Critical Vulnerabilities with Public Exploits

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,105 results Clear all
CVE-2022-36944 9.8 CRITICAL 1 PoC Analysis EPSS 0.65
Scala < 2.13.9 - Insecure Deserialization
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
CWE-502 Sep 23, 2022
CVE-2022-21306 9.8 CRITICAL 1 PoC Analysis EPSS 0.37
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jan 19, 2022
CVE-2022-45047 9.8 CRITICAL 1 PoC Analysis EPSS 0.06
Apache Sshd < 2.9.1 - Insecure Deserialization
Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.
CWE-502 Nov 16, 2022
CVE-2022-4939 9.8 CRITICAL 1 PoC Analysis EPSS 0.20
Wclovers Wcfm Membership < 2.10.1 - Privilege Escalation
THe WCFM Membership plugin for WordPress is vulnerable to privilege escalation in versions up to, and including 2.10.0, due to a missing capability check on the wp_ajax_nopriv_wcfm_ajax_controller AJAX action that controls membership settings. This makes it possible for unauthenticated attackers to modify the membership registration form in a way that allows them to set the role for registration to that of any user including administrators. Once configured, the attacker can then register as an administrator.
CWE-862 Apr 05, 2023
CVE-2022-34128 9.8 CRITICAL 1 PoC Analysis EPSS 0.33
The Cartography <6.0.1 - RCE
The Cartography (aka positions) plugin before 6.0.1 for GLPI allows remote code execution via PHP code in the POST data to front/upload.php.
CWE-434 Apr 16, 2023
CVE-2022-31161 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.73
Roxy-WI <6.1.1.0 - Command Injection
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 contains a patch for this issue.
CWE-434 Jul 15, 2022
CVE-2022-31126 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Roxy-wi <6.1.1.0 - RCE
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to code execution by sending a specially crafted HTTP request to /app/options.py file. This affects Roxy-wi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-74 Jul 06, 2022
CVE-2022-31125 10.0 CRITICAL 1 PoC Analysis EPSS 0.18
Roxy-wi <6.1.1.0 - Auth Bypass
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to bypass authentication and access admin functionality by sending a specially crafted HTTP request. This affects Roxywi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-287 Jul 06, 2022
CVE-2022-31056 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
GLPI <10.0.2 - SQL Injection
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.
CWE-89 Jun 28, 2022
CVE-2022-2884 9.9 CRITICAL 2 PoCs Analysis EPSS 0.68
GitLab CE/EE <15.1.5-15.3.1 - Authenticated RCE
A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint
CWE-78 Oct 17, 2022
CVE-2022-45297 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
EQ < 2.2.0 - SQL Injection
EQ v1.5.31 to v2.2.0 was discovered to contain a SQL injection vulnerability via the UserPwd parameter.
CWE-89 Jan 31, 2023
CVE-2022-46836 9.1 CRITICAL 1 PoC Analysis EPSS 0.02
Tribe29's Checkmk <2.1.0p10-<2.0.0p27-<1.6.0p29 - Code Injection
PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.
CWE-94 Feb 20, 2023
CVE-2022-38580 9.8 CRITICAL 1 PoC Analysis EPSS 0.49
Zalando Skipper <0.13.236 - SSRF
Zalando Skipper v0.13.236 is vulnerable to Server-Side Request Forgery (SSRF).
CWE-918 Oct 25, 2022
CVE-2022-24082 9.8 CRITICAL 1 PoC Analysis EPSS 0.46
Pega Platform - Code Injection
If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.
CWE-502 Jul 19, 2022
CVE-2022-32272 9.8 CRITICAL 1 PoC Analysis EPSS 0.21
Opswat Metadefender < 5.1.2 - Improper Privilege Management
OPSWAT MetaDefender Core before 5.1.2, MetaDefender ICAP before 4.12.1, and MetaDefender Email Gateway Security before 5.6.1 have incorrect access control, resulting in privilege escalation.
CWE-269 Jun 09, 2022
CVE-2022-24491 9.8 CRITICAL 1 PoC Analysis EPSS 0.38
Windows Network File System < - RCE
Windows Network File System Remote Code Execution Vulnerability
Apr 15, 2022
CVE-2022-37109 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Camp < 2022-07-21 - Insufficiently Protected Credentials
patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie.
CWE-522 Nov 14, 2022
CVE-2022-34668 9.8 CRITICAL 1 PoC Analysis EPSS 0.22
Nvidia Nvflare < 2.1.4 - Insecure Deserialization
NVFLARE, versions prior to 2.1.4, contains a vulnerability that deserialization of Untrusted Data due to Pickle usage may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
CWE-502 Aug 29, 2022
CVE-2022-35583 9.8 CRITICAL 1 PoC Analysis EPSS 0.59
Wkhtmltopdf - SSRF
wkhtmlTOpdf 0.12.6 is vulnerable to SSRF which allows an attacker to get initial access into the target's system by injecting iframe tag with initial asset IP address on it's source. This allows the attacker to takeover the whole infrastructure by accessing their internal assets.
CWE-918 Aug 22, 2022
CVE-2022-50893 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
VIAVIWEB Wallpaper Admin 1.0 - RCE
VIAVIWEB Wallpaper Admin 1.0 contains an unauthenticated remote code execution vulnerability in the image upload functionality. Attackers can upload a malicious PHP file through the add_gallery_image.php endpoint to execute arbitrary code on the server.
CWE-434 Jan 13, 2026