Critical Vulnerabilities with Public Exploits

Updated 33m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,109 results Clear all
CVE-2022-20473 9.8 CRITICAL 2 PoCs Analysis EPSS 0.51
Android -10,11,12,12L,13 - RCE
In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
CWE-125 Dec 13, 2022
CVE-2022-36067 10.0 CRITICAL SSVC PoC 2 PoCs Analysis EPSS 0.83
vm2 <3.9.11 - RCE
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
CWE-913 Sep 06, 2022
CVE-2022-44183 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Tenda AC18 V15.03.05.19 - Buffer Overflow
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWifiGuestBasic.
CWE-120 Nov 21, 2022
CVE-2022-30592 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
Litespeedtech Lsquic < 3.1.0 - NULL Pointer Dereference
liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.
CWE-476 May 11, 2022
CVE-2022-41272 9.9 CRITICAL 1 PoC Analysis EPSS 0.01
SAP NetWeaver PI <7.50 - Info Disclosure
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
CWE-862 Dec 13, 2022
CVE-2022-32073 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Wolfssh - Integer Overflow
WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR.
CWE-190 Jul 13, 2022
CVE-2022-41923 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Grails Spring Security Core < 3.3.2 - Incorrect Authorization
Grails Spring Security Core plugin is vulnerable to privilege escalation. The vulnerability allows an attacker access to one endpoint (i.e. the targeted endpoint) using the authorization requirements of a different endpoint (i.e. the donor endpoint). In some Grails framework applications, access to the targeted endpoint will be granted based on meeting the authorization requirements of the donor endpoint, which can result in a privilege escalation attack. This vulnerability has been patched in grails-spring-security-core versions 3.3.2, 4.0.5 and 5.1.1. Impacted Applications: Grails Spring Security Core plugin versions: 1.x 2.x >=3.0.0 <3.3.2 >=4.0.0 <4.0.5 >=5.0.0 <5.1.1 We strongly suggest that all Grails framework applications using the Grails Spring Security Core plugin be updated to a patched release of the plugin. Workarounds: Users should create a subclass extending one of the following classes from the `grails.plugin.springsecurity.web.access.intercept` package, depending on their security configuration: * `AnnotationFilterInvocationDefinition` * `InterceptUrlMapFilterInvocationDefinition` * `RequestmapFilterInvocationDefinition` In each case, the subclass should override the `calculateUri` method like so: ``` @Override protected String calculateUri(HttpServletRequest request) { UrlPathHelper.defaultInstance.getRequestUri(request) } ``` This should be considered a temporary measure, as the patched versions of grails-spring-security-core deprecates the `calculateUri` method. Once upgraded to a patched version of the plugin, this workaround is no longer needed. The workaround is especially important for version 2.x, as no patch is available version 2.x of the GSSC plugin.
CWE-269 Nov 23, 2022
CVE-2022-31691 9.8 CRITICAL 1 PoC Analysis EPSS 0.14
Vmware Bosh Editor < 1.40.0 - Code Injection
Spring Tools 4 for Eclipse version 4.16.0 and below as well as VSCode extensions such as Spring Boot Tools, Concourse CI Pipeline Editor, Bosh Editor and Cloudfoundry Manifest YML Support version 1.39.0 and below all use Snakeyaml library for YAML editing support. This library allows for some special syntax in the YAML that under certain circumstances allows for potentially harmful remote code execution by the attacker.
CWE-94 Nov 04, 2022
CVE-2022-37661 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.31
Adtran Sr510n Firmware - Remote Code Execution
SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature.
Sep 14, 2022
CVE-2022-32429 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.80
Megatech Msnswitch Firmware - Authentication Bypass
An authentication-bypass issue in the component http://MYDEVICEIP/cgi-bin-sdb/ExportSettings.sh of Mega System Technologies Inc MSNSwitch MNT.2408 allows unauthenticated attackers to arbitrarily configure settings within the application, leading to remote code execution.
CWE-287 Aug 10, 2022
CVE-2022-31499 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Nortek Linear eMerge E3-Series <0.32-08f - Command Injection
Nortek Linear eMerge E3-Series devices before 0.32-08f allow an unauthenticated attacker to inject OS commands via ReaderNo. NOTE: this issue exists because of an incomplete fix for CVE-2019-7256.
CWE-78 Aug 25, 2022
CVE-2022-37298 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
Shinken-monitoring Shinken Monitoring - Authentication Bypass
Shinken Solutions Shinken Monitoring Version 2.4.3 affected is vulnerable to Incorrect Access Control. The SafeUnpickler class found in shinken/safepickle.py implements a weak authentication scheme when unserializing objects passed from monitoring nodes to the Shinken monitoring server.
CWE-287 Oct 20, 2022
CVE-2022-36663 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
Gluu Oxauth < 4.4.1 - SSRF
Gluu Oxauth before v4.4.1 allows attackers to execute blind SSRF (Server-Side Request Forgery) attacks via a crafted request_uri parameter.
CWE-918 Sep 06, 2022
CVE-2022-36231 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.19
pdf_info 0.5.3 - Command Injection
pdf_info 0.5.3 is vulnerable to Command Execution because the Ruby code uses backticks instead of Open3.
CWE-78 Feb 23, 2023
CVE-2022-30600 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Moodle - Privilege Escalation
A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed.
CWE-682 May 18, 2022
CVE-2022-34718 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.86
Microsoft Windows 10 - Remote Code Execution
Windows TCP/IP Remote Code Execution Vulnerability
Sep 13, 2022
CVE-2022-31479 9.6 CRITICAL 1 PoC EPSS 0.09
HID Mercury Intelligent Controllers <1.302-1.296 - Code Injection
An unauthenticated attacker can update the hostname with a specially crafted name that will allow for shell commands to be executed during the core collection process. This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.302 for the LP series and 1.296 for the EP series. An attacker with this level of access on the device can monitor all communications sent to and from this device, modify onboard relays, change configuration files, or cause the device to become unstable. The injected commands only get executed during start up or when unsafe calls regarding the hostname are used. This allows the attacker to gain remote access to the device and can make their persistence permanent by modifying the filesystem.
CWE-78 Jun 06, 2022
CVE-2022-43143 9.6 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.01
Beekeeper Studio <3.6.6 - XSS
A cross-site scripting (XSS) vulnerability in Beekeeper Studio v3.6.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error modal container.
CWE-79 Nov 21, 2022
CVE-2022-2840 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
Zephyr Project Manager <3.2.5 - SQL Injection
The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections
CWE-89 Sep 19, 2022
CVE-2022-40916 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.01
Tiny File Manager <2.4.7 - Session Fixation
Tiny File Manager v2.4.7 and below is vulnerable to session fixation.
CWE-384 Feb 06, 2025