Critical Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,105 results
Clear all
CVE-2022-37061
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Flir Ax8 Firmware < 1.46.16 - OS Command Injection
All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are vulnerable to Remote Command Injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges. NOTE: The vendor has stated that with the introduction of firmware version 1.49.16 (Jan 2023) the FLIR AX8 should no longer be affected by the vulnerability reported. Latest firmware version (as of Oct 2025, was released Jun 2024) is 1.55.16.
CWE-78
Aug 18, 2022
CVE-2022-24989
9.8
CRITICAL
EXPLOITED
RANSOMWARE
1 PoC
Analysis
EPSS 0.82
Terra-master Terramaster Operating System < 4.2.31 - Injection
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
CWE-74
Aug 20, 2023
CVE-2022-40022
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Symmetricom SyncServer Unauthenticated Remote Command Execution
Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability.
CWE-77
Feb 13, 2023
CVE-2022-37042
9.8
CRITICAL
KEV
RANSOMWARE
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Synacor Zimbra Collaboration Suite - Path Traversal
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
CWE-22
Aug 12, 2022
CVE-2022-36446
9.8
CRITICAL
5 PoCs
Analysis
NUCLEI
EPSS 0.93
Webmin <1.997 - XSS
software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.
CWE-116
Jul 25, 2022
CVE-2022-31137
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Roxy-WI <6.1.1.0 - RCE
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-78
Jul 08, 2022
CVE-2022-30525
9.8
CRITICAL
KEV
RANSOMWARE
17 PoCs
Analysis
NUCLEI
EPSS 0.94
Zyxel Firewall SUID Binary Privilege Escalation
A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
CWE-78
May 12, 2022
CVE-2022-22956
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.84
Vmware Identity Manager < 9.0 - Authentication Bypass
VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.
CWE-287
Apr 13, 2022
CVE-2022-20705
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.80
Cisco Rv340 Firmware < 1.0.03.24 - Out-of-Bounds Write
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
CWE-121
Feb 10, 2022
CVE-2022-29599
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Apache Maven maven-shared-utils <3.3.3 - Command Injection
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
CWE-116
May 23, 2022
CVE-2022-44136
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Zenario CMS <9.3.57186 - RCE
Zenario CMS 9.3.57186 is vulnerable to Remote Code Excution (RCE).
Nov 30, 2022
CVE-2022-4361
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Keycloak - XSS
Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.
CWE-81
Jul 07, 2023
CVE-2022-3782
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Redhat Keycloak < 20.0.2 - Path Traversal
keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.
CWE-22
Jan 13, 2023
CVE-2022-44900
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.33
Py7zr < 0.20.1 - Path Traversal
A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file.
CWE-22
Dec 06, 2022
CVE-2022-26711
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
tvOS <15.5 - Code Injection
An integer overflow issue was addressed with improved input validation. This issue is fixed in tvOS 15.5, iTunes 12.12.4 for Windows, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
CWE-190
May 26, 2022
CVE-2022-33171
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
TypeORM <0.3.0 - SQL Injection
The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id string leads to SQL injection. NOTE: the vendor's position is that the user's application is responsible for input validation
CWE-89
Jul 04, 2022
CVE-2022-31199
9.8
CRITICAL
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.06
Netwrix Auditor - RCE
Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
CWE-502
Nov 08, 2022
CVE-2022-44262
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.01
ff4j 1.8.1 - RCE
ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE).
CWE-94
Dec 01, 2022
CVE-2022-41544
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.64
GetSimple CMS <3.3.16 - RCE
GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.
CWE-94
Oct 18, 2022
CVE-2022-29622
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.24
Formidable < 3.2.4 - Unrestricted File Upload
An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability.
CWE-434
May 16, 2022