Vulnerabilities Exploited in the Wild with Public PoC

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
2,391 results Clear all
CVE-2021-36749 6.5 MEDIUM EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.94
Apache Druid < 0.22.0 - Incorrect Authorization
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
CWE-863 Sep 24, 2021
CVE-2021-4039 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.61
Zyxel NWA-1100-NH - Command Injection
A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH firmware could allow an attacker to execute arbitrary OS commands on the device.
CWE-78 Mar 01, 2022
CVE-2021-36356 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
KRAMER VIAware - RCE
KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.
CWE-434 Aug 31, 2021
CVE-2021-35064 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
KramerAV VIAWare - Privilege Escalation
KramerAV VIAWare, all tested versions, allow privilege escalation through misconfiguration of sudo. Sudoers permits running of multiple dangerous commands, including unzip, systemctl and dpkg.
CWE-269 Jul 12, 2021
CVE-2021-30883 7.8 HIGH KEV 1 PoC Analysis EPSS 0.00
Apple <15.0.2-14.8.1 - Memory Corruption
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
CWE-787 Aug 24, 2021
CVE-2021-31805 9.8 CRITICAL EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts < 2.5.29 - Remote Code Execution
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
CWE-917 Apr 12, 2022
CVE-2021-4104 7.5 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.72
Apache Log4j < 12.0.0.4.0 - Insecure Deserialization
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CWE-502 Dec 14, 2021
CVE-2021-22600 6.6 MEDIUM KEV 3 PoCs Analysis EPSS 0.00
Linux Kernel - Privilege Escalation
A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
CWE-415 Jan 26, 2022
CVE-2021-42287 7.5 HIGH KEV RANSOMWARE 9 PoCs Analysis EPSS 0.94
Active Directory Domain Services - Privilege Escalation
Active Directory Domain Services Elevation of Privilege Vulnerability
Nov 10, 2021
CVE-2021-42278 7.5 HIGH KEV RANSOMWARE 8 PoCs Analysis EPSS 0.94
Active Directory Domain Services - Privilege Escalation
Active Directory Domain Services Elevation of Privilege Vulnerability
Nov 10, 2021
CVE-2021-31166 9.8 CRITICAL KEV RANSOMWARE 20 PoCs Analysis EPSS 0.93
Windows IIS HTTP Protocol Stack DOS
HTTP Protocol Stack Remote Code Execution Vulnerability
CWE-416 May 11, 2021
CVE-2021-3156 7.8 HIGH KEV 102 PoCs Analysis NUCLEI EPSS 0.93
Sudo Heap-Based Buffer Overflow
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
CWE-193 Jan 26, 2021
CVE-2021-4045 9.8 CRITICAL EXPLOITED 7 PoCs Analysis EPSS 0.91
TP-Link Tapo C200 <1.1.15 - RCE
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
CWE-77 Mar 10, 2022
CVE-2021-21551 8.8 HIGH KEV 16 PoCs Analysis EPSS 0.67
Dell Dbutil < 2.3 - Denial of Service
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
CWE-782 May 04, 2021
CVE-2021-34486 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.36
Microsoft Windows 10 1809 < 10.0.17763.2114 - Use After Free
Windows Event Tracing Elevation of Privilege Vulnerability
CWE-416 Aug 12, 2021
CVE-2021-20028 9.8 CRITICAL KEV RANSOMWARE 1 PoC EPSS 0.79
Sonicwall Sma 210 Firmware < 9.0.0.10-28sv - SQL Injection
Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier
CWE-89 Aug 04, 2021
CVE-2021-26085 5.3 MEDIUM KEV RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Confluence Server <7.4.10, >7.5.0-7.12.2 - Info Disclosure
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
CWE-425 Aug 03, 2021
CVE-2021-42237 9.8 CRITICAL KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Sitecore Experience Platform - Insecure Deserialization
Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.
CWE-502 Nov 05, 2021
CVE-2021-22941 9.8 CRITICAL KEV RANSOMWARE 3 PoCs Analysis EPSS 0.88
Citrix ShareFile <5.11.20 - Info Disclosure
Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller.
CWE-284 Sep 23, 2021
CVE-2021-21973 5.3 MEDIUM KEV 1 PoC Analysis NUCLEI EPSS 0.90
Vmware Cloud Foundation < 3.10.1.2 - SSRF
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CWE-918 Feb 24, 2021