Vulnerabilities Exploited in the Wild with Public PoC

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2022-2586 5.3 MEDIUM KEV 4 PoCs Analysis EPSS 0.02
NFT - Use After Free
It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.
CWE-416 Jan 08, 2024
CVE-2022-24816 10.0 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Geosolutionsgroup Jai-ext < 1.1.22 - Code Injection
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
CWE-94 Apr 13, 2022
CVE-2022-23178 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Crestron Hd-md4x2-4k-e Firmware - Authentication Bypass
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.
CWE-287 Jan 15, 2022
CVE-2022-1026 8.6 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.87
Kyocera Net Viewer - Insufficiently Protected Credentials
Kyocera multifunction printers running vulnerable versions of Net View unintentionally expose sensitive user information, including usernames and passwords, through an insufficiently protected address book export function.
CWE-522 Apr 04, 2022
CVE-2022-21907 9.8 CRITICAL EXPLOITED 19 PoCs Analysis EPSS 0.92
HTTP Protocol Stack - RCE
HTTP Protocol Stack Remote Code Execution Vulnerability
Jan 11, 2022
CVE-2022-0540 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Atlassian Jira <8.13.18, <8.14.0-8.20.5, <8.21.0-8.22.0 - Auth Bypass
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
CWE-287 Apr 20, 2022
CVE-2022-24989 9.8 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis EPSS 0.82
Terra-master Terramaster Operating System < 4.2.31 - Injection
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
CWE-74 Aug 20, 2023
CVE-2022-0592 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.70
MapSVG WP <6.2.20 - SQL Injection
The MapSVG WordPress plugin before 6.2.20 does not validate and escape a parameter via a REST endpoint before using it in a SQL statement, leading to a SQL Injection exploitable by unauthenticated users.
CWE-89 May 09, 2022
CVE-2022-24716 7.5 HIGH EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.93
Icinga Web 2 <2.9.5 - Info Disclosure
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
CWE-22 Mar 08, 2022
CVE-2022-36553 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Hytec Inter HWL-2511-SS <v1.05 - Command Injection
Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi.
CWE-77 Aug 29, 2022
CVE-2022-42953 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.11
ZKTeco <8.88 - Info Disclosure
Certain ZKTeco products (ZEM500-510-560-760, ZEM600-800, ZEM720, ZMM) allow access to sensitive information via direct requests for the form/DataApp?style=1 and form/DataApp?style=0 URLs. The affected versions may be before 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210). The fixed versions are firmware version 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and firmware version 15.00 (ZMM200-220-210).
CWE-425 Dec 25, 2022
CVE-2022-1386 9.8 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.94
Fusion Builder < 3.6.2 - SSRF
The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
CWE-918 May 16, 2022
CVE-2022-0952 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.88
Sitemap < 1.0.36 - Missing Authorization
The Sitemap by click5 WordPress plugin before 1.0.36 does not have authorisation and CSRF checks when updating options via a REST endpoint, and does not ensure that the option to be updated belongs to the plugin. As a result, unauthenticated attackers could change arbitrary blog options, such as the users_can_register and default_role, allowing them to create a new admin account and take over the blog.
CWE-862 May 02, 2022
CVE-2022-21661 8.0 HIGH EXPLOITED 15 PoCs Analysis NUCLEI EPSS 0.91
Wordpress < 3.7.37 - SQL Injection
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
CWE-89 Jan 06, 2022
CVE-2022-31711 5.3 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.82
Vmware Vrealize Log Insight < 4.8 - Information Disclosure
VMware vRealize Log Insight contains an Information Disclosure Vulnerability. A malicious actor can remotely collect sensitive session and application information without authentication.
CWE-200 Jan 26, 2023
CVE-2022-31706 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
Vmware Vrealize Log Insight < 4.8 - Path Traversal
The vRealize Log Insight contains a Directory Traversal Vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.
CWE-22 Jan 26, 2023
CVE-2022-31704 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
Vmware Vrealize Log Insight < 4.8 - Improper Access Control
The vRealize Log Insight contains a broken access control vulnerability. An unauthenticated malicious actor can remotely inject code into sensitive files of an impacted appliance which can result in remote code execution.
CWE-284 Jan 26, 2023
CVE-2022-41800 8.7 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
BIG-IP - Auth Bypass
In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-77 Dec 07, 2022
CVE-2022-21500 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Oracle E-Business Suite 12.2 - Unauthorized Access
Vulnerability in Oracle E-Business Suite (component: Manage Proxies). The supported version that is affected is 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Suite. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E-Business Suite accessible data. Note: Authentication is required for successful attack, however the user may be self-registered. <br> <br>Oracle E-Business Suite 12.1 is not impacted by this vulnerability. Customers should refer to the Patch Availability Document for details. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
May 20, 2022
CVE-2022-46381 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.81
Linear eMerge E3-Series <0.32-08f - XSS
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
CWE-79 Dec 13, 2022