Critical Vulnerabilities with Public Exploits
Updated 34m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,109 results
Clear all
CVE-2022-50895
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Aero CMS 0.0.1 - SQL Injection
Aero CMS 0.0.1 contains a SQL injection vulnerability in the author parameter that allows attackers to manipulate database queries. Attackers can exploit boolean-based, error-based, time-based, and UNION query techniques to extract sensitive database information and potentially compromise the system.
CWE-89
Jan 13, 2026
CVE-2022-2651
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.17
bookwyrm-social/bookwyrm <0.4.5 - Auth Bypass
Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/bookwyrm prior to 0.4.5.
CWE-305
Aug 04, 2022
CVE-2022-38789
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.01
Airties Smart Wi-Fi <2020-08-04 - SSRF
An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.
CWE-639
Sep 15, 2022
CVE-2022-24497
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.38
Windows Network File System - RCE
Windows Network File System Remote Code Execution Vulnerability
Apr 15, 2022
CVE-2022-37204
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.01
Jflyfox Jfinal Cms - SQL Injection
Final CMS 5.1.0 is vulnerable to SQL Injection.
CWE-89
Sep 20, 2022
CVE-2022-37203
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Jflyfox Jfinal Cms - SQL Injection
JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.
CWE-89
Sep 19, 2022
CVE-2022-40624
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.85
Pfsense Pfblockerng < 2.1.4_27 - OS Command Injection
pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814.
CWE-78
Dec 20, 2022
CVE-2022-34715
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.39
Microsoft Windows Server 2022 - Code Injection
Windows Network File System Remote Code Execution Vulnerability
CWE-94
Aug 09, 2022
CVE-2022-33174
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.72
Powertek firmware <3.30.30 - Auth Bypass
Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext.
CWE-863
Jun 13, 2022
CVE-2022-25260
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Jetbrains Hub < 2021.1.14276 - SSRF
JetBrains Hub before 2021.1.14276 was vulnerable to blind Server-Side Request Forgery (SSRF).
CWE-918
Feb 25, 2022
CVE-2022-27255
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.15
Realtek Ecos Rsdk Firmware - Improper Input Validation
In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.
CWE-20
Aug 01, 2022
CVE-2022-20229
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
Android -10,11,12,12L - RCE
In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184
CWE-787
Jul 13, 2022
CVE-2022-20361
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Android - Privilege Escalation
In btif_dm_auth_cmpl_evt of btif_dm.cc, there is a possible vulnerability in Cross-Transport Key Derivation due to Weakness in Bluetooth Standard. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-231161832
CWE-269
Aug 10, 2022
CVE-2022-22814
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Myasus < 3.1.2.0 - Privilege Escalation
The System Diagnosis service of MyASUS before 3.1.2.0 allows privilege escalation.
Mar 10, 2022
CVE-2022-34919
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Zengenti Contensis < 15.2.1.79 - Authentication Bypass
The file upload wizard in Zengenti Contensis Classic before 15.2.1.79 does not correctly check that a user has authenticated. By uploading a crafted aspx file, it is possible to execute arbitrary commands.
CWE-287
Aug 23, 2022
CVE-2022-20829
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.05
Cisco Isa 3000 Firmware < 9.18.2 - Data Authenticity Bypass
A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.
CWE-345
Jun 24, 2022
CVE-2022-34970
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.24
Crow < 1.0\+4 - Buffer Overflow
Crow before 1.0+4 has a heap-based buffer overflow via the function qs_parse in query_string.h. On successful exploitation this vulnerability allows attackers to remotely execute arbitrary code in the context of the vulnerable service.
CWE-193
Aug 04, 2022
CVE-2022-32224
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.02
Activerecord < 5.2.8.1 - Insecure Deserialization
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.
CWE-502
Dec 05, 2022
CVE-2022-36642
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.71
Telosalliance Omnia Mpx Node Firmware < 1.5.0 - Missing Authorization
A local file disclosure vulnerability in /appConfig/userDB.json of Telos Alliance Omnia MPX Node through 1.0.0-1.4.9 allows attackers to access users credentials which makes him able to gain initial access to the control panel with high privilege because the cleartext storage of sensitive information which can be unlatched by exploiting the LFD vulnerability.
CWE-862
Sep 02, 2022
CVE-2022-26138
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Questions For Confluence - Hardcoded Credentials
The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.
CWE-798
Jul 20, 2022