Critical Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
4,118 results Clear all
CVE-2021-33690 9.9 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
SAP Netweaver Development Infrastructure - SSRF
Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.
CWE-918 Sep 15, 2021
CVE-2021-46703 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Antaris RazorEngine <4.5.1-alpha001 - RCE
In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Mar 06, 2022
CVE-2021-24741 9.8 CRITICAL 1 PoC Analysis EPSS 0.58
Support Board WordPress <3.3.4 - SQL Injection
The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users.
CWE-89 Sep 20, 2021
CVE-2021-21276 9.3 CRITICAL 1 PoC Analysis EPSS 0.20
Polr <2.3.0 - Privilege Escalation
Polr is an open source URL shortener. in Polr before version 2.3.0, a vulnerability in the setup process allows attackers to gain admin access to site instances, even if they do not possess an existing account. This vulnerability exists regardless of users' settings. If an attacker crafts a request with specific cookie headers to the /setup/finish endpoint, they may be able to obtain admin privileges on the instance. This is caused by a loose comparison (==) in SetupController that is susceptible to attack. The project has been patched to ensure that a strict comparison (===) is used to verify the setup key, and that /setup/finish verifies that no users table exists before performing any migrations or provisioning any new accounts. This is fixed in version 2.3.0. Users can patch this vulnerability without upgrading by adding abort(404) to the very first line of finishSetup in SetupController.php.
CWE-863 Feb 01, 2021
CVE-2021-33990 9.8 CRITICAL 1 PoC Analysis EPSS 0.64
Liferay Portal - OS Command Injection
Liferay Portal 6.2.5 allows Command=FileUpload&Type=File&CurrentFolder=/ requests when frmfolders.html exists. NOTE: The vendor disputes this issue because the exploit reference link only shows frmfolders.html is accessible and does not demonstrate how an unauthorized user can upload a file.
CWE-78 Apr 16, 2023
CVE-2021-42756 9.8 CRITICAL 1 PoC Analysis EPSS 0.64
Fortinet Fortiweb < 6.0.8 - Out-of-Bounds Write
Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4 all versions may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests.
CWE-121 Feb 16, 2023
CVE-2021-0396 9.8 CRITICAL 1 PoC Analysis EPSS 0.06
Android <11 - RCE
In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106
CWE-787 Mar 10, 2021
CVE-2021-31800 9.8 CRITICAL 2 PoCs Analysis EPSS 0.40
Secureauth Impacket < 0.9.22 - Path Traversal
Multiple path traversal vulnerabilities exist in smbserver.py in Impacket through 0.9.22. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
CWE-22 May 05, 2021
CVE-2021-40113 10.0 CRITICAL 1 PoC Analysis EPSS 0.14
Cisco Catalyst Pon Switch Cgp-ont-1p ... - Improper Access Control
Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
CWE-284 Nov 04, 2021
CVE-2021-25641 9.8 CRITICAL 2 PoCs Analysis EPSS 0.75
Apache Dubbo < 2.6.9 - Insecure Deserialization
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
CWE-502 Jun 01, 2021
CVE-2021-36711 9.8 CRITICAL 1 PoC Analysis EPSS 0.50
Octobot < 0.4.4 - Unrestricted File Upload
WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
CWE-434 Jul 16, 2022
CVE-2021-27965 9.8 CRITICAL 3 PoCs Analysis EPSS 0.16
MSI Dragon Center <2.0.98.0 - Privilege Escalation
The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.
CWE-120 Mar 05, 2021
CVE-2021-25003 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
WPCargo Track & Trace <6.9.0 - RCE
The WPCargo Track & Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE
CWE-434 Mar 14, 2022
CVE-2021-39409 9.8 CRITICAL 1 PoC Analysis EPSS 0.14
Online Student Rate System v1.0 - Auth Bypass
A vulnerability exists in Online Student Rate System v1.0 that allows any user to register as an administrator without needing to be authenticated.
Jun 24, 2022
CVE-2021-40903 9.8 CRITICAL 2 PoCs Analysis EPSS 0.12
Antminer Monitor 0.50.0 - Backdoor
A vulnerability in Antminer Monitor 0.50.0 exists because of backdoor or misconfiguration inside a settings file in flask server. Settings file has a predefined secret string, which would be randomly generated, however it is static.
CWE-798 Jun 17, 2022
CVE-2021-38540 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
Airflow >=2.0.0-<2.1.3 - RCE/Info Disclosure
The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.
CWE-269 Sep 09, 2021
CVE-2021-2456 9.8 CRITICAL 1 PoC Analysis EPSS 0.73
Oracle Fusion Middleware 12.2.1.4.0 - Unauthenticated RCE
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web General). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jul 21, 2021
CVE-2021-46424 9.1 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.91
Telesquare TLR-2005KSH 1.0.0 - File Deletion
Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion vulnerability that allows a remote attacker to delete any file, even system internal files, via a DELETE request.
Apr 27, 2022
CVE-2021-44596 9.8 CRITICAL 1 PoC Analysis EPSS 0.43
Wondershare Dr.fone - Remote Code Execution
Wondershare LTD Dr. Fone as of 2021-12-06 version is affected by Remote code execution. Due to software design flaws an unauthenticated user can communicate over UDP with the "InstallAssistService.exe" service(the service is running under SYSTEM privileges) and manipulate it to execute malicious executable without any validation from a remote location and gain SYSTEM privileges
Apr 29, 2022
CVE-2021-43481 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Webtareas <2.4p3 - SQL Injection
An SQL Injection vulnerability exists in Webtareas 2.4p3 and earlier via the $uq HTTP POST parameter in editapprovalstage.php.
CWE-89 Apr 20, 2022