Critical Vulnerabilities with Public Exploits
Updated 33m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,109 results
Clear all
CVE-2022-20473
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.51
Android -10,11,12,12L,13 - RCE
In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
CWE-125
Dec 13, 2022
CVE-2022-36067
10.0
CRITICAL
SSVC PoC
2 PoCs
Analysis
EPSS 0.83
vm2 <3.9.11 - RCE
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
CWE-913
Sep 06, 2022
CVE-2022-44183
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Tenda AC18 V15.03.05.19 - Buffer Overflow
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWifiGuestBasic.
CWE-120
Nov 21, 2022
CVE-2022-30592
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
Litespeedtech Lsquic < 3.1.0 - NULL Pointer Dereference
liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.
CWE-476
May 11, 2022
CVE-2022-41272
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.01
SAP NetWeaver PI <7.50 - Info Disclosure
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
CWE-862
Dec 13, 2022
CVE-2022-32073
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Wolfssh - Integer Overflow
WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR.
CWE-190
Jul 13, 2022
CVE-2022-41923
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Grails Spring Security Core < 3.3.2 - Incorrect Authorization
Grails Spring Security Core plugin is vulnerable to privilege escalation. The vulnerability allows an attacker access to one endpoint (i.e. the targeted endpoint) using the authorization requirements of a different endpoint (i.e. the donor endpoint). In some Grails framework applications, access to the targeted endpoint will be granted based on meeting the authorization requirements of the donor endpoint, which can result in a privilege escalation attack. This vulnerability has been patched in grails-spring-security-core versions 3.3.2, 4.0.5 and 5.1.1. Impacted Applications: Grails Spring Security Core plugin versions: 1.x 2.x >=3.0.0 <3.3.2 >=4.0.0 <4.0.5 >=5.0.0 <5.1.1 We strongly suggest that all Grails framework applications using the Grails Spring Security Core plugin be updated to a patched release of the plugin. Workarounds: Users should create a subclass extending one of the following classes from the `grails.plugin.springsecurity.web.access.intercept` package, depending on their security configuration: * `AnnotationFilterInvocationDefinition` * `InterceptUrlMapFilterInvocationDefinition` * `RequestmapFilterInvocationDefinition` In each case, the subclass should override the `calculateUri` method like so: ``` @Override protected String calculateUri(HttpServletRequest request) { UrlPathHelper.defaultInstance.getRequestUri(request) } ``` This should be considered a temporary measure, as the patched versions of grails-spring-security-core deprecates the `calculateUri` method. Once upgraded to a patched version of the plugin, this workaround is no longer needed. The workaround is especially important for version 2.x, as no patch is available version 2.x of the GSSC plugin.
CWE-269
Nov 23, 2022
CVE-2022-31691
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.14
Vmware Bosh Editor < 1.40.0 - Code Injection
Spring Tools 4 for Eclipse version 4.16.0 and below as well as VSCode extensions such as Spring Boot Tools, Concourse CI Pipeline Editor, Bosh Editor and Cloudfoundry Manifest YML Support version 1.39.0 and below all use Snakeyaml library for YAML editing support. This library allows for some special syntax in the YAML that under certain circumstances allows for potentially harmful remote code execution by the attacker.
CWE-94
Nov 04, 2022
CVE-2022-37661
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.31
Adtran Sr510n Firmware - Remote Code Execution
SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature.
Sep 14, 2022
CVE-2022-32429
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.80
Megatech Msnswitch Firmware - Authentication Bypass
An authentication-bypass issue in the component http://MYDEVICEIP/cgi-bin-sdb/ExportSettings.sh of Mega System Technologies Inc MSNSwitch MNT.2408 allows unauthenticated attackers to arbitrarily configure settings within the application, leading to remote code execution.
CWE-287
Aug 10, 2022
CVE-2022-31499
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Nortek Linear eMerge E3-Series <0.32-08f - Command Injection
Nortek Linear eMerge E3-Series devices before 0.32-08f allow an unauthenticated attacker to inject OS commands via ReaderNo. NOTE: this issue exists because of an incomplete fix for CVE-2019-7256.
CWE-78
Aug 25, 2022
CVE-2022-37298
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.16
Shinken-monitoring Shinken Monitoring - Authentication Bypass
Shinken Solutions Shinken Monitoring Version 2.4.3 affected is vulnerable to Incorrect Access Control. The SafeUnpickler class found in shinken/safepickle.py implements a weak authentication scheme when unserializing objects passed from monitoring nodes to the Shinken monitoring server.
CWE-287
Oct 20, 2022
CVE-2022-36663
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.16
Gluu Oxauth < 4.4.1 - SSRF
Gluu Oxauth before v4.4.1 allows attackers to execute blind SSRF (Server-Side Request Forgery) attacks via a crafted request_uri parameter.
CWE-918
Sep 06, 2022
CVE-2022-36231
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.19
pdf_info 0.5.3 - Command Injection
pdf_info 0.5.3 is vulnerable to Command Execution because the Ruby code uses backticks instead of Open3.
CWE-78
Feb 23, 2023
CVE-2022-30600
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
Moodle - Privilege Escalation
A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed.
CWE-682
May 18, 2022
CVE-2022-34718
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.86
Microsoft Windows 10 - Remote Code Execution
Windows TCP/IP Remote Code Execution Vulnerability
Sep 13, 2022
CVE-2022-31479
9.6
CRITICAL
1 PoC
EPSS 0.09
HID Mercury Intelligent Controllers <1.302-1.296 - Code Injection
An unauthenticated attacker can update the hostname with a specially crafted name that will allow for shell commands to be executed during the core collection process. This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.302 for the LP series and 1.296 for the EP series. An attacker with this level of access on the device can monitor all communications sent to and from this device, modify onboard relays, change configuration files, or cause the device to become unstable. The injected commands only get executed during start up or when unsafe calls regarding the hostname are used. This allows the attacker to gain remote access to the device and can make their persistence permanent by modifying the filesystem.
CWE-78
Jun 06, 2022
CVE-2022-43143
9.6
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.01
Beekeeper Studio <3.6.6 - XSS
A cross-site scripting (XSS) vulnerability in Beekeeper Studio v3.6.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error modal container.
CWE-79
Nov 21, 2022
CVE-2022-2840
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
Zephyr Project Manager <3.2.5 - SQL Injection
The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections
CWE-89
Sep 19, 2022
CVE-2022-40916
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.01
Tiny File Manager <2.4.7 - Session Fixation
Tiny File Manager v2.4.7 and below is vulnerable to session fixation.
CWE-384
Feb 06, 2025