Vulnerabilities Exploited in the Wild with Public PoC

Updated 21m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
2,391 results Clear all
CVE-2021-30657 5.5 MEDIUM KEV 2 PoCs Analysis EPSS 0.83
macOS Gatekeeper check bypass
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, Security Update 2021-002 Catalina. A malicious application may bypass Gatekeeper checks. Apple is aware of a report that this issue may have been actively exploited..
CWE-862 Sep 08, 2021
CVE-2021-40539 9.8 CRITICAL KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
ManageEngine ADSelfService Plus CVE-2021-40539
Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
CWE-706 Sep 07, 2021
CVE-2021-26084 9.8 CRITICAL KEV RANSOMWARE 41 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Confluence Server and Data Center - OGNL Injection
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
CWE-917 Aug 30, 2021
CVE-2021-30860 7.8 HIGH KEV 2 PoCs Analysis EPSS 0.71
Apple iOS/iPadOS/macOS - Integer Overflow in PDF Processing
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-190 Aug 24, 2021
CVE-2021-30858 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.01
iOS <14.8-iPadOS <14.8-macOS Big Sur <11.6 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-416 Aug 24, 2021
CVE-2021-36942 7.5 HIGH KEV RANSOMWARE 2 PoCs Analysis EPSS 0.94
Windows LSA - Privilege Escalation
Windows LSA Spoofing Vulnerability
Aug 12, 2021
CVE-2021-35464 9.8 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
ForgeRock AM <7.0 - Code Injection
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
CWE-502 Jul 22, 2021
CVE-2021-35211 9.0 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
SolarWinds Serv-U <15.2.3 HF2 - RCE
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
CWE-787 Jul 14, 2021
CVE-2021-34523 9.0 CRITICAL KEV RANSOMWARE 9 PoCs Analysis EPSS 0.94
Microsoft Exchange Server - Privilege Escalation
Microsoft Exchange Server Elevation of Privilege Vulnerability
Jul 14, 2021
CVE-2021-34473 9.1 CRITICAL KEV RANSOMWARE 15 PoCs Analysis NUCLEI EPSS 0.94
Microsoft Exchange ProxyShell RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-918 Jul 14, 2021
CVE-2021-34527 8.8 HIGH KEV RANSOMWARE 31 PoCs Analysis EPSS 0.94
Microsoft Windows 10 1507 < 10.0.10240.18969 - Remote Code Execution
<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.</p> <p>In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (<strong>Note</strong>: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):</p> <ul> <li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint</li> <li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li> <li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li> </ul> <p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.</strong></p> <p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also <a href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7">KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates</a>.</p> <p>Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.</p>
Jul 02, 2021
CVE-2021-30551 8.8 HIGH KEV 1 PoC Analysis EPSS 0.78
Google Chrome <91.0.4472.101 - Heap Corruption
Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-843 Jun 15, 2021
CVE-2021-33739 8.4 HIGH KEV 6 PoCs Analysis EPSS 0.19
Microsoft DWM Core Library - Privilege Escalation
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Jun 08, 2021
CVE-2021-31956 7.8 HIGH KEV 5 PoCs Analysis EPSS 0.91
Microsoft Windows 10 1507 < 10.0.10240.18967 - Integer Underflow
Windows NTFS Elevation of Privilege Vulnerability
CWE-191 Jun 08, 2021
CVE-2021-31955 5.5 MEDIUM KEV 4 PoCs Analysis EPSS 0.05
Microsoft Windows 10 1809 < 10.0.17763.1999 - Information Disclosure
Windows Kernel Information Disclosure Vulnerability
CWE-497 Jun 08, 2021
CVE-2021-1675 7.8 HIGH KEV RANSOMWARE 63 PoCs Analysis EPSS 0.94
Microsoft Windows 10 1507 < 10.0.10240.18967 - Remote Code Execution
Windows Print Spooler Remote Code Execution Vulnerability
Jun 08, 2021
CVE-2021-21985 9.8 CRITICAL KEV RANSOMWARE 14 PoCs Analysis NUCLEI EPSS 0.94
Vmware Vcenter Server < 3.10.2.1 - SSRF
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
CWE-470 May 26, 2021
CVE-2021-31207 6.6 MEDIUM KEV RANSOMWARE 7 PoCs Analysis EPSS 0.94
Microsoft Exchange Server - Unrestricted File Upload
Microsoft Exchange Server Security Feature Bypass Vulnerability
CWE-434 May 11, 2021
CVE-2021-28663 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.03
ARM Bifrost Gpu Kernel Driver < r29p0 - Use After Free
The Arm Mali GPU kernel driver allows privilege escalation or information disclosure because GPU memory operations are mishandled, leading to a use-after-free. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0.
CWE-416 May 10, 2021
CVE-2021-1905 8.4 HIGH KEV 1 PoC EPSS 0.01
Qualcomm Apq8009 Firmware - Use After Free
Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE-416 May 07, 2021