Critical Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,105 results
Clear all
CVE-2022-36944
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.65
Scala < 2.13.9 - Insecure Deserialization
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
CWE-502
Sep 23, 2022
CVE-2022-21306
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.37
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jan 19, 2022
CVE-2022-45047
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.06
Apache Sshd < 2.9.1 - Insecure Deserialization
Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.
CWE-502
Nov 16, 2022
CVE-2022-4939
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.20
Wclovers Wcfm Membership < 2.10.1 - Privilege Escalation
THe WCFM Membership plugin for WordPress is vulnerable to privilege escalation in versions up to, and including 2.10.0, due to a missing capability check on the wp_ajax_nopriv_wcfm_ajax_controller AJAX action that controls membership settings. This makes it possible for unauthenticated attackers to modify the membership registration form in a way that allows them to set the role for registration to that of any user including administrators. Once configured, the attacker can then register as an administrator.
CWE-862
Apr 05, 2023
CVE-2022-34128
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.33
The Cartography <6.0.1 - RCE
The Cartography (aka positions) plugin before 6.0.1 for GLPI allows remote code execution via PHP code in the POST data to front/upload.php.
CWE-434
Apr 16, 2023
CVE-2022-31161
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.73
Roxy-WI <6.1.1.0 - Command Injection
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 contains a patch for this issue.
CWE-434
Jul 15, 2022
CVE-2022-31126
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Roxy-wi <6.1.1.0 - RCE
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to code execution by sending a specially crafted HTTP request to /app/options.py file. This affects Roxy-wi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-74
Jul 06, 2022
CVE-2022-31125
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.18
Roxy-wi <6.1.1.0 - Auth Bypass
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to bypass authentication and access admin functionality by sending a specially crafted HTTP request. This affects Roxywi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-287
Jul 06, 2022
CVE-2022-31056
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
GLPI <10.0.2 - SQL Injection
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.
CWE-89
Jun 28, 2022
CVE-2022-2884
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.68
GitLab CE/EE <15.1.5-15.3.1 - Authenticated RCE
A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint
CWE-78
Oct 17, 2022
CVE-2022-45297
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
EQ < 2.2.0 - SQL Injection
EQ v1.5.31 to v2.2.0 was discovered to contain a SQL injection vulnerability via the UserPwd parameter.
CWE-89
Jan 31, 2023
CVE-2022-46836
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.02
Tribe29's Checkmk <2.1.0p10-<2.0.0p27-<1.6.0p29 - Code Injection
PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.
CWE-94
Feb 20, 2023
CVE-2022-38580
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.49
Zalando Skipper <0.13.236 - SSRF
Zalando Skipper v0.13.236 is vulnerable to Server-Side Request Forgery (SSRF).
CWE-918
Oct 25, 2022
CVE-2022-24082
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.46
Pega Platform - Code Injection
If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.
CWE-502
Jul 19, 2022
CVE-2022-32272
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.21
Opswat Metadefender < 5.1.2 - Improper Privilege Management
OPSWAT MetaDefender Core before 5.1.2, MetaDefender ICAP before 4.12.1, and MetaDefender Email Gateway Security before 5.6.1 have incorrect access control, resulting in privilege escalation.
CWE-269
Jun 09, 2022
CVE-2022-24491
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.38
Windows Network File System < - RCE
Windows Network File System Remote Code Execution Vulnerability
Apr 15, 2022
CVE-2022-37109
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Camp < 2022-07-21 - Insufficiently Protected Credentials
patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie.
CWE-522
Nov 14, 2022
CVE-2022-34668
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.22
Nvidia Nvflare < 2.1.4 - Insecure Deserialization
NVFLARE, versions prior to 2.1.4, contains a vulnerability that deserialization of Untrusted Data due to Pickle usage may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
CWE-502
Aug 29, 2022
CVE-2022-35583
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.59
Wkhtmltopdf - SSRF
wkhtmlTOpdf 0.12.6 is vulnerable to SSRF which allows an attacker to get initial access into the target's system by injecting iframe tag with initial asset IP address on it's source. This allows the attacker to takeover the whole infrastructure by accessing their internal assets.
CWE-918
Aug 22, 2022
CVE-2022-50893
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
VIAVIWEB Wallpaper Admin 1.0 - RCE
VIAVIWEB Wallpaper Admin 1.0 contains an unauthenticated remote code execution vulnerability in the image upload functionality. Attackers can upload a malicious PHP file through the add_gallery_image.php endpoint to execute arbitrary code on the server.
CWE-434
Jan 13, 2026