Vulnerabilities Exploited in the Wild with Public PoC

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2022-47615 9.3 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.83
Thimpress Learnpress < 4.2.0 - Unrestricted File Upload
Local File Inclusion vulnerability in LearnPress – WordPress LMS Plugin <= 4.1.7.3.2 versions.
CWE-434 Jan 26, 2023
CVE-2022-45808 9.9 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.84
Thimpress Learnpress < 4.1.7.3.2 - SQL Injection
SQL Injection vulnerability in LearnPress – WordPress LMS Plugin <= 4.1.7.3.2 versions.
CWE-89 Jan 26, 2023
CVE-2022-44877 9.8 CRITICAL KEV 13 PoCs Analysis NUCLEI EPSS 0.94
CWP login.php Unauthenticated RCE
login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
CWE-78 Jan 05, 2023
CVE-2022-24500 8.8 HIGH EXPLOITED RANSOMWARE 3 PoCs Analysis EPSS 0.45
Windows SMB - RCE
Windows SMB Remote Code Execution Vulnerability
Apr 15, 2022
CVE-2022-42889 9.8 CRITICAL EXPLOITED 62 PoCs Analysis NUCLEI EPSS 0.94
Apache Commons Text < 1.10.0 - Code Injection
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
CWE-94 Oct 13, 2022
CVE-2022-31499 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Nortek Linear eMerge E3-Series <0.32-08f - Command Injection
Nortek Linear eMerge E3-Series devices before 0.32-08f allow an unauthenticated attacker to inject OS commands via ReaderNo. NOTE: this issue exists because of an incomplete fix for CVE-2019-7256.
CWE-78 Aug 25, 2022
CVE-2022-41080 8.8 HIGH KEV RANSOMWARE 2 PoCs Analysis EPSS 0.94
Microsoft Exchange Server - Privilege Escalation
Microsoft Exchange Server Elevation of Privilege Vulnerability
Nov 09, 2022
CVE-2022-4060 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.89
User Post Gallery WP <2.19 - Code Injection
The User Post Gallery WordPress plugin through 2.19 does not limit what callback functions can be called by users, making it possible to any visitors to run code on sites running it.
Jan 16, 2023
CVE-2022-37061 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Flir Ax8 Firmware < 1.46.16 - OS Command Injection
All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are vulnerable to Remote Command Injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges. NOTE: The vendor has stated that with the introduction of firmware version 1.49.16 (Jan 2023) the FLIR AX8 should no longer be affected by the vulnerability reported. Latest firmware version (as of Oct 2025, was released Jun 2024) is 1.55.16.
CWE-78 Aug 18, 2022
CVE-2022-31137 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Roxy-WI <6.1.1.0 - RCE
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-78 Jul 08, 2022
CVE-2022-30023 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.30
Tenda Hg9 Firmware - OS Command Injection
Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 is vulnerable to Command Injection via the Ping function.
CWE-78 Jun 16, 2022
CVE-2022-46718 5.5 MEDIUM EXPLOITED 1 PoC Analysis EPSS 0.00
iOS <15.7.2 - Info Disclosure
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, macOS Monterey 12.6.2. An app may be able to read sensitive location information
CWE-346 Jun 23, 2023
CVE-2022-42475 9.8 CRITICAL KEV RANSOMWARE 9 PoCs Analysis NUCLEI EPSS 0.94
Fortinet Fortios < 5.0.14 - Buffer Overflow
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
CWE-197 Jan 02, 2023
CVE-2022-46689 7.0 HIGH EXPLOITED 21 PoCs Analysis EPSS 0.85
macOS Dirty Cow Arbitrary File Write Local Privilege Escalation
A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
CWE-362 Dec 15, 2022
CVE-2022-42864 7.0 HIGH EXPLOITED 1 PoC Analysis EPSS 0.04
Apple Ipados < 15.7.2 - Race Condition
A race condition was addressed with improved state handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
CWE-362 Dec 15, 2022
CVE-2022-27518 9.8 CRITICAL KEV 1 PoC Analysis EPSS 0.28
Unauthenticated Remote Code Execution - RCE
Unauthenticated remote arbitrary code execution
CWE-664 Dec 13, 2022
CVE-2022-26501 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis EPSS 0.67
Veeam Backup & Replication <11.x - Info Disclosure
Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2).
CWE-306 Mar 17, 2022
CVE-2022-4262 8.8 HIGH KEV 4 PoCs Analysis EPSS 0.06
Google Chrome < 108.0.5359.94 - Type Confusion
Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Dec 02, 2022
CVE-2022-34721 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.27
Microsoft Windows 10 - Remote Code Execution
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Sep 13, 2022
CVE-2022-37661 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.31
Adtran Sr510n Firmware - Remote Code Execution
SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature.
Sep 14, 2022