Critical Vulnerabilities with Public Exploits

Updated 34m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,109 results Clear all
CVE-2022-50895 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Aero CMS 0.0.1 - SQL Injection
Aero CMS 0.0.1 contains a SQL injection vulnerability in the author parameter that allows attackers to manipulate database queries. Attackers can exploit boolean-based, error-based, time-based, and UNION query techniques to extract sensitive database information and potentially compromise the system.
CWE-89 Jan 13, 2026
CVE-2022-2651 9.8 CRITICAL 1 PoC Analysis EPSS 0.17
bookwyrm-social/bookwyrm <0.4.5 - Auth Bypass
Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/bookwyrm prior to 0.4.5.
CWE-305 Aug 04, 2022
CVE-2022-38789 9.1 CRITICAL 1 PoC Analysis EPSS 0.01
Airties Smart Wi-Fi <2020-08-04 - SSRF
An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.
CWE-639 Sep 15, 2022
CVE-2022-24497 9.8 CRITICAL 1 PoC Analysis EPSS 0.38
Windows Network File System - RCE
Windows Network File System Remote Code Execution Vulnerability
Apr 15, 2022
CVE-2022-37204 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.01
Jflyfox Jfinal Cms - SQL Injection
Final CMS 5.1.0 is vulnerable to SQL Injection.
CWE-89 Sep 20, 2022
CVE-2022-37203 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Jflyfox Jfinal Cms - SQL Injection
JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.
CWE-89 Sep 19, 2022
CVE-2022-40624 9.8 CRITICAL SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.85
Pfsense Pfblockerng < 2.1.4_27 - OS Command Injection
pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814.
CWE-78 Dec 20, 2022
CVE-2022-34715 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.39
Microsoft Windows Server 2022 - Code Injection
Windows Network File System Remote Code Execution Vulnerability
CWE-94 Aug 09, 2022
CVE-2022-33174 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.72
Powertek firmware <3.30.30 - Auth Bypass
Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext.
CWE-863 Jun 13, 2022
CVE-2022-25260 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Jetbrains Hub < 2021.1.14276 - SSRF
JetBrains Hub before 2021.1.14276 was vulnerable to blind Server-Side Request Forgery (SSRF).
CWE-918 Feb 25, 2022
CVE-2022-27255 9.8 CRITICAL 2 PoCs Analysis EPSS 0.15
Realtek Ecos Rsdk Firmware - Improper Input Validation
In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.
CWE-20 Aug 01, 2022
CVE-2022-20229 9.8 CRITICAL 1 PoC Analysis EPSS 0.12
Android -10,11,12,12L - RCE
In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184
CWE-787 Jul 13, 2022
CVE-2022-20361 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Android - Privilege Escalation
In btif_dm_auth_cmpl_evt of btif_dm.cc, there is a possible vulnerability in Cross-Transport Key Derivation due to Weakness in Bluetooth Standard. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-231161832
CWE-269 Aug 10, 2022
CVE-2022-22814 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Myasus < 3.1.2.0 - Privilege Escalation
The System Diagnosis service of MyASUS before 3.1.2.0 allows privilege escalation.
Mar 10, 2022
CVE-2022-34919 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Zengenti Contensis < 15.2.1.79 - Authentication Bypass
The file upload wizard in Zengenti Contensis Classic before 15.2.1.79 does not correctly check that a user has authenticated. By uploading a crafted aspx file, it is possible to execute arbitrary commands.
CWE-287 Aug 23, 2022
CVE-2022-20829 9.1 CRITICAL 1 PoC Analysis EPSS 0.05
Cisco Isa 3000 Firmware < 9.18.2 - Data Authenticity Bypass
A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.
CWE-345 Jun 24, 2022
CVE-2022-34970 9.8 CRITICAL 1 PoC Analysis EPSS 0.24
Crow < 1.0\+4 - Buffer Overflow
Crow before 1.0+4 has a heap-based buffer overflow via the function qs_parse in query_string.h. On successful exploitation this vulnerability allows attackers to remotely execute arbitrary code in the context of the vulnerable service.
CWE-193 Aug 04, 2022
CVE-2022-32224 9.8 CRITICAL SSVC PoC 1 PoC Analysis EPSS 0.02
Activerecord < 5.2.8.1 - Insecure Deserialization
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.
CWE-502 Dec 05, 2022
CVE-2022-36642 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.71
Telosalliance Omnia Mpx Node Firmware < 1.5.0 - Missing Authorization
A local file disclosure vulnerability in /appConfig/userDB.json of Telos Alliance Omnia MPX Node through 1.0.0-1.4.9 allows attackers to access users credentials which makes him able to gain initial access to the control panel with high privilege because the cleartext storage of sensitive information which can be unlatched by exploiting the LFD vulnerability.
CWE-862 Sep 02, 2022
CVE-2022-26138 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Questions For Confluence - Hardcoded Credentials
The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.
CWE-798 Jul 20, 2022