Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2022-37299 6.5 MEDIUM EXPLOITED 1 PoC NUCLEI EPSS 0.17
Shirne Cms - Path Traversal
An issue was discovered in Shirne CMS 1.2.0. There is a Path Traversal vulnerability which could cause arbitrary file read via /static/ueditor/php/controller.php
CWE-22 Sep 09, 2022
CVE-2022-31161 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.73
Roxy-WI <6.1.1.0 - Command Injection
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 contains a patch for this issue.
CWE-434 Jul 15, 2022
CVE-2022-47075 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Smart Office Web <20.28 - Info Disclosure
An issue was discovered in Smart Office Web 20.28 and earlier allows attackers to download sensitive information via the action name parameter to ExportEmployeeDetails.aspx, and to ExportReportingManager.aspx.
Feb 28, 2023
CVE-2022-41412 8.6 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
perfSONAR <4.4.5 - SSRF
An issue in the graphData.cgi component of perfSONAR v4.4.5 and prior allows attackers to access sensitive data and execute Server-Side Request Forgery (SSRF) attacks.
CWE-918 Nov 30, 2022
CVE-2022-43939 8.6 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.93
Hitachi Vantara Pentaho <9.4.0.1-9.3.0.2 - SSRF
Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.2, including 8.3.x contain security restrictions using non-canonical URLs which can be circumvented.
CWE-647 Apr 03, 2023
CVE-2022-43769 8.8 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Pentaho Business Server Auth Bypass and Server Side Template Injection RCE
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream.
CWE-74 Apr 03, 2023
CVE-2022-34918 7.8 HIGH EXPLOITED 6 PoCs Analysis EPSS 0.32
Netfilter nft_set_elem_init Heap Overflow Privilege Escalation
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
CWE-843 Jul 04, 2022
CVE-2022-44149 8.8 HIGH EXPLOITED 4 PoCs Analysis EPSS 0.82
Nexxt Amp300 ARN02304U8 - RCE
The web service on Nexxt Amp300 ARN02304U8 42.103.1.5095 and 80.103.2.5045 devices allows remote OS command execution by placing &telnetd in the JSON host field to the ping feature of the goform/sysTools component. Authentication is required
CWE-78 Jan 06, 2023
CVE-2022-3699 7.8 HIGH EXPLOITED 5 PoCs Analysis EPSS 0.85
Lenovo Diagnostics < 4.45.0 - Out-of-Bounds Write
A privilege escalation vulnerability was reported in the Lenovo HardwareScanPlugin prior to version 1.3.1.2 and Lenovo Diagnostics prior to version 4.45 that could allow a local user to execute code with elevated privileges.
CWE-787 Oct 25, 2023
CVE-2022-30075 8.8 HIGH EXPLOITED 5 PoCs Analysis EPSS 0.89
Tp-link Archer Ax50 Firmware < 210730 - Remote Code Execution
In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation.
Jun 09, 2022
CVE-2022-3590 5.9 MEDIUM EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.91
WordPress - Blind SSRF
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
CWE-367 Dec 14, 2022
CVE-2022-40881 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
SolarView Compact 6.00 - Command Injection
SolarView Compact 6.00 was discovered to contain a command injection vulnerability via network_test.php
CWE-77 Nov 17, 2022
CVE-2022-31814 9.8 CRITICAL EXPLOITED 11 PoCs Analysis NUCLEI EPSS 0.94
Netgate Pfblockerng < 2.1.4_26 - OS Command Injection
pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected.
CWE-78 Sep 05, 2022
CVE-2022-29078 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
ejs 3.1.6 - Code Injection
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
CWE-94 Apr 25, 2022
CVE-2022-21445 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.92
Oracle Application Development Framework - Insecure Deserialization
Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Development Framework (ADF). Successful attacks of this vulnerability can result in takeover of Oracle Application Development Framework (ADF). Note: Oracle Application Development Framework (ADF) is downloaded via Oracle JDeveloper Product. Please refer to Fusion Middleware Patch Advisor for more details. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-502 Apr 19, 2022
CVE-2022-22274 9.8 CRITICAL EXPLOITED 4 PoCs Analysis EPSS 0.47
SonicOS - Buffer Overflow
A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allows a remote unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution in the firewall.
CWE-121 Mar 25, 2022
CVE-2022-0185 8.4 HIGH KEV 11 PoCs Analysis EPSS 0.03
Linux kernel - Privilege Escalation
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
CWE-190 Feb 11, 2022
CVE-2022-24785 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.02
Moment < 2.29.2 - Path Traversal
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
CWE-22 Apr 04, 2022
CVE-2022-25064 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.63
Tp-link Tl-wr840n Firmware - OS Command Injection
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a remote code execution (RCE) vulnerability via the function oal_wan6_setIpAddr.
CWE-78 Feb 25, 2022
CVE-2022-22948 6.5 MEDIUM KEV 3 PoCs Analysis EPSS 0.26
Vmware Cloud Foundation < 3.11 - Incorrect Default Permissions
The vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information.
CWE-276 Mar 29, 2022