Critical Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,109 results
Clear all
CVE-2022-22831
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
Servisnet Tessa - Authentication Bypass
An issue was discovered in Servisnet Tessa 0.0.2. An attacker can add a new sysadmin user via a manipulation of the Authorization HTTP header.
CWE-287
Feb 06, 2022
CVE-2022-0332
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.03
Moodle <3.11.4 - SQL Injection
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
CWE-89
Jan 25, 2022
CVE-2022-26293
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Online Project Time Management System v1.0 - SQL Injection
Online Project Time Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the function save_employee at /ptms/classes/Users.php.
CWE-89
Mar 16, 2022
CVE-2022-23865
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Nyron 1.0 - SQL Injection
Nyron 1.0 is affected by a SQL injection vulnerability through Nyron/Library/Catalog/winlibsrch.aspx. To exploit this vulnerability, an attacker must inject '"> on the thes1 parameter.
CWE-89
Apr 15, 2022
CVE-2022-23178
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Crestron Hd-md4x2-4k-e Firmware - Authentication Bypass
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.
CWE-287
Jan 15, 2022
CVE-2022-35156
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Phpgurukul Bus Pass Management System - SQL Injection
Bus Pass Management System 1.0 was discovered to contain a SQL Injection vulnerability via the searchdata parameter at /buspassms/download-pass.php..
CWE-89
Sep 30, 2022
CVE-2022-43138
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Dolibarr Open Source ERP & CRM <14.0.1 - Privilege Escalation
Dolibarr Open Source ERP & CRM for Business before v14.0.1 allows attackers to escalate privileges via a crafted API.
CWE-269
Nov 17, 2022
CVE-2022-30352
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Phpabook - SQL Injection
phpABook 0.9i is vulnerable to SQL Injection due to insufficient sanitization of user-supplied data in the "auth_user" parameter in index.php script.
CWE-89
Jun 02, 2022
CVE-2021-41773
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
170 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache 2.4.49/2.4.50 Traversal RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
CWE-22
Oct 05, 2021
CVE-2021-34473
9.1
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
Microsoft Exchange ProxyShell RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-918
Jul 14, 2021
CVE-2021-45837
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.81
TerraMaster TOS 4.2.15 or lower - RCE chain from unauthenticated to root via session crafting.
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending a specifically crafted input to /tos/index.php?app/del.
Apr 25, 2022
CVE-2021-44228
10.0
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
452 PoCs
Analysis
NUCLEI
EPSS 0.94
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
CWE-502
Dec 10, 2021
CVE-2021-33543
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.87
Multiple Camera Devices - Info Disclosure
Multiple camera devices by UDP Technology, Geutebrück and other vendors allow unauthenticated remote access to sensitive files due to default user authentication settings. This can lead to manipulation of the device and denial of service.
CWE-306
Sep 13, 2021
CVE-2021-1497
9.8
CRITICAL
KEV
SSVC ACTIVE
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - OS Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78
May 06, 2021
CVE-2021-26855
9.1
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
67 PoCs
Analysis
NUCLEI
EPSS 0.94
Microsoft Exchange ProxyLogon RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-918
Mar 03, 2021
CVE-2021-22986
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
22 PoCs
Analysis
NUCLEI
EPSS 0.94
F5 iControl REST Unauthenticated SSRF Token Generation RCE
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
CWE-918
Mar 31, 2021
CVE-2021-22911
9.8
CRITICAL
EXPLOITED
16 PoCs
Analysis
NUCLEI
EPSS 0.92
Rocket.Chat <3.14 - SQL Injection
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
CWE-75
May 27, 2021
CVE-2021-33045
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Dahua - Auth Bypass
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
CWE-287
Sep 15, 2021
CVE-2021-33044
9.8
CRITICAL
KEV
SSVC ACTIVE
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Dahua - Auth Bypass
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
CWE-287
Sep 15, 2021
CVE-2021-34371
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.65
Neo4j < 3.4.18 - Insecure Deserialization
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
CWE-502
Aug 05, 2021