Vulnerabilities Exploited in the Wild with Public PoC

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
2,391 results Clear all
CVE-2021-1647 7.8 HIGH KEV 1 PoC Analysis EPSS 0.77
Microsoft Windows Defender - Remote Code Execution
Microsoft Defender Remote Code Execution Vulnerability
Jan 12, 2021
CVE-2021-24647 8.1 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Genetechsolutions Pie Register < 3.7.1.6 - Authentication Bypass
The Registration Forms – User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.1.7.6 has a flaw in the social login implementation, allowing unauthenticated attacker to login as any user on the site by only knowing their user ID or username
CWE-287 Nov 08, 2021
CVE-2021-21983 6.5 MEDIUM EXPLOITED 3 PoCs Analysis EPSS 0.83
vRealize Operations Manager <8.4 - Privilege Escalation
Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.
Mar 31, 2021
CVE-2021-29003 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.36
Genexis Platinum 4410 Firmware - OS Command Injection
Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.
CWE-78 Apr 13, 2021
CVE-2021-33544 7.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Multiple Camera Devices - Command Injection
Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.
CWE-78 Sep 13, 2021
CVE-2021-4380 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.80
Pinterest Automatic <1.14.3 - Auth Bypass
The Pinterest Automatic plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the 'wp_pinterest_automatic_parse_request' function and the 'process_form.php' script in versions up to, and including, 1.14.3. This makes it possible for unauthenticated attackers to update arbitrary options on a site that can be used to create new administrative user accounts or redirect unsuspecting site visitors.
CWE-284 Jun 07, 2023
CVE-2021-4374 9.1 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.75
WordPress Automatic <3.53.2 - Info Disclosure
The WordPress Automatic Plugin for WordPress is vulnerable to arbitrary options updates in versions up to, and including, 3.53.2. This is due to missing authorization and option validation in the process_form.php file. This makes it possible for unauthenticated attackers to arbitrarily update the settings of a vulnerable site and ultimately compromise the entire site.
CWE-862 Jun 07, 2023
CVE-2021-32305 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Websvn < 2.6.1 - OS Command Injection
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
CWE-78 May 18, 2021
CVE-2021-28482 8.8 HIGH EXPLOITED RANSOMWARE 2 PoCs Analysis EPSS 0.72
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Apr 13, 2021
CVE-2021-32789 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.91
WooCommerce Gutenberg Blocks <2.5.16 - SQL Injection
woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.
CWE-89 Jul 26, 2021
CVE-2021-46850 7.2 HIGH EXPLOITED 1 PoC Analysis EPSS 0.12
myVesta Control Panel <0.9.8-26-43 - Command Injection
myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel before 0.9.8-26 are vulnerable to command injection. An authenticated and remote administrative user can execute arbitrary commands via the v_sftp_license parameter when sending HTTP POST requests to the /edit/server endpoint.
CWE-88 Oct 24, 2022
CVE-2021-27905 9.8 CRITICAL 5 PoCs Analysis NUCLEI EPSS 0.94
Apache Solr - SSRF
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
CWE-918 Apr 13, 2021
CVE-2021-3122 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
NCR Command Center Agent - OS Command Injection
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
CWE-78 Feb 07, 2021
CVE-2021-3007 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.90
Laminas Project laminas-http <2.14.2 - Code Injection
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
CWE-502 Jan 04, 2021
CVE-2020-9715 7.8 HIGH KEV 3 PoCs Analysis EPSS 0.74
Adobe Acrobat DC < 15.006.30523 - Use After Free
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
CWE-416 Aug 19, 2020
CVE-2020-13851 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Pandora FMS Events Remote Command Execution
Artica Pandora FMS 7.44 allows remote command execution via the events feature.
CWE-78 Jun 11, 2020
CVE-2020-9374 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.87
Tp-link Tl-wr849n Firmware - OS Command Injection
On TP-Link TL-WR849N 0.9.1 4.16 devices, a remote command execution vulnerability in the diagnostics area can be exploited when an attacker sends specific shell metacharacters to the panel's traceroute feature.
CWE-78 Feb 24, 2020
CVE-2020-37123 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.17
Pinger 1.0 - RCE
Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters.
CWE-78 Feb 05, 2026
CVE-2020-24219 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.25
URayTech IPTV/H.264/H.265 <1.97 - Path Traversal
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device's file system, including the configuration file with the cleartext administrative password.
CWE-22 Oct 06, 2020
CVE-2020-16040 6.5 MEDIUM EXPLOITED 3 PoCs Analysis EPSS 0.75
Google Chrome versions before 87.0.4280.88 integer overflow during SimplfiedLowering phase
Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-190 Jan 08, 2021