Critical Vulnerabilities with Public Exploits
Updated 59m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,118 results
Clear all
CVE-2021-24499
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Amentotech Workreap < 2.2.2 - Unrestricted File Upload
The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.
CWE-434
Aug 09, 2021
CVE-2021-35042
9.8
CRITICAL
6 PoCs
Analysis
NUCLEI
EPSS 0.90
Django <3.1.13, <3.2.5 - SQL Injection
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
CWE-89
Jul 02, 2021
CVE-2021-32099
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.53
Artica Pandora Fms - SQL Injection
A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.
CWE-89
May 07, 2021
CVE-2021-28480
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.87
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Apr 13, 2021
CVE-2021-22192
9.9
CRITICAL
3 PoCs
Analysis
EPSS 0.81
GitLab CE/EE <13.2 - Authenticated RCE
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server.
Mar 24, 2021
CVE-2021-22201
9.6
CRITICAL
2 PoCs
Analysis
EPSS 0.09
GitLab CE/EE <13.9 - Info Disclosure
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9. A specially crafted import file could read files on the server.
Apr 02, 2021
CVE-2021-45046
9.0
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
14 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Log4j < 2.12.2 - Remote Code Execution
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
CWE-917
Dec 14, 2021
CVE-2021-31166
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
20 PoCs
Analysis
EPSS 0.93
Windows IIS HTTP Protocol Stack DOS
HTTP Protocol Stack Remote Code Execution Vulnerability
CWE-416
May 11, 2021
CVE-2021-35064
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
KramerAV VIAWare - Privilege Escalation
KramerAV VIAWare, all tested versions, allow privilege escalation through misconfiguration of sudo. Sudoers permits running of multiple dangerous commands, including unzip, systemctl and dpkg.
CWE-269
Jul 12, 2021
CVE-2021-4374
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.75
WordPress Automatic <3.53.2 - Info Disclosure
The WordPress Automatic Plugin for WordPress is vulnerable to arbitrary options updates in versions up to, and including, 3.53.2. This is due to missing authorization and option validation in the process_form.php file. This makes it possible for unauthenticated attackers to arbitrarily update the settings of a vulnerable site and ultimately compromise the entire site.
CWE-862
Jun 07, 2023
CVE-2021-24946
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.60
WordPress Modern Events Calendar SQLi Scanner
The Modern Events Calendar Lite WordPress plugin before 6.1.5 does not sanitise and escape the time parameter before using it in a SQL statement in the mec_load_single_page AJAX action, available to unauthenticated users, leading to an unauthenticated SQL injection issue
CWE-89
Dec 13, 2021
CVE-2021-24931
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.72
Wordpress Secure Copy Content Protection and Content Locking sccp_id Unauthenticated SQLi
The Secure Copy Content Protection and Content Locking WordPress plugin before 2.8.2 does not escape the sccp_id parameter of the ays_sccp_results_export_file AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an SQL injection.
CWE-89
Dec 06, 2021
CVE-2021-36782
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.80
Suse Rancher < 2.5.16 - Cleartext Storage
A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners, Project Members and User Base to use the Kubernetes API to retrieve plaintext version of sensitive data. This issue affects: SUSE Rancher Rancher versions prior to 2.5.16; Rancher versions prior to 2.6.7.
CWE-312
Sep 07, 2022
CVE-2021-42258
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.94
BQE Billquick Web Suite < 22.0.9.1 - SQL Injection
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell.
CWE-89
Oct 22, 2021
CVE-2021-27850
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Tapestry <5.7.0 - RCE
A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.1, upgrade to 5.6.2 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.
CWE-502
Apr 15, 2021
CVE-2021-35464
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
ForgeRock AM <7.0 - Code Injection
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
CWE-502
Jul 22, 2021
CVE-2021-21809
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.73
Moodle Authenticated Spelling Binary RCE
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
CWE-78
Jun 23, 2021
CVE-2021-44077
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
ManageEngine ServiceDesk Plus CVE-2021-44077
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.
CWE-306
Nov 29, 2021
CVE-2021-42847
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.87
ManageEngine ADAudit Plus Authenticated File Write RCE
Zoho ManageEngine ADAudit Plus before 7006 allows attackers to write to, and execute, arbitrary files.
Nov 11, 2021
CVE-2021-34523
9.0
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
9 PoCs
Analysis
EPSS 0.94
Microsoft Exchange Server - Privilege Escalation
Microsoft Exchange Server Elevation of Privilege Vulnerability
Jul 14, 2021