Critical Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,118 results
Clear all
CVE-2021-45835
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.22
Online Admission System 1.0 - Code Injection
The Online Admission System 1.0 allows an unauthenticated attacker to upload or transfer files of dangerous types to the application through documents.php, which may be used to execute malicious code or lead to code execution.
CWE-434
Mar 18, 2022
CVE-2021-45814
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Nettmp NNT 5.1 - SQL Injection
Nettmp NNT 5.1 is affected by a SQL injection vulnerability. An attacker can bypass authentication and access the panel with an administrative account.
CWE-89
Dec 28, 2021
CVE-2021-40859
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.81
Auerswald COMpact 5500R <8.0B - RCE
Backdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow attackers with access to the web based management application full administrative access to the device.
Dec 07, 2021
CVE-2021-43821
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.01
Opencast <9.10-10.6 - Path Traversal
Opencast is an Open Source Lecture Capture & Video Management for Education. Opencast before version 9.10 or 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface. Before Opencast 9.10 and 10.6, Opencast would open and include local files during ingests. Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. The issue has been fixed in Opencast 10.6 and 11.0. You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating.
CWE-552
Dec 14, 2021
CVE-2021-45468
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.33
Imperva Web Application Firewall < 2021-12-23 - HTTP Request Smuggling
Imperva Web Application Firewall (WAF) before 2021-12-23 allows remote unauthenticated attackers to use "Content-Encoding: gzip" to evade WAF security controls and send malicious HTTP POST requests to web servers behind the WAF.
CWE-444
Jan 14, 2022
CVE-2021-47753
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Phpkf Cms - Unrestricted File Upload
phpKF CMS 3.00 Beta y6 contains an unauthenticated file upload vulnerability that allows remote attackers to execute arbitrary code by bypassing file extension checks. Attackers can upload a PHP file disguised as a PNG, rename it, and execute system commands through a crafted web shell parameter.
CWE-434
Jan 15, 2026
CVE-2021-3817
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.54
wbce_cms - SQL Injection
wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
CWE-89
Dec 09, 2021
CVE-2021-45334
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Online Thesis Archiving System - SQL Injection
Sourcecodester Online Thesis Archiving System 1.0 is vulnerable to SQL Injection. An attacker can bypass admin authentication and gain access to admin panel using SQL Injection
CWE-89
Jan 10, 2022
CVE-2021-41560
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.46
Opencats < 0.9.6 - Unrestricted File Upload
OpenCATS through 0.9.6 allows remote attackers to execute arbitrary code by uploading an executable file via lib/FileUtility.php.
CWE-434
Dec 15, 2021
CVE-2021-46013
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Sourcecodester Free school management software 1.0 - RCE
An unrestricted file upload vulnerability exists in Sourcecodester Free school management software 1.0. An attacker can leverage this vulnerability to enable remote code execution on the affected web server. Once a php webshell containing "<?php system($_GET["cmd"]); ?>" gets uploaded it is saved into /uploads/exam_question/ directory, and is accessible by all users.
CWE-434
Jan 18, 2022
CVE-2021-38759
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.30
Raspberry Pi OS <5.10 - Privilege Escalation
Raspberry Pi OS through 5.10 has the raspberry default password for the pi account. If not changed, attackers can gain administrator privileges.
CWE-1188
Dec 07, 2021
CVE-2021-32724
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.00
check-spelling - Info Disclosure
check-spelling is a github action which provides CI spell checking. In affected versions and for a repository with the [check-spelling action](https://github.com/marketplace/actions/check-spelling) enabled that triggers on `pull_request_target` (or `schedule`), an attacker can send a crafted Pull Request that causes a `GITHUB_TOKEN` to be exposed. With the `GITHUB_TOKEN`, it's possible to push commits to the repository bypassing standard approval processes. Commits to the repository could then steal any/all secrets available to the repository. As a workaround users may can either: [Disable the workflow](https://docs.github.com/en/actions/managing-workflow-runs/disabling-and-enabling-a-workflow) until you've fixed all branches or Set repository to [Allow specific actions](https://docs.github.com/en/github/administering-a-repository/managing-repository-settings/disabling-or-limiting-github-actions-for-a-repository#allowing-specific-actions-to-run). check-spelling isn't a verified creator and it certainly won't be anytime soon. You could then explicitly add other actions that your repository uses. Set repository [Workflow permissions](https://docs.github.com/en/github/administering-a-repository/managing-repository-settings/disabling-or-limiting-github-actions-for-a-repository#setting-the-permissions-of-the-github_token-for-your-repository) to `Read repository contents permission`. Workflows using `check-spelling/check-spelling@main` will get the fix automatically. Workflows using a pinned sha or tagged version will need to change the affected workflows for all repository branches to the latest version. Users can verify who and which Pull Requests have been running the action by looking up the spelling.yml action in the Actions tab of their repositories, e.g., https://github.com/check-spelling/check-spelling/actions/workflows/spelling.yml - you can filter PRs by adding ?query=event%3Apull_request_target, e.g., https://github.com/check-spelling/check-spelling/actions/workflows/spelling.yml?query=event%3Apull_request_target.
CWE-532
Sep 09, 2021
CVE-2021-27651
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Pega Infinity <8.5.2 - Auth Bypass
In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.
CWE-287
Apr 29, 2021
CVE-2021-41081
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.27
Zoho ManageEngine Network Config Mgr <125465 - SQL Injection
Zoho ManageEngine Network Configuration Manager before 125465 is vulnerable to SQL Injection in a configuration search.
CWE-89
Nov 11, 2021
CVE-2021-37832
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.13
Digitaldruid Hoteldruid - SQL Injection
A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite is being used as the application database. A malicious attacker can issue SQL commands to the SQLite database through the vulnerable idappartamenti parameter.
CWE-89
Aug 03, 2021
CVE-2021-44655
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Online Pre-owned/used Car Showroom Management System - SQL Injection
Online Pre-owned/Used Car Showroom Management System 1.0 contains a SQL injection authentication bypass vulnerability. Admin panel authentication can be bypassed due to SQL injection vulnerability in the login form allowing attacker to get admin access on the application.
CWE-89
Dec 15, 2021
CVE-2021-44653
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Oretnom23 Online Magazine Management System - SQL Injection
Online Magazine Management System 1.0 contains a SQL injection authentication bypass vulnerability. The Admin panel authentication can be bypassed due to SQL injection vulnerability in the login form allowing attacker to gain access as admin to the application.
CWE-89
Dec 15, 2021
CVE-2021-42325
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.06
Froxlor < 0.10.30 - SQL Injection
Froxlor through 0.10.29.1 allows SQL injection in Database/Manager/DbManagerMySQL.php via a custom DB name.
CWE-89
Oct 12, 2021
CVE-2021-43778
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
GLPI <2.6.1 - Path Traversal
Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. This issue was patched in version 2.6.1. As a workaround, delete the `front/send.php` file.
CWE-22
Nov 24, 2021
CVE-2021-40865
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.46
Apache Storm <2.2.1, <2.3.0, <1.2.4 - Open Redirect
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4
CWE-502
Oct 25, 2021