Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
285 results Clear all
CVE-2021-33026 9.8 CRITICAL 2 PoCs Analysis EPSS 0.16
Flask-Caching <1.10.1 - Code Injection
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision
CWE-502 May 13, 2021
CVE-2021-21401 7.1 HIGH 1 PoC Analysis EPSS 0.00
Nanopb <0.3.9.8-0.4.5 - Memory Corruption
Nanopb is a small code-size Protocol Buffers implementation in ansi C. In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-pointer field. If the message data first contains the non-pointer field and then the pointer field, the data of the non-pointer field is incorrectly treated as if it was a pointer value. Such message data rarely occurs in normal messages, but it is a concern when untrusted data is parsed. This has been fixed in versions 0.3.9.8 and 0.4.5. See referenced GitHub Security Advisory for more information including workarounds.
CWE-763 Mar 23, 2021
CVE-2021-31800 9.8 CRITICAL 2 PoCs Analysis EPSS 0.40
Secureauth Impacket < 0.9.22 - Path Traversal
Multiple path traversal vulnerabilities exist in smbserver.py in Impacket through 0.9.22. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
CWE-22 May 05, 2021
CVE-2021-44255 7.2 HIGH 1 PoC Analysis EPSS 0.14
Motioneye < 0.42.1 - Missing Authentication
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
CWE-306 Jan 31, 2022
CVE-2021-40978 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.85
Mkdocs 1.2.2 - Path Traversal
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1
CWE-22 Oct 07, 2021
CVE-2021-41078 7.8 HIGH 1 PoC Analysis EPSS 0.01
Nameko <2.13.0 - Code Injection
Nameko through 2.13.0 can be tricked into performing arbitrary code execution when deserializing the config file.
CWE-502 Oct 26, 2021
CVE-2021-43811 7.8 HIGH 1 PoC Analysis EPSS 0.09
Sockeye <2.3.24 - Code Injection
Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.
CWE-94 Dec 08, 2021
CVE-2021-36711 9.8 CRITICAL 1 PoC Analysis EPSS 0.50
Octobot < 0.4.4 - Unrestricted File Upload
WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
CWE-434 Jul 16, 2022
CVE-2021-38540 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
Airflow >=2.0.0-<2.1.3 - RCE/Info Disclosure
The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.
CWE-269 Sep 09, 2021
CVE-2021-3281 5.3 MEDIUM 2 PoCs Analysis EPSS 0.41
Django <2.2.18-3.0.12-3.1.6 - Path Traversal
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
CWE-22 Feb 02, 2021
CVE-2021-44217 6.1 MEDIUM 1 PoC Analysis EPSS 0.01
Ericsson Codechecker < 6.18.0 - XSS
In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.
CWE-79 Jan 18, 2022
CVE-2021-40839 7.5 HIGH 1 PoC Analysis EPSS 0.14
Rencode <1.0.6 - DoS
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
CWE-835 Sep 10, 2021
CVE-2021-37678 9.3 CRITICAL 1 PoC Analysis EPSS 0.01
Google Tensorflow < 2.3.4 - Insecure Deserialization
TensorFlow is an end-to-end open source platform for machine learning. In affected versions TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/python/keras/saving/model_config.py#L66-L104) uses `yaml.unsafe_load` which can perform arbitrary code execution on the input. Given that YAML format support requires a significant amount of work, we have removed it for now. We have patched the issue in GitHub commit 23d6383eb6c14084a8fc3bdf164043b974818012. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
CWE-502 Aug 12, 2021
CVE-2021-42053 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Unicorn < 0.35.3 - XSS
The Unicorn framework through 0.35.3 for Django allows XSS via component.name.
CWE-79 Oct 07, 2021
CVE-2021-22557 5.3 MEDIUM 1 PoC Analysis EPSS 0.01
Google Slo Generator < 2.0.1 - Code Injection
SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173
CWE-78 Oct 04, 2021
CVE-2021-40323 9.8 CRITICAL 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.93
Cobbler <3.3.0 - RCE
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
CWE-94 Oct 04, 2021
CVE-2021-24040 9.8 CRITICAL 1 PoC Analysis EPSS 0.36
Facebook Parlai < 1.1.0 - Insecure Deserialization
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
CWE-502 Sep 10, 2021
CVE-2021-3572 5.7 MEDIUM 1 PoC Analysis EPSS 0.00
Python-pip <21.1 - Code Injection
A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
CWE-20 Nov 10, 2021
CVE-2021-21337 5.7 MEDIUM 1 PoC Analysis EPSS 0.02
Zope Products.pluggableauthservice < 2.6.1 - Open Redirect
Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an open redirect vulnerability. A maliciously crafted link to the login form and login functionality could redirect the browser to a different website. The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install "Products.PluggableAuthService>=2.6.1".
CWE-601 Mar 08, 2021
CVE-2021-29002 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Plone - XSS
A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-controlpanel via the "form.widgets.site_title" parameter.
CWE-79 Mar 24, 2021