Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,105 results Clear all
CVE-2022-28452 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Red Planet Laundry Management System 1.0 - SQL Injection
Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection.
CWE-89 Apr 29, 2022
CVE-2022-35411 9.8 CRITICAL 5 PoCs Analysis EPSS 0.71
Rpc.py < 0.6.0 - Insufficiently Protected Credentials
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
CWE-522 Jul 08, 2022
CVE-2022-45299 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Webbrowser < 0.8.3 - Path Traversal
An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL.
CWE-22 Jan 13, 2023
CVE-2022-25226 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.82
ThinVNC 1.0b1 - Auth Bypass
ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.
Apr 18, 2022
CVE-2022-36934 9.8 CRITICAL 1 PoC Analysis EPSS 0.13
Whatsapp < 2.22.16.12 - Integer Overflow
An integer overflow in WhatsApp could result in remote code execution in an established video call.
CWE-190 Sep 22, 2022
CVE-2022-43110 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Voltronic Power ViewPower <1.04-21353 & PowerShield Netguard <1.04-...
Voltronic Power ViewPower through 1.04-21353 and PowerShield Netguard before 1.04-23292 allows a remote attacker to configure the system via an unspecified web interface. An unauthenticated remote attacker can make changes to the system including: changing the web interface admin password, view/change system configuration, enumerate connected UPS devices and shut down connected UPS devices. This extends to being able to configure operating system commands that should run if the system detects a connected UPS shutting down.
CWE-284 Aug 22, 2025
CVE-2022-31491 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
Voltronic Power ViewPower <1.04-24215, ViewPower Pro <2.0-22165, Po...
Voltronic Power ViewPower through 1.04-24215, ViewPower Pro through 2.0-22165, and PowerShield Netguard before 1.04-23292 allows a remote attacker to run arbitrary code via an unspecified web interface related to detection of a managed UPS shutting down. An unauthenticated attacker can use this to run arbitrary code immediately regardless of any managed UPS state or presence.
CWE-749 Aug 22, 2025
CVE-2022-21907 9.8 CRITICAL EXPLOITED 19 PoCs Analysis EPSS 0.92
HTTP Protocol Stack - RCE
HTTP Protocol Stack Remote Code Execution Vulnerability
Jan 11, 2022
CVE-2022-2025 9.8 CRITICAL 1 PoC Analysis EPSS 0.11
Grandstream Gds3710 Firmware - Out-of-Bounds Write
an attacker with knowledge of user/pass of Grandstream GSD3710 in its 1.0.11.13 version, could overflow the stack since it doesn't check the param length before use the strcopy instruction. The explotation of this vulnerability may lead an attacker to execute a shell with full access.
CWE-121 Sep 23, 2022
CVE-2022-2070 9.8 CRITICAL 1 PoC Analysis EPSS 0.09
Grandstream Gds3710 Firmware - Out-of-Bounds Write
In Grandstream GSD3710 in its 1.0.11.13 version, it's possible to overflow the stack since it doesn't check the param length before using the sscanf instruction. Because of that, an attacker could create a socket and connect with a remote IP:port by opening a shell and getting full access to the system. The exploit affects daemons dbmng and logsrv that are running on ports 8000 and 8001 by default.
CWE-121 Sep 23, 2022
CVE-2022-22817 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Pillow <9.0.0 - Code Injection
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
Jan 10, 2022
CVE-2022-46945 9.1 CRITICAL 1 PoC Analysis EPSS 0.01
Nagvis <1.9.34 - Info Disclosure
Nagvis before 1.9.34 was discovered to contain an arbitrary file read vulnerability via the component /core/classes/NagVisHoverUrl.php.
CWE-22 May 26, 2023
CVE-2022-45460 9.8 CRITICAL 1 PoC Analysis EPSS 0.55
Xiongmaitech Nbd6808t-pl Firmware - Out-of-Bounds Write
Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow an unauthenticated and remote user to exploit a stack-based buffer overflow and crash the web server, resulting in a system reboot. An unauthenticated and remote attacker can execute arbitrary code by sending a crafted HTTP request that triggers the overflow condition via a long URI passed to a sprintf call. NOTE: this is different than CVE-2018-10088, but this may overlap CVE-2017-16725.
CWE-787 Mar 28, 2023
CVE-2022-24086 9.8 CRITICAL KEV 10 PoCs Analysis NUCLEI EPSS 0.94
Adobe Commerce <2.4.3-p1, <2.3.7-p2 - RCE
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.
CWE-20 Feb 16, 2022
CVE-2022-24816 10.0 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Geosolutionsgroup Jai-ext < 1.1.22 - Code Injection
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
CWE-94 Apr 13, 2022
CVE-2022-41924 9.6 CRITICAL 1 PoC Analysis EPSS 0.53
Tailscale < 1.32.3 - CSRF
A vulnerability identified in the Tailscale Windows client allows a malicious website to reconfigure the Tailscale daemon `tailscaled`, which can then be used to remotely execute code. In the Tailscale Windows client, the local API was bound to a local TCP socket, and communicated with the Windows client GUI in cleartext with no Host header verification. This allowed an attacker-controlled website visited by the node to rebind DNS to an attacker-controlled DNS server, and then make local API requests in the client, including changing the coordination server to an attacker-controlled coordination server. An attacker-controlled coordination server can send malicious URL responses to the client, including pushing executables or installing an SMB share. These allow the attacker to remotely execute code on the node. All Windows clients prior to version v.1.32.3 are affected. If you are running Tailscale on Windows, upgrade to v1.32.3 or later to remediate the issue.
CWE-346 Nov 23, 2022
CVE-2022-20120 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Android kernel - Info Disclosure
Product: AndroidVersions: Android kernelAndroid ID: A-203213034References: N/A
May 10, 2022
CVE-2022-24693 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Baicells Nova436Q & Neutrino 430 - Info Disclosure
Baicells Nova436Q and Neutrino 430 devices with firmware through QRTB 2.7.8 have hardcoded credentials that are easily discovered, and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
CWE-798 Mar 30, 2022
CVE-2022-48565 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Python < 3.6.13 - XXE
An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.
CWE-611 Aug 22, 2023
CVE-2022-26937 9.8 CRITICAL 3 PoCs Analysis EPSS 0.66
Windows Network File System < - RCE
Windows Network File System Remote Code Execution Vulnerability
May 10, 2022