Vulnerabilities Exploited in the Wild with Public PoC

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
2,391 results Clear all
CVE-2021-1498 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78 May 06, 2021
CVE-2021-1497 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - OS Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78 May 06, 2021
CVE-2021-21224 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.47
Google Chrome <90.0.4430.85 - RCE
Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
CWE-843 Apr 26, 2021
CVE-2021-21220 8.8 HIGH KEV 4 PoCs Analysis EPSS 0.93
Google Chrome <89.0.4389.128 - Heap Corruption
Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-787 Apr 26, 2021
CVE-2021-22205 10.0 CRITICAL KEV RANSOMWARE 34 PoCs Analysis NUCLEI EPSS 0.94
Gitlab < 13.8.8 - Code Injection
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
CWE-94 Apr 23, 2021
CVE-2021-22893 10.0 CRITICAL KEV RANSOMWARE 12 PoCs Analysis EPSS 0.94
Pulse Connect Secure >=9.0R3/9.1R1 - Auth Bypass
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
CWE-287 Apr 23, 2021
CVE-2021-28310 7.8 HIGH KEV 1 PoC Analysis EPSS 0.54
Win32k - Privilege Escalation
Win32k Elevation of Privilege Vulnerability
CWE-787 Apr 13, 2021
CVE-2021-20021 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.92
Sonicwall Email Security < 10.0.9.6103 - Improper Privilege Management
A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.
CWE-269 Apr 09, 2021
CVE-2021-1782 7.0 HIGH KEV 3 PoCs Analysis EPSS 0.06
Apple Ipados < 14.4 - Improper Locking
A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited..
CWE-667 Apr 02, 2021
CVE-2021-22986 9.8 CRITICAL KEV RANSOMWARE 22 PoCs Analysis NUCLEI EPSS 0.94
F5 iControl REST Unauthenticated SSRF Token Generation RCE
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
CWE-918 Mar 31, 2021
CVE-2021-21193 8.8 HIGH KEV 1 PoC Analysis EPSS 0.21
Google Chrome <89.0.4389.90 - Use After Free
Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-416 Mar 16, 2021
CVE-2021-26411 8.8 HIGH KEV RANSOMWARE 1 PoC Analysis EPSS 0.92
Microsoft Edge - Use After Free
Internet Explorer Memory Corruption Vulnerability
CWE-416 Mar 11, 2021
CVE-2021-27065 7.8 HIGH KEV RANSOMWARE 10 PoCs Analysis EPSS 0.94
Microsoft Exchange Server - Path Traversal
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-22 Mar 03, 2021
CVE-2021-26857 7.8 HIGH KEV RANSOMWARE 1 PoC Analysis EPSS 0.45
Microsoft Exchange Server - Insecure Deserialization
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502 Mar 03, 2021
CVE-2021-26855 9.1 CRITICAL KEV RANSOMWARE 67 PoCs Analysis NUCLEI EPSS 0.94
Microsoft Exchange ProxyLogon RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-918 Mar 03, 2021
CVE-2021-1732 7.8 HIGH KEV RANSOMWARE 19 PoCs Analysis EPSS 0.89
Microsoft Windows 10 1803 - Out-of-Bounds Write
Windows Win32k Elevation of Privilege Vulnerability
CWE-787 Feb 25, 2021
CVE-2021-21972 9.8 CRITICAL KEV RANSOMWARE 34 PoCs Analysis NUCLEI EPSS 0.94
Vmware Cloud Foundation < 3.10.1.2 - Path Traversal
The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CWE-22 Feb 24, 2021
CVE-2021-21017 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.90
Adobe Acrobat < 17.011.30188 - Out-of-Bounds Write
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-122 Feb 11, 2021
CVE-2021-21148 8.8 HIGH KEV 1 PoC Analysis EPSS 0.25
Google Chrome <88.0.4324.150 - Buffer Overflow
Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-787 Feb 09, 2021
CVE-2021-22502 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Micro Focus Operation Bridge Reporter <10.40 - RCE
Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server.
CWE-78 Feb 08, 2021