Critical Vulnerabilities with Public Exploits
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,105 results
Clear all
CVE-2022-36193
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
School Management System 1.0 - SQL Injection
SQL injection in School Management System 1.0 allows remote attackers to modify or delete data, causing persistent changes to the application's content or behavior by using malicious SQL queries.
CWE-89
Nov 28, 2022
CVE-2022-21831
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Rubyonrails Active Storage < 5.2.6.3 - Code Injection
A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments.
CWE-94
May 26, 2022
CVE-2022-35649
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
Moodle - RCE
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
CWE-20
Jul 25, 2022
CVE-2022-40881
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
SolarView Compact 6.00 - Command Injection
SolarView Compact 6.00 was discovered to contain a command injection vulnerability via network_test.php
CWE-77
Nov 17, 2022
CVE-2022-45599
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Aztech Wmb250ac Firmware - Insufficiently Protected Credentials
Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password.
CWE-522
Feb 22, 2023
CVE-2022-2274
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.40
Openssl < 300.0.9 - Out-of-Bounds Write
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.
CWE-787
Jul 01, 2022
CVE-2022-37032
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.01
Frrouting < 8.4 - Out-of-Bounds Read
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
CWE-125
Sep 19, 2022
CVE-2022-31890
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.14
Enhancesoft Audit Log < 2022-04-21 - SQL Injection
SQL Injection vulnerability in audit/class.audit.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae via the order parameter to the getOrder function.
CWE-89
Apr 05, 2023
CVE-2022-0316
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.39
WeStand <2.1 - Unauthenticated RCE
The WeStand WordPress theme before 2.1, footysquare WordPress theme, aidreform WordPress theme, statfort WordPress theme, club-theme WordPress theme, kingclub-theme WordPress theme, spikes WordPress theme, spikes-black WordPress theme, soundblast WordPress theme, bolster WordPress theme from ChimpStudio and PixFill does not have any authorisation and upload validation in the lang_upload.php file, allowing any unauthenticated attacker to upload arbitrary files to the web server.
Jan 23, 2023
CVE-2022-48311
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.01
HP Deskjet 2540 A9u23b Firmware - XSS
**UNSUPPORTED WHEN ASSIGNED** Cross Site Scripting (XSS) in HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B allows authenticated attacker to inject their own script into the page via HTTP configuration page. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-79
Feb 06, 2023
CVE-2022-23303
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
W1.fi Hostapd < 2.10 - Information Disclosure
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
CWE-203
Jan 17, 2022
CVE-2022-34913
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.10
Md2roff - Out-of-Bounds Write
md2roff 1.7 has a stack-based buffer overflow via a Markdown file containing a large number of consecutive characters to be processed. NOTE: the vendor's position is that the product is not intended for untrusted input
CWE-787
Jul 02, 2022
CVE-2022-41903
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.22
Git < 2.30.6 - Integer Overflow
Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`.
CWE-190
Jan 17, 2023
CVE-2022-27518
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.28
Unauthenticated Remote Code Execution - RCE
Unauthenticated remote arbitrary code execution
CWE-664
Dec 13, 2022
CVE-2022-46164
9.4
CRITICAL
1 PoC
Analysis
EPSS 0.57
NodeBB <2.6.1 - RCE
NodeBB is an open source Node.js based forum software. Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts. This vulnerability has been patched in version 2.6.1. Users are advised to upgrade. Users unable to upgrade may cherry-pick commit `48d143921753914da45926cca6370a92ed0c46b8` into their codebase to patch the exploit.
CWE-665
Dec 05, 2022
CVE-2022-39073
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
ZTE MF286R - Command Injection
There is a command injection vulnerability in ZTE MF286R, Due to insufficient validation of the input parameters, an attacker could use the vulnerability to execute arbitrary commands.
CWE-77
Jan 06, 2023
CVE-2022-20473
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.51
Android -10,11,12,12L,13 - RCE
In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
CWE-125
Dec 13, 2022
CVE-2022-36067
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.83
vm2 <3.9.11 - RCE
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
CWE-913
Sep 06, 2022
CVE-2022-44183
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Tenda AC18 V15.03.05.19 - Buffer Overflow
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWifiGuestBasic.
CWE-120
Nov 21, 2022
CVE-2022-30592
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
Litespeedtech Lsquic < 3.1.0 - NULL Pointer Dereference
liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.
CWE-476
May 11, 2022