Critical Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
4,118 results Clear all
CVE-2021-22652 9.8 CRITICAL 1 PoC Analysis EPSS 0.41
Advantech iView <5.7.03.6112 - Code Execution
Access to the Advantech iView versions prior to v5.7.03.6112 configuration are missing authentication, which may allow an unauthorized attacker to change the configuration and obtain code execution.
CWE-306 Feb 11, 2021
CVE-2021-3122 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
NCR Command Center Agent - OS Command Injection
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
CWE-78 Feb 07, 2021
CVE-2021-3378 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.93
Fortilogger < 5.2.0 - Unrestricted File Upload
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
CWE-434 Feb 01, 2021
CVE-2021-40539 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
ManageEngine ADSelfService Plus CVE-2021-40539
Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
CWE-706 Sep 07, 2021
CVE-2021-38294 9.8 CRITICAL 1 PoC Analysis EPSS 0.85
Apache Storm <2.2.1, <1.2.4 - Command Injection
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
CWE-78 Oct 25, 2021
CVE-2021-38647 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 13 PoCs Analysis NUCLEI EPSS 0.94
Microsoft OMI Management Interface Authentication Bypass
Open Management Infrastructure Remote Code Execution Vulnerability
Sep 15, 2021
CVE-2021-22502 9.8 CRITICAL KEV SSVC ACTIVE 1 PoC Analysis NUCLEI EPSS 0.94
Micro Focus Operation Bridge Reporter <10.40 - RCE
Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server.
CWE-78 Feb 08, 2021
CVE-2021-44529 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Endpoint Manager Cloud Services Appliance - Code Injection
A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
CWE-94 Dec 08, 2021
CVE-2021-32682 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.93
elFinder <2.1.58 - RCE
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
CWE-22 Jun 14, 2021
CVE-2021-1498 9.8 CRITICAL KEV SSVC ACTIVE 1 PoC Analysis NUCLEI EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78 May 06, 2021
CVE-2021-21425 9.3 CRITICAL 5 PoCs Analysis EPSS 0.92
Getgrav Grav-plugin-admin < 1.10.8 - Improper Access Control
Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround.
CWE-284 Apr 07, 2021
CVE-2021-26295 9.8 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.94
Apache OFBiz SOAP Java Deserialization
Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz.
CWE-502 Mar 22, 2021
CVE-2021-41269 10.0 CRITICAL 3 PoCs Analysis EPSS 0.02
cron-utils <9.1.2 - RCE
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
CWE-94 Nov 15, 2021
CVE-2021-33026 9.8 CRITICAL 2 PoCs Analysis EPSS 0.16
Flask-Caching <1.10.1 - Code Injection
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision
CWE-502 May 13, 2021
CVE-2021-4380 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.80
Pinterest Automatic <1.14.3 - Auth Bypass
The Pinterest Automatic plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the 'wp_pinterest_automatic_parse_request' function and the 'process_form.php' script in versions up to, and including, 1.14.3. This makes it possible for unauthenticated attackers to update arbitrary options on a site that can be used to create new administrative user accounts or redirect unsuspecting site visitors.
CWE-284 Jun 07, 2023
CVE-2021-27905 9.8 CRITICAL 5 PoCs Analysis NUCLEI EPSS 0.94
Apache Solr - SSRF
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
CWE-918 Apr 13, 2021
CVE-2021-40438 9.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 12 PoCs Analysis NUCLEI EPSS 0.94
Apache HTTP Server <2.4.48 - SSRF
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
CWE-918 Sep 16, 2021
CVE-2021-3007 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.90
Laminas Project laminas-http <2.14.2 - Code Injection
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
CWE-502 Jan 04, 2021
CVE-2021-40617 9.8 CRITICAL 2 PoCs Analysis EPSS 0.05
openSIS CE <8.0 - SQL Injection
An SQL Injection vulnerability exists in openSIS Community Edition version 8.0 via ForgotPassUserName.php.
CWE-89 Oct 11, 2021
CVE-2021-30181 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
Apache Dubbo <2.6.9-2.7.9 - RCE
Apache Dubbo prior to 2.6.9 and 2.7.9 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by the script which by default may enable executing arbitrary code.
Jun 01, 2021