Critical Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,109 results Clear all
CVE-2021-22205 10.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 34 PoCs Analysis NUCLEI EPSS 0.94
Gitlab < 13.8.8 - Code Injection
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
CWE-94 Apr 23, 2021
CVE-2021-21978 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.90
Vmware View Planner < 4.6 - Missing Authorization
VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
CWE-862 Mar 03, 2021
CVE-2021-21972 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 34 PoCs Analysis NUCLEI EPSS 0.94
Vmware Cloud Foundation < 3.10.1.2 - Path Traversal
The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CWE-22 Feb 24, 2021
CVE-2021-42230 9.8 CRITICAL 2 PoCs Analysis EPSS 0.25
Seowonintech 130-slc Firmware < 2021-09-15 - Remote Code Execution
Seowon 130-SLC router all versions as of 2021-09-15 is vulnerable to Remote Code Execution via the queriesCnt parameter.
Apr 15, 2022
CVE-2021-44735 9.8 CRITICAL 1 PoC EPSS 0.13
Lexmark B2236 Firmware < mslsg.076.294 - Command Injection
Embedded web server command injection vulnerability in Lexmark devices through 2021-12-07.
CWE-77 Jan 20, 2022
CVE-2021-39623 9.8 CRITICAL 1 PoC EPSS 0.03
Google Android - Out-of-Bounds Write
In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348
CWE-787 Jan 14, 2022
CVE-2021-41653 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Tp-link Tl-wr840n Firmware - Code Injection
The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
CWE-94 Nov 13, 2021
CVE-2021-43140 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
Sourcecodester 1.0 - SQL Injection
SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login.
CWE-89 Nov 03, 2021
CVE-2021-43267 9.8 CRITICAL 3 PoCs Analysis EPSS 0.73
Linux Kernel <5.14.16 - RCE
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
CWE-1284 Nov 02, 2021
CVE-2021-20028 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 1 PoC EPSS 0.79
Sonicwall Sma 210 Firmware < 9.0.0.10-28sv - SQL Injection
Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier
CWE-89 Aug 04, 2021
CVE-2021-1965 9.8 CRITICAL 2 PoCs Analysis EPSS 0.27
Qualcomm Aqt1000 Firmware - Improper Input Validation
Possible buffer overflow due to lack of parameter length check during MBSSID scan IE parse in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE-20 Jul 13, 2021
CVE-2021-28476 9.9 CRITICAL 7 PoCs Analysis EPSS 0.55
Microsoft Windows 10 - Remote Code Execution
Windows Hyper-V Remote Code Execution Vulnerability
May 11, 2021
CVE-2021-30128 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Apache OFBiz <17.12.07 - Deserialization
Apache OFBiz has unsafe deserialization prior to 17.12.07 version
CWE-502 Apr 27, 2021
CVE-2021-29200 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.92
Apache Ofbiz < 17.12.07 - Insecure Deserialization
Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack
CWE-502 Apr 27, 2021
CVE-2021-22893 10.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 12 PoCs Analysis EPSS 0.94
Pulse Connect Secure >=9.0R3/9.1R1 - Auth Bypass
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
CWE-287 Apr 23, 2021
CVE-2021-25281 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
SaltStack Salt <3002.5 - RCE
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
CWE-287 Feb 27, 2021
CVE-2021-36393 9.8 CRITICAL 2 PoCs Analysis EPSS 0.27
Moodle - SQL Injection
In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.
CWE-89 Mar 06, 2023
CVE-2021-44521 9.1 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.91
Apache Cassandra < 3.0.26 - Code Injection
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
CWE-94 Feb 11, 2022
CVE-2021-35587 9.8 CRITICAL KEV SSVC ACTIVE 3 PoCs Analysis NUCLEI EPSS 0.94
Oracle Fusion Middleware - OpenSSO Agent - Unauthenticated RCE
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-306 Jan 19, 2022
CVE-2021-43297 9.8 CRITICAL 2 PoCs Analysis EPSS 0.46
Apache Dubbo <2.6.12, <2.7.15, <3.0 - Code Injection
A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
CWE-502 Jan 10, 2022