Critical Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
4,118 results Clear all
CVE-2021-26291 9.1 CRITICAL 1 PoC Analysis EPSS 0.46
Apache Maven < 3.8.1 - Origin Validation Error
Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
CWE-346 Apr 23, 2021
CVE-2021-30180 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
Apache Dubbo <2.7.9 - RCE
Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.
CWE-444 Jun 01, 2021
CVE-2021-41163 10.0 CRITICAL 2 PoCs Analysis EPSS 0.04
Discourse - RCE
Discourse is an open source platform for community discussion. In affected versions maliciously crafted requests could lead to remote code execution. This resulted from a lack of validation in subscribe_url values. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. To workaround the issue without updating, requests with a path starting /webhooks/aws path could be blocked at an upstream proxy.
CWE-74 Oct 20, 2021
CVE-2021-38163 9.9 CRITICAL KEV SSVC ACTIVE 2 PoCs Analysis EPSS 0.85
SAP NetWeaver (Visual Composer 7.0 RT) - Command Injection
SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable.
CWE-22 Sep 14, 2021
CVE-2021-24321 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Bold-themes Bello < 1.6.0 - SQL Injection
The Bello - Directory & Listing WordPress theme before 1.6.0 did not sanitise the bt_bb_listing_field_price_range_to, bt_bb_listing_field_now_open, bt_bb_listing_field_my_lng, listing_list_view and bt_bb_listing_field_my_lat parameters before using them in a SQL statement, leading to SQL Injection issues
CWE-89 Jun 01, 2021
CVE-2021-44026 9.8 CRITICAL KEV SSVC ACTIVE 2 PoCs Analysis EPSS 0.73
Roundcube Webmail < 1.3.17 - SQL Injection
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.
CWE-89 Nov 19, 2021
CVE-2021-33216 9.8 CRITICAL 1 PoC Analysis EPSS 0.18
CommScope Ruckus IoT Controller <1.7.1.0 - Privilege Escalation
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. An Undocumented Backdoor exists, allowing shell access via a developer account.
Jul 07, 2021
CVE-2021-35346 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
tsMuxer <2.6.16 - Buffer Overflow
tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function HevcSpsUnit::short_term_ref_pic_set(int) in hevc.cpp.
CWE-787 Dec 03, 2021
CVE-2021-35344 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
tsMuxer <2.6.16 - Buffer Overflow
tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function BitStreamReader::getCurVal in bitStream.h.
CWE-787 Dec 03, 2021
CVE-2021-27289 9.1 CRITICAL 2 PoCs Analysis EPSS 0.01
Ksix Zigbee Smart Home Kit <1.0.3 <1.0.7 - Replay Attack via Frame Counter
A replay attack vulnerability was discovered in a Zigbee smart home kit manufactured by Ksix (Zigbee Gateway Module = v1.0.3, Door Sensor = v1.0.7, Motion Sensor = v1.0.12), where the Zigbee anti-replay mechanism - based on the frame counter field - is improperly implemented. As a result, an attacker within wireless range can resend captured packets with a higher sequence number, which the devices incorrectly accept as legitimate messages. This allows spoofed commands to be injected without authentication, triggering false alerts and misleading the user through notifications in the mobile application used to monitor the network.
CWE-294 Apr 15, 2025
CVE-2021-44567 9.8 CRITICAL 1 PoC Analysis EPSS 0.09
Rosariosis < 7.6.1 - SQL Injection
An unauthenticated SQL Injection vulnerability exists in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.
CWE-89 Feb 24, 2022
CVE-2021-32708 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Flysystem 1.x-2.x - RCE
Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. The conditions are: A user is allowed to supply the path or filename of an uploaded file, the supplied path or filename is not checked against unicode chars, the supplied pathname checked against an extension deny-list, not an allow-list, the supplied path or filename contains a unicode whitespace char in the extension, the uploaded file is stored in a directory that allows PHP code to be executed. Given these conditions are met a user can upload and execute arbitrary code on the system under attack. The unicode whitespace removal has been replaced with a rejection (exception). For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.
CWE-367 Jun 24, 2021
CVE-2021-23639 9.8 CRITICAL 1 PoC Analysis EPSS 0.20
Markdown TO Pdf < 5.0.0 - Remote Code Execution
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
Dec 10, 2021
CVE-2021-43650 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
WebRun 3.6.0.42 - SQL Injection
WebRun 3.6.0.42 is vulnerable to SQL Injection via the P_0 parameter used to set the username during the login process.
CWE-89 Mar 22, 2022
CVE-2021-45428 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Telesquare Tlr-2005ksh Firmware - IDOR
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.
CWE-639 Jan 03, 2022
CVE-2021-3773 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Netfilter - Info Disclosure
A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.
CWE-200 Feb 16, 2022
CVE-2021-34646 9.8 CRITICAL 3 PoCs Analysis EPSS 0.23
Booster For Woocommerce < 5.4.3 - Authentication Bypass
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
CWE-290 Aug 30, 2021
CVE-2021-38297 9.8 CRITICAL 2 PoCs Analysis EPSS 0.11
Go <1.16.9, <1.17.2 - Buffer Overflow
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
CWE-120 Oct 18, 2021
CVE-2021-2394 9.8 CRITICAL 4 PoCs Analysis EPSS 0.90
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jul 21, 2021
CVE-2021-46361 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Magnolia CMS <6.2.11 - Code Injection
An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload.
Feb 11, 2022