Vulnerabilities Exploited in the Wild with Public PoC

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2022-1609 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
Weblizar School Management < 9.9.7 - Code Injection
The School Management WordPress plugin before 9.9.7 contains an obfuscated backdoor injected in it's license checking code that registers a REST API handler, allowing an unauthenticated attacker to execute arbitrary PHP code on the site.
CWE-94 Jan 16, 2024
CVE-2022-1119 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.82
Simplefilelist Simple-file-list < 3.2.8 - Path Traversal
The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
CWE-22 Apr 19, 2022
CVE-2022-41049 5.4 MEDIUM KEV 4 PoCs EPSS 0.13
Windows Mark of the Web - Privilege Escalation
Windows Mark of the Web Security Feature Bypass Vulnerability
Nov 09, 2022
CVE-2022-41352 9.8 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
Zimbra Collaboration <9.0 - Privilege Escalation
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
CWE-22 Sep 26, 2022
CVE-2022-40684 9.8 CRITICAL KEV RANSOMWARE 33 PoCs Analysis NUCLEI EPSS 0.94
Fortinet Fortiproxy < 7.0.7 - Authentication Bypass
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
CWE-287 Oct 18, 2022
CVE-2022-41082 8.0 HIGH KEV RANSOMWARE 12 PoCs Analysis EPSS 0.91
Microsoft Exchange Server - RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502 Oct 03, 2022
CVE-2022-41040 8.8 HIGH KEV RANSOMWARE 11 PoCs Analysis EPSS 0.94
Microsoft Exchange ProxyNotShell RCE
Microsoft Exchange Server Elevation of Privilege Vulnerability
CWE-918 Oct 03, 2022
CVE-2022-36804 8.8 HIGH KEV 20 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Bitbucket Server/Data Center <7.6.17/<7.17.10/<7.21.4/<8....
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.
CWE-78 Aug 25, 2022
CVE-2022-3236 9.8 CRITICAL KEV 2 PoCs NUCLEI EPSS 0.93
Sophos Firewall <19.0 MR1 - Code Injection
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.
CWE-94 Sep 23, 2022
CVE-2022-35405 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Zohocorp Manageengine Access Manager Plus - Insecure Deserialization
Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)
CWE-502 Jul 19, 2022
CVE-2022-40769 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.01
profanity <1.60 - Info Disclosure
profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.
CWE-338 Sep 18, 2022
CVE-2022-37969 7.8 HIGH KEV RANSOMWARE 5 PoCs Analysis EPSS 0.12
Microsoft Windows 10 1507 < 10.0.10240.19444 - Out-of-Bounds Write
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE-787 Sep 13, 2022
CVE-2022-26352 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.94
dotCMS 3.0-22.02 - Path Traversal
An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.
Jul 17, 2022
CVE-2022-24706 9.8 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
Apache Couchdb Erlang RCE
In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
CWE-1188 Apr 26, 2022
CVE-2022-22963 9.8 CRITICAL KEV 35 PoCs Analysis NUCLEI EPSS 0.94
Vmware Spring Cloud Function < 3.1.6 - Remote Code Execution
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
CWE-917 Apr 01, 2022
CVE-2022-24112 9.8 CRITICAL KEV 12 PoCs Analysis NUCLEI EPSS 0.94
APISIX Admin API default access token RCE
An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
CWE-290 Feb 11, 2022
CVE-2022-25060 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.75
Tp-link Tl-wr840n Firmware - OS Command Injection
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_startPing.
CWE-78 Feb 25, 2022
CVE-2022-21371 7.5 HIGH EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
Oracle Weblogic Server - Path Traversal
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CWE-22 Jan 19, 2022
CVE-2022-26923 8.8 HIGH KEV RANSOMWARE 9 PoCs Analysis EPSS 0.91
Active Directory Certificate Services (ADCS) privilege escalation (Certifried)
Active Directory Domain Services Elevation of Privilege Vulnerability
CWE-295 May 10, 2022
CVE-2022-22536 10.0 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
SAP NetWeaver - Request Smuggling
SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.
CWE-444 Feb 09, 2022