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Dolibarr Open Source ERP & CRM <14.0.1 - Privilege Escalation
Dolibarr Open Source ERP & CRM for Business before v14.0.1 allows attackers to escalate privileges via a crafted API.
CWE-269
Nov 17, 2022
CVE-2021-3129
9.8
CRITICAL
KEV
RANSOMWARE
34 PoCs
Analysis
NUCLEI
EPSS 0.94
Ignition <2.5.2 - RCE
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
Jan 12, 2021
CVE-2021-21311
7.2
HIGH
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Adminer < 4.7.9 - SSRF
Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
CWE-918
Feb 11, 2021
CVE-2021-32648
8.2
HIGH
KEV
2 PoCs
1 Writeup
Analysis
NUCLEI
EPSS 0.93
October < 1.1.5 - Authentication Bypass
octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
CWE-287
Aug 26, 2021
CVE-2021-26119
7.5
HIGH
1 PoC
1 Writeup
EPSS 0.63
Smarty <3.1.39 - Code Injection
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
Feb 22, 2021
CVE-2021-36396
7.5
HIGH
2 PoCs
Analysis
EPSS 0.03
Moodle - SSRF
In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk.
CWE-918
Mar 06, 2023
CVE-2021-36393
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.27
Moodle - SQL Injection
In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.
CWE-89
Mar 06, 2023
CVE-2021-43789
7.5
HIGH
1 PoC
Analysis
EPSS 0.12
PrestaShop <1.7.8.2 - SQL Injection
PrestaShop is an Open Source e-commerce web application. Versions of PrestaShop prior to 1.7.8.2 are vulnerable to blind SQL injection using search filters with `orderBy` and `sortOrder` parameters. The problem is fixed in version 1.7.8.2.
CWE-89
Dec 07, 2021
CVE-2021-21809
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.73
Moodle Authenticated Spelling Binary RCE
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
CWE-78
Jun 23, 2021
CVE-2021-32682
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.93
elFinder <2.1.58 - RCE
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
CWE-22
Jun 14, 2021
CVE-2021-3007
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.90
Laminas Project laminas-http <2.14.2 - Code Injection
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
CWE-502
Jan 04, 2021
CVE-2021-23394
8.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.77
Std42 Elfinder < 2.1.58 - Unrestricted File Upload
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CWE-434
Jun 13, 2021
CVE-2021-43008
7.5
HIGH
3 PoCs
Analysis
EPSS 0.83
Adminer <4.6.2 - Info Disclosure
Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
Apr 05, 2022
CVE-2021-21424
5.3
MEDIUM
2 PoCs
Analysis
EPSS 0.00
Sensiolabs Symfony < 3.4.48 - Information Disclosure
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.
CWE-200
May 13, 2021
CVE-2021-44567
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.09
Rosariosis < 7.6.1 - SQL Injection
An unauthenticated SQL Injection vulnerability exists in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.
CWE-89
Feb 24, 2022
CVE-2021-21389
8.1
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Buddypress < 7.2.1 - Incorrect Authorization
BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
CWE-863
Mar 26, 2021
CVE-2021-32708
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
Flysystem 1.x-2.x - RCE
Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. The conditions are: A user is allowed to supply the path or filename of an uploaded file, the supplied path or filename is not checked against unicode chars, the supplied pathname checked against an extension deny-list, not an allow-list, the supplied path or filename contains a unicode whitespace char in the extension, the uploaded file is stored in a directory that allows PHP code to be executed. Given these conditions are met a user can upload and execute arbitrary code on the system under attack. The unicode whitespace removal has been replaced with a rejection (exception). For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.
CWE-367
Jun 24, 2021
CVE-2021-39165
8.1
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.89
Chachethq Cachet < 2.3.18 - Authentication Bypass
Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.
CWE-287
Aug 26, 2021
CVE-2021-42171
7.2
HIGH
2 PoCs
Analysis
EPSS 0.18
Tribalsystems Zenario < 9.0.55143 - Unrestricted File Upload
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
CWE-434
Mar 14, 2022
CVE-2021-43617
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.53
Laravel Framework <8.70.2 - Code Injection
Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. NOTE: this CVE Record is for Laravel Framework, and is unrelated to any reports concerning incorrectly written user applications for image upload.
CWE-434
Nov 14, 2021