Vulnerabilities Exploited in the Wild with Public PoC
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2021-1498
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78
May 06, 2021
CVE-2021-1497
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - OS Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78
May 06, 2021
CVE-2021-21224
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.47
Google Chrome <90.0.4430.85 - RCE
Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
CWE-843
Apr 26, 2021
CVE-2021-21220
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.93
Google Chrome <89.0.4389.128 - Heap Corruption
Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-787
Apr 26, 2021
CVE-2021-22205
10.0
CRITICAL
KEV
RANSOMWARE
34 PoCs
Analysis
NUCLEI
EPSS 0.94
Gitlab < 13.8.8 - Code Injection
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
CWE-94
Apr 23, 2021
CVE-2021-22893
10.0
CRITICAL
KEV
RANSOMWARE
12 PoCs
Analysis
EPSS 0.94
Pulse Connect Secure >=9.0R3/9.1R1 - Auth Bypass
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
CWE-287
Apr 23, 2021
CVE-2021-28310
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.54
Win32k - Privilege Escalation
Win32k Elevation of Privilege Vulnerability
CWE-787
Apr 13, 2021
CVE-2021-20021
9.8
CRITICAL
KEV
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.92
Sonicwall Email Security < 10.0.9.6103 - Improper Privilege Management
A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.
CWE-269
Apr 09, 2021
CVE-2021-1782
7.0
HIGH
KEV
3 PoCs
Analysis
EPSS 0.06
Apple Ipados < 14.4 - Improper Locking
A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited..
CWE-667
Apr 02, 2021
CVE-2021-22986
9.8
CRITICAL
KEV
RANSOMWARE
22 PoCs
Analysis
NUCLEI
EPSS 0.94
F5 iControl REST Unauthenticated SSRF Token Generation RCE
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
CWE-918
Mar 31, 2021
CVE-2021-21193
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.21
Google Chrome <89.0.4389.90 - Use After Free
Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-416
Mar 16, 2021
CVE-2021-26411
8.8
HIGH
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.92
Microsoft Edge - Use After Free
Internet Explorer Memory Corruption Vulnerability
CWE-416
Mar 11, 2021
CVE-2021-27065
7.8
HIGH
KEV
RANSOMWARE
10 PoCs
Analysis
EPSS 0.94
Microsoft Exchange Server - Path Traversal
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-22
Mar 03, 2021
CVE-2021-26857
7.8
HIGH
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.45
Microsoft Exchange Server - Insecure Deserialization
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502
Mar 03, 2021
CVE-2021-26855
9.1
CRITICAL
KEV
RANSOMWARE
67 PoCs
Analysis
NUCLEI
EPSS 0.94
Microsoft Exchange ProxyLogon RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-918
Mar 03, 2021
CVE-2021-1732
7.8
HIGH
KEV
RANSOMWARE
19 PoCs
Analysis
EPSS 0.89
Microsoft Windows 10 1803 - Out-of-Bounds Write
Windows Win32k Elevation of Privilege Vulnerability
CWE-787
Feb 25, 2021
CVE-2021-21972
9.8
CRITICAL
KEV
RANSOMWARE
34 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Cloud Foundation < 3.10.1.2 - Path Traversal
The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CWE-22
Feb 24, 2021
CVE-2021-21017
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.90
Adobe Acrobat < 17.011.30188 - Out-of-Bounds Write
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-122
Feb 11, 2021
CVE-2021-21148
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.25
Google Chrome <88.0.4324.150 - Buffer Overflow
Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-787
Feb 09, 2021
CVE-2021-22502
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Micro Focus Operation Bridge Reporter <10.40 - RCE
Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server.
CWE-78
Feb 08, 2021