Exploit Intelligence Platform
Updated 33m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
410 results
Clear all
CVE-2021-39172
8.8
HIGH
1 PoC
Analysis
EPSS 0.56
Cachet <2.5.1 - RCE
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
CWE-93
Aug 27, 2021
CVE-2021-39174
8.8
HIGH
2 PoCs
Analysis
EPSS 0.52
Cachet <2.5.1 - Info Disclosure
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
CWE-75
Aug 28, 2021
CVE-2021-36394
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.12
Moodle - RCE
In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.
CWE-94
Mar 06, 2023
CVE-2021-26599
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.05
Impresscms < 1.4.4 - SQL Injection
ImpressCMS before 1.4.3 allows include/findusers.php groups SQL Injection.
CWE-89
Mar 28, 2022
CVE-2021-44673
8.8
HIGH
1 PoC
Analysis
EPSS 0.04
Croogo - Unrestricted File Upload
A Remote Code Execution (RCE) vulnerability exists in Croogo 3.0.2via admin/file-manager/attachments, which lets a malicoius user upload a web shell script.
CWE-434
Mar 10, 2022
CVE-2021-42325
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.06
Froxlor < 0.10.30 - SQL Injection
Froxlor through 0.10.29.1 allows SQL injection in Database/Manager/DbManagerMySQL.php via a custom DB name.
CWE-89
Oct 12, 2021
CVE-2021-47763
8.2
HIGH
1 PoC
Analysis
EPSS 0.00
Aimeos-laravel - SQL Injection
Aimeos 2021.10 LTS contains a SQL injection vulnerability in the json api 'sort' parameter that allows attackers to inject malicious database queries. Attackers can manipulate the sort parameter to reveal table and column names by sending crafted GET requests to the jsonapi/review endpoint.
CWE-89
Jan 15, 2026
CVE-2021-27673
4.8
MEDIUM
1 PoC
Analysis
EPSS 0.00
Tribal Systems Zenario CMS <8.8.52729 - XSS
Cross Site Scripting (XSS) in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting arbitrary HTML into the "cID" parameter when creating a new HTML component.
CWE-79
Apr 15, 2021
CVE-2021-29440
8.4
HIGH
2 PoCs
Analysis
EPSS 0.11
Grav < 1.7.11 - Code Injection
Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. The issue was addressed in version 1.7.11.
CWE-94
Apr 13, 2021
CVE-2021-20717
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.01
EC-CUBE <4.0.5 - XSS
Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote attacker to inject a specially crafted script in the specific input field of the EC web site which is created using EC-CUBE. As a result, it may lead to an arbitrary script execution on the administrator's web browser.
CWE-79
May 10, 2021
CVE-2021-29460
7.6
HIGH
1 PoC
Analysis
EPSS 0.01
Kirby < 3.5.4 - XSS
Kirby is an open source CMS. An editor with write access to the Kirby Panel can upload an SVG file that contains harmful content like `<script>` tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in to Kirby, the script will run and can for example trigger requests to Kirby's API with the permissions of the victim. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. Visitors without Panel access can only use this attack vector if your site allows SVG file uploads in frontend forms and you don't already sanitize uploaded SVG files. The problem has been patched in Kirby 3.5.4. Please update to this or a later version to fix the vulnerability. Frontend upload forms need to be patched separately depending on how they store the uploaded file(s). If you use `File::create()`, you are protected by updating to 3.5.4+. As a work around you can disable the upload of SVG files in your file blueprints.
CWE-79
Apr 27, 2021
CVE-2021-3291
7.2
HIGH
2 PoCs
Analysis
EPSS 0.33
Zen Cart 1.5.7b - Command Injection
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
CWE-78
Jan 26, 2021
CVE-2021-26830
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.01
Tribalsystems Zenario < 8.8.53370 - SQL Injection
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
CWE-89
Apr 16, 2021
CVE-2021-21014
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.01
Magento <2.4.1-2.3.6 - Authenticated RCE
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a file upload restriction bypass. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
CWE-434
Feb 11, 2021
CVE-2020-15099
8.1
HIGH
2 PoCs
Analysis
EPSS 0.01
TYPO3 CMS >=9.0.0 <9.5.20, >=10.0.0 <10.4.6 - Info Disclosure
In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.20, and greater than or equal to 10.0.0 and less than 10.4.6, in a case where an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal encryptionKey was exposed - it is possible to retrieve arbitrary files of a TYPO3 installation. This includes the possibility to fetch typo3conf/LocalConfiguration.php, which again contains the encryptionKey as well as credentials of the database management system being used. In case a database server is directly accessible either via internet or in a shared hosting network, this allows the ability to completely retrieve, manipulate or delete database contents. This includes creating an administration user account - which can be used to trigger remote code execution by injecting custom extensions. This has been patched in versions 9.5.20 and 10.4.6.
CWE-20
Jul 29, 2020
CVE-2020-11022
6.9
MEDIUM
EXPLOITED
7 PoCs
Analysis
EPSS 0.07
jQuery <3.5.0 - XSS
In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CWE-79
Apr 29, 2020
CVE-2020-28949
7.8
HIGH
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.93
Archive_Tar <1.4.10 - Code Injection
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.
Nov 19, 2020
CVE-2020-14321
8.8
HIGH
4 PoCs
Analysis
EPSS 0.39
Moodle Teacher Enrollment Privilege Escalation to RCE
In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, teachers of a course were able to assign themselves the manager role within that course.
CWE-863
Aug 16, 2022
CVE-2020-11023
6.9
MEDIUM
KEV
7 PoCs
Analysis
EPSS 0.59
jQuery <3.5.0 - XSS
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CWE-79
Apr 29, 2020
CVE-2020-13756
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.27
Sabberworm Php Css Parser < 8.3.1 - Code Injection
Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data, possibly leading to remote code execution if the function allSelectors() or getSelectorsBySpecificity() is called with input from an attacker.
CWE-94
Jun 03, 2020