Vulnerabilities Exploited in the Wild with Public PoC
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2022-0441
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.81
MasterStudy LMS <2.7.6 - Info Disclosure
The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some parameters given when registering a new account, allowing unauthenticated users to register as an admin
CWE-269
Mar 07, 2022
CVE-2022-22972
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Identity Manager - Authentication Bypass
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.
May 20, 2022
CVE-2021-22054
7.5
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Vmware Workspace One Uem Console < 20.0.8.36 - SSRF
VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.
CWE-918
Dec 17, 2021
CVE-2021-47795
6.2
MEDIUM
EXPLOITED
1 PoC
Analysis
EPSS 0.00
GeoVision GeoWebServer 5.3.3 - RCE
GeoVision GeoWebServer 5.3.3 contains multiple vulnerabilities including local file inclusion, cross-site scripting, and remote code execution through improper input sanitization. Attackers can exploit the WebStrings.srf endpoint by manipulating path traversal and injection parameters to access system files and execute malicious scripts.
CWE-22
Jan 16, 2026
CVE-2021-25281
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
SaltStack Salt <3002.5 - RCE
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
CWE-287
Feb 27, 2021
CVE-2021-26828
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.80
Scadabr < 0.9.1 - Unrestricted File Upload
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
CWE-434
Jun 11, 2021
CVE-2021-4462
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.19
Skittles Employee Records System - Unrestricted File Upload
Employee Records System version 1.0 contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload arbitrary files via the uploadID.php endpoint; uploaded files can be executed because the application does not perform proper server-side validation. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
CWE-434
Nov 10, 2025
CVE-2021-43798
7.5
HIGH
KEV
58 PoCs
Analysis
NUCLEI
EPSS 0.94
Grafana Plugin Path Traversal
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
CWE-22
Dec 07, 2021
CVE-2021-43226
7.8
HIGH
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.08
Windows Common Log File System Driver - Privilege Escalation
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Dec 15, 2021
CVE-2021-22555
8.3
HIGH
KEV
18 PoCs
Analysis
EPSS 0.85
Netfilter x_tables Heap OOB Write Privilege Escalation
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
CWE-787
Jul 07, 2021
CVE-2021-21311
7.2
HIGH
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Adminer < 4.7.9 - SSRF
Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
CWE-918
Feb 11, 2021
CVE-2021-40875
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.81
Gurock TestRail <7.2.0.3014 - Info Disclosure
Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.
CWE-425
Sep 22, 2021
CVE-2021-31728
7.8
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.22
MalwareFox AntiMalware <2.74.0.150 - Privilege Escalation
Incorrect access control in zam64.sys, zam32.sys in MalwareFox AntiMalware 2.74.0.150 allows a non-privileged process to open a handle to \.\ZemanaAntiMalware, register itself with the driver by sending IOCTL 0x80002010, allocate executable memory using a flaw in IOCTL 0x80002040, install a hook with IOCTL 0x80002044 and execute the executable memory using this hook with IOCTL 0x80002014 or 0x80002018, this exposes ring 0 code execution in the context of the driver allowing the non-privileged process to elevate privileges.
May 17, 2021
CVE-2021-39312
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Trueranker True Ranker < 2.2.2 - Path Traversal
The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
CWE-22
Dec 14, 2021
CVE-2021-26294
7.5
HIGH
EXPLOITED
1 PoC
1 Writeup
NUCLEI
EPSS 0.92
Afterlogic Aurora < 7.7.9 - Path Traversal
An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).
CWE-22
Mar 07, 2021
CVE-2021-22873
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.46
Revive Adserver <5.1.0 - Open Redirect
Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.
CWE-601
Jan 26, 2021
CVE-2021-41277
10.0
CRITICAL
KEV
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Metabase - Local File Inclusion
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
CWE-22
Nov 17, 2021
CVE-2021-26086
5.3
MEDIUM
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Jira Data Center < 8.5.14 - Path Traversal
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
CWE-22
Aug 16, 2021
CVE-2021-32172
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.65
Maianscriptworld Maian Cart - Missing Authorization
Maian Cart v3.8 contains a preauthorization remote code execution (RCE) exploit via a broken access control issue in the Elfinder plugin.
CWE-862
Oct 07, 2021
CVE-2021-23394
8.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.77
Std42 Elfinder < 2.1.58 - Unrestricted File Upload
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CWE-434
Jun 13, 2021