Vulnerabilities Exploited in the Wild with Public PoC
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2022-47615
9.3
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.83
Thimpress Learnpress < 4.2.0 - Unrestricted File Upload
Local File Inclusion vulnerability in LearnPress – WordPress LMS Plugin <= 4.1.7.3.2 versions.
CWE-434
Jan 26, 2023
CVE-2022-45808
9.9
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.84
Thimpress Learnpress < 4.1.7.3.2 - SQL Injection
SQL Injection vulnerability in LearnPress – WordPress LMS Plugin <= 4.1.7.3.2 versions.
CWE-89
Jan 26, 2023
CVE-2022-44877
9.8
CRITICAL
KEV
13 PoCs
Analysis
NUCLEI
EPSS 0.94
CWP login.php Unauthenticated RCE
login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
CWE-78
Jan 05, 2023
CVE-2022-24500
8.8
HIGH
EXPLOITED
RANSOMWARE
3 PoCs
Analysis
EPSS 0.45
Windows SMB - RCE
Windows SMB Remote Code Execution Vulnerability
Apr 15, 2022
CVE-2022-42889
9.8
CRITICAL
EXPLOITED
62 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Commons Text < 1.10.0 - Code Injection
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
CWE-94
Oct 13, 2022
CVE-2022-31499
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Nortek Linear eMerge E3-Series <0.32-08f - Command Injection
Nortek Linear eMerge E3-Series devices before 0.32-08f allow an unauthenticated attacker to inject OS commands via ReaderNo. NOTE: this issue exists because of an incomplete fix for CVE-2019-7256.
CWE-78
Aug 25, 2022
CVE-2022-41080
8.8
HIGH
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.94
Microsoft Exchange Server - Privilege Escalation
Microsoft Exchange Server Elevation of Privilege Vulnerability
Nov 09, 2022
CVE-2022-4060
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.89
User Post Gallery WP <2.19 - Code Injection
The User Post Gallery WordPress plugin through 2.19 does not limit what callback functions can be called by users, making it possible to any visitors to run code on sites running it.
Jan 16, 2023
CVE-2022-37061
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Flir Ax8 Firmware < 1.46.16 - OS Command Injection
All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are vulnerable to Remote Command Injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges. NOTE: The vendor has stated that with the introduction of firmware version 1.49.16 (Jan 2023) the FLIR AX8 should no longer be affected by the vulnerability reported. Latest firmware version (as of Oct 2025, was released Jun 2024) is 1.55.16.
CWE-78
Aug 18, 2022
CVE-2022-31137
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Roxy-WI <6.1.1.0 - RCE
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-78
Jul 08, 2022
CVE-2022-30023
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.30
Tenda Hg9 Firmware - OS Command Injection
Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 is vulnerable to Command Injection via the Ping function.
CWE-78
Jun 16, 2022
CVE-2022-46718
5.5
MEDIUM
EXPLOITED
1 PoC
Analysis
EPSS 0.00
iOS <15.7.2 - Info Disclosure
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, macOS Monterey 12.6.2. An app may be able to read sensitive location information
CWE-346
Jun 23, 2023
CVE-2022-42475
9.8
CRITICAL
KEV
RANSOMWARE
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Fortinet Fortios < 5.0.14 - Buffer Overflow
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
CWE-197
Jan 02, 2023
CVE-2022-46689
7.0
HIGH
EXPLOITED
21 PoCs
Analysis
EPSS 0.85
macOS Dirty Cow Arbitrary File Write Local Privilege Escalation
A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
CWE-362
Dec 15, 2022
CVE-2022-42864
7.0
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.04
Apple Ipados < 15.7.2 - Race Condition
A race condition was addressed with improved state handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
CWE-362
Dec 15, 2022
CVE-2022-27518
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.28
Unauthenticated Remote Code Execution - RCE
Unauthenticated remote arbitrary code execution
CWE-664
Dec 13, 2022
CVE-2022-26501
9.8
CRITICAL
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.67
Veeam Backup & Replication <11.x - Info Disclosure
Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2).
CWE-306
Mar 17, 2022
CVE-2022-4262
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.06
Google Chrome < 108.0.5359.94 - Type Confusion
Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843
Dec 02, 2022
CVE-2022-34721
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.27
Microsoft Windows 10 - Remote Code Execution
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Sep 13, 2022
CVE-2022-37661
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.31
Adtran Sr510n Firmware - Remote Code Execution
SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature.
Sep 14, 2022