Critical Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,109 results Clear all
CVE-2021-42013 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 45 PoCs Analysis NUCLEI EPSS 0.94
Apache HTTP Server < 9.2.6.0 - Path Traversal
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
CWE-22 Oct 07, 2021
CVE-2021-24762 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.86
The Perfect Survey WP <1.5.2 - SQL Injection
The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
CWE-89 Feb 01, 2022
CVE-2021-46384 9.8 CRITICAL 1 PoC EPSS 0.12
MCMS <=5.2.5 - RCE
https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.
CWE-306 Mar 04, 2022
CVE-2021-46386 9.8 CRITICAL 1 PoC EPSS 0.06
mingSoft MCMS <5.2.5 - RCE
File upload vulnerability in mingSoft MCMS through 5.2.5, allows remote attackers to execute arbitrary code via a crafted jspx webshell to net.mingsoft.basic.action.web.FileAction#upload.
CWE-434 Jan 26, 2022
CVE-2021-29377 9.8 CRITICAL 1 PoC EPSS 0.01
Pearadmin Think < 2.1.2 - Unrestricted File Upload
Pear Admin Think through 2.1.2 has an arbitrary file upload vulnerability that allows attackers to execute arbitrary code remotely. A .php file can be uploaded via admin.php/index/upload because app/common/service/UploadService.php mishandles fileExt.
CWE-434 Aug 12, 2021
CVE-2021-28890 9.8 CRITICAL 1 PoC EPSS 0.00
J2eefast - SQL Injection
J2eeFAST 2.2.1 allows remote attackers to perform SQL injection via the (1) compId parameter to fast/sys/user/list, (2) deptId parameter to fast/sys/role/list, or (3) roleId parameter to fast/sys/role/authUser/list, related to the use of ${} to join SQL statements.
CWE-89 Aug 12, 2021
CVE-2021-32824 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.06
Apache Dubbo <2.6.10-2.7.10 - RCE
Apache Dubbo is a java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vulnerable to pre-auth remote code execution via arbitrary bean manipulation in the Telnet handler. The Dubbo main service port can be used to access a Telnet Handler which offers some basic methods to collect information about the providers and methods exposed by the service and it can even allow to shutdown the service. This endpoint is unprotected. Additionally, a provider method can be invoked using the `invoke` handler. This handler uses a safe version of FastJson to process the call arguments. However, the resulting list is later processed with `PojoUtils.realize` which can be used to instantiate arbitrary classes and invoke its setters. Even though FastJson is properly protected with a default blocklist, `PojoUtils.realize` is not, and an attacker can leverage that to achieve remote code execution. Versions 2.6.10 and 2.7.10 contain fixes for this issue.
CWE-502 Jan 03, 2023
CVE-2021-3129 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 34 PoCs Analysis NUCLEI EPSS 0.94
Ignition <2.5.2 - RCE
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
Jan 12, 2021
CVE-2021-4045 9.8 CRITICAL EXPLOITED 7 PoCs Analysis EPSS 0.91
TP-Link Tapo C200 <1.1.15 - RCE
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
CWE-77 Mar 10, 2022
CVE-2021-31805 9.8 CRITICAL EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts < 2.5.29 - Remote Code Execution
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
CWE-917 Apr 12, 2022
CVE-2021-20038 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
Sonicwall Sma 200 Firmware - Out-of-Bounds Write
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
CWE-121 Dec 08, 2021
CVE-2021-41277 10.0 CRITICAL KEV SSVC ACTIVE 10 PoCs Analysis NUCLEI EPSS 0.94
Metabase - Local File Inclusion
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
CWE-22 Nov 17, 2021
CVE-2021-42237 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Sitecore Experience Platform - Insecure Deserialization
Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.
CWE-502 Nov 05, 2021
CVE-2021-20837 9.8 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.94
Movable Type <7 r.5002 - RCE
Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
CWE-78 Oct 26, 2021
CVE-2021-22005 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 16 PoCs Analysis NUCLEI EPSS 0.94
Vmware Cloud Foundation < 5.0 - Path Traversal
The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.
CWE-22 Sep 23, 2021
CVE-2021-36260 9.8 CRITICAL KEV SSVC ACTIVE 17 PoCs Analysis NUCLEI EPSS 0.94
Hikvision IP Camera Unauthenticated Command Injection
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
CWE-78 Sep 22, 2021
CVE-2021-36356 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
KRAMER VIAware - RCE
KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.
CWE-434 Aug 31, 2021
CVE-2021-26084 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 41 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Confluence Server and Data Center - OGNL Injection
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
CWE-917 Aug 30, 2021
CVE-2021-35211 9.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
SolarWinds Serv-U <15.2.3 HF2 - RCE
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
CWE-787 Jul 14, 2021
CVE-2021-21985 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 14 PoCs Analysis NUCLEI EPSS 0.94
Vmware Vcenter Server < 3.10.2.1 - SSRF
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
CWE-470 May 26, 2021