Vulnerabilities Exploited in the Wild with Public PoC
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2021-36749
6.5
MEDIUM
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Druid < 0.22.0 - Incorrect Authorization
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
CWE-863
Sep 24, 2021
CVE-2021-4039
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.61
Zyxel NWA-1100-NH - Command Injection
A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH firmware could allow an attacker to execute arbitrary OS commands on the device.
CWE-78
Mar 01, 2022
CVE-2021-36356
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
KRAMER VIAware - RCE
KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.
CWE-434
Aug 31, 2021
CVE-2021-35064
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
KramerAV VIAWare - Privilege Escalation
KramerAV VIAWare, all tested versions, allow privilege escalation through misconfiguration of sudo. Sudoers permits running of multiple dangerous commands, including unzip, systemctl and dpkg.
CWE-269
Jul 12, 2021
CVE-2021-30883
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.00
Apple <15.0.2-14.8.1 - Memory Corruption
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
CWE-787
Aug 24, 2021
CVE-2021-31805
9.8
CRITICAL
EXPLOITED
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Struts < 2.5.29 - Remote Code Execution
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
CWE-917
Apr 12, 2022
CVE-2021-4104
7.5
HIGH
EXPLOITED
3 PoCs
Analysis
EPSS 0.72
Apache Log4j < 12.0.0.4.0 - Insecure Deserialization
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CWE-502
Dec 14, 2021
CVE-2021-22600
6.6
MEDIUM
KEV
3 PoCs
Analysis
EPSS 0.00
Linux Kernel - Privilege Escalation
A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
CWE-415
Jan 26, 2022
CVE-2021-42287
7.5
HIGH
KEV
RANSOMWARE
9 PoCs
Analysis
EPSS 0.94
Active Directory Domain Services - Privilege Escalation
Active Directory Domain Services Elevation of Privilege Vulnerability
Nov 10, 2021
CVE-2021-42278
7.5
HIGH
KEV
RANSOMWARE
8 PoCs
Analysis
EPSS 0.94
Active Directory Domain Services - Privilege Escalation
Active Directory Domain Services Elevation of Privilege Vulnerability
Nov 10, 2021
CVE-2021-31166
9.8
CRITICAL
KEV
RANSOMWARE
20 PoCs
Analysis
EPSS 0.93
Windows IIS HTTP Protocol Stack DOS
HTTP Protocol Stack Remote Code Execution Vulnerability
CWE-416
May 11, 2021
CVE-2021-3156
7.8
HIGH
KEV
102 PoCs
Analysis
NUCLEI
EPSS 0.93
Sudo Heap-Based Buffer Overflow
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
CWE-193
Jan 26, 2021
CVE-2021-4045
9.8
CRITICAL
EXPLOITED
7 PoCs
Analysis
EPSS 0.91
TP-Link Tapo C200 <1.1.15 - RCE
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
CWE-77
Mar 10, 2022
CVE-2021-21551
8.8
HIGH
KEV
16 PoCs
Analysis
EPSS 0.67
Dell Dbutil < 2.3 - Denial of Service
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
CWE-782
May 04, 2021
CVE-2021-34486
7.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.36
Microsoft Windows 10 1809 < 10.0.17763.2114 - Use After Free
Windows Event Tracing Elevation of Privilege Vulnerability
CWE-416
Aug 12, 2021
CVE-2021-20028
9.8
CRITICAL
KEV
RANSOMWARE
1 PoC
EPSS 0.79
Sonicwall Sma 210 Firmware < 9.0.0.10-28sv - SQL Injection
Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier
CWE-89
Aug 04, 2021
CVE-2021-26085
5.3
MEDIUM
KEV
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Confluence Server <7.4.10, >7.5.0-7.12.2 - Info Disclosure
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
CWE-425
Aug 03, 2021
CVE-2021-42237
9.8
CRITICAL
KEV
RANSOMWARE
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Sitecore Experience Platform - Insecure Deserialization
Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.
CWE-502
Nov 05, 2021
CVE-2021-22941
9.8
CRITICAL
KEV
RANSOMWARE
3 PoCs
Analysis
EPSS 0.88
Citrix ShareFile <5.11.20 - Info Disclosure
Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller.
CWE-284
Sep 23, 2021
CVE-2021-21973
5.3
MEDIUM
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.90
Vmware Cloud Foundation < 3.10.1.2 - SSRF
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CWE-918
Feb 24, 2021