Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2022-0441 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.81
MasterStudy LMS <2.7.6 - Info Disclosure
The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some parameters given when registering a new account, allowing unauthenticated users to register as an admin
CWE-269 Mar 07, 2022
CVE-2022-22972 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
Vmware Identity Manager - Authentication Bypass
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.
May 20, 2022
CVE-2021-22054 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
Vmware Workspace One Uem Console < 20.0.8.36 - SSRF
VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.
CWE-918 Dec 17, 2021
CVE-2021-47795 6.2 MEDIUM EXPLOITED 1 PoC Analysis EPSS 0.00
GeoVision GeoWebServer 5.3.3 - RCE
GeoVision GeoWebServer 5.3.3 contains multiple vulnerabilities including local file inclusion, cross-site scripting, and remote code execution through improper input sanitization. Attackers can exploit the WebStrings.srf endpoint by manipulating path traversal and injection parameters to access system files and execute malicious scripts.
CWE-22 Jan 16, 2026
CVE-2021-25281 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
SaltStack Salt <3002.5 - RCE
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
CWE-287 Feb 27, 2021
CVE-2021-26828 8.8 HIGH KEV 4 PoCs Analysis EPSS 0.80
Scadabr < 0.9.1 - Unrestricted File Upload
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
CWE-434 Jun 11, 2021
CVE-2021-4462 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.19
Skittles Employee Records System - Unrestricted File Upload
Employee Records System version 1.0 contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload arbitrary files via the uploadID.php endpoint; uploaded files can be executed because the application does not perform proper server-side validation. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
CWE-434 Nov 10, 2025
CVE-2021-43798 7.5 HIGH KEV 58 PoCs Analysis NUCLEI EPSS 0.94
Grafana Plugin Path Traversal
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
CWE-22 Dec 07, 2021
CVE-2021-43226 7.8 HIGH KEV RANSOMWARE 1 PoC Analysis EPSS 0.08
Windows Common Log File System Driver - Privilege Escalation
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Dec 15, 2021
CVE-2021-22555 8.3 HIGH KEV 18 PoCs Analysis EPSS 0.85
Netfilter x_tables Heap OOB Write Privilege Escalation
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
CWE-787 Jul 07, 2021
CVE-2021-21311 7.2 HIGH KEV 4 PoCs Analysis NUCLEI EPSS 0.94
Adminer < 4.7.9 - SSRF
Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
CWE-918 Feb 11, 2021
CVE-2021-40875 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.81
Gurock TestRail <7.2.0.3014 - Info Disclosure
Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.
CWE-425 Sep 22, 2021
CVE-2021-31728 7.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.22
MalwareFox AntiMalware <2.74.0.150 - Privilege Escalation
Incorrect access control in zam64.sys, zam32.sys in MalwareFox AntiMalware 2.74.0.150 allows a non-privileged process to open a handle to \.\ZemanaAntiMalware, register itself with the driver by sending IOCTL 0x80002010, allocate executable memory using a flaw in IOCTL 0x80002040, install a hook with IOCTL 0x80002044 and execute the executable memory using this hook with IOCTL 0x80002014 or 0x80002018, this exposes ring 0 code execution in the context of the driver allowing the non-privileged process to elevate privileges.
May 17, 2021
CVE-2021-39312 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Trueranker True Ranker < 2.2.2 - Path Traversal
The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
CWE-22 Dec 14, 2021
CVE-2021-26294 7.5 HIGH EXPLOITED 1 PoC 1 Writeup NUCLEI EPSS 0.92
Afterlogic Aurora < 7.7.9 - Path Traversal
An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).
CWE-22 Mar 07, 2021
CVE-2021-22873 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.46
Revive Adserver <5.1.0 - Open Redirect
Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.
CWE-601 Jan 26, 2021
CVE-2021-41277 10.0 CRITICAL KEV 10 PoCs Analysis NUCLEI EPSS 0.94
Metabase - Local File Inclusion
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
CWE-22 Nov 17, 2021
CVE-2021-26086 5.3 MEDIUM KEV 4 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Jira Data Center < 8.5.14 - Path Traversal
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
CWE-22 Aug 16, 2021
CVE-2021-32172 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.65
Maianscriptworld Maian Cart - Missing Authorization
Maian Cart v3.8 contains a preauthorization remote code execution (RCE) exploit via a broken access control issue in the Elfinder plugin.
CWE-862 Oct 07, 2021
CVE-2021-23394 8.1 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.77
Std42 Elfinder < 2.1.58 - Unrestricted File Upload
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CWE-434 Jun 13, 2021