Vulnerabilities Exploited in the Wild with Public PoC
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2022-21971
7.8
HIGH
KEV
3 PoCs
Analysis
EPSS 0.87
Windows Runtime - RCE
Windows Runtime Remote Code Execution Vulnerability
CWE-824
Feb 09, 2022
CVE-2022-28281
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.15
Mozilla Firefox < 99.0 - Out-of-Bounds Write
If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
CWE-787
Dec 22, 2022
CVE-2022-1802
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.68
Mozilla Firefox < 100.0.2 - Prototype Pollution
If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
CWE-1321
Dec 22, 2022
CVE-2022-37042
9.8
CRITICAL
KEV
RANSOMWARE
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Synacor Zimbra Collaboration Suite - Path Traversal
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
CWE-22
Aug 12, 2022
CVE-2022-27925
7.2
HIGH
KEV
RANSOMWARE
13 PoCs
Analysis
EPSS 0.94
Zip Path Traversal in Zimbra (mboximport) (CVE-2022-27925)
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal.
CWE-22
Apr 21, 2022
CVE-2022-30333
7.5
HIGH
KEV
RANSOMWARE
7 PoCs
Analysis
EPSS 0.93
UnRAR Path Traversal (CVE-2022-30333)
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CWE-22
May 09, 2022
CVE-2022-26138
9.8
CRITICAL
KEV
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Questions For Confluence - Hardcoded Credentials
The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.
CWE-798
Jul 20, 2022
CVE-2022-31181
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.78
PrestaShop <1.7.8.7 - SQL Injection
PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and before 1.7.8.7 PrestaShop is subject to an SQL injection vulnerability which can be chained to call PHP's Eval function on attacker input. The problem is fixed in version 1.7.8.7. Users are advised to upgrade. Users unable to upgrade may delete the MySQL Smarty cache feature.
CWE-74
Aug 01, 2022
CVE-2022-30190
7.8
HIGH
KEV
RANSOMWARE
96 PoCs
Analysis
EPSS 0.93
Microsoft Office Word MSDTJS
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.
Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.
Jun 01, 2022
CVE-2022-1903
8.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.83
ARMember <3.4.8 - Auth Bypass
The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username
CWE-862
Jun 27, 2022
CVE-2022-26134
9.8
CRITICAL
KEV
RANSOMWARE
79 PoCs
Analysis
NUCLEI
EPSS 0.94
Confluence - Remote Code Execution
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
CWE-917
Jun 03, 2022
CVE-2022-27226
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.03
IRZ Ru21 Firmware < 2022-03-16 - CSRF
A CSRF issue in /api/crontab on iRZ Mobile Routers through 2022-03-16 allows a threat actor to create a crontab entry in the router administration panel. The cronjob will consequently execute the entry on the threat actor's defined interval, leading to remote code execution, allowing the threat actor to gain filesystem access. In addition, if the router's default credentials aren't rotated or a threat actor discovers valid credentials, remote code execution can be achieved without user interaction.
CWE-352
Mar 19, 2022
CVE-2022-30525
9.8
CRITICAL
KEV
RANSOMWARE
17 PoCs
Analysis
NUCLEI
EPSS 0.94
Zyxel Firewall SUID Binary Privilege Escalation
A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
CWE-78
May 12, 2022
CVE-2022-22947
10.0
CRITICAL
KEV
66 PoCs
Analysis
NUCLEI
EPSS 0.94
Spring Cloud Gateway Remote Code Execution
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
CWE-917
Mar 03, 2022
CVE-2022-1388
9.8
CRITICAL
KEV
RANSOMWARE
76 PoCs
Analysis
NUCLEI
EPSS 0.94
F5 BIG-IP iControl RCE via REST Authentication Bypass
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CWE-306
May 05, 2022
CVE-2022-29464
9.8
CRITICAL
KEV
RANSOMWARE
33 PoCs
Analysis
NUCLEI
EPSS 0.94
WSO2 Arbitrary File Upload to RCE
Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 up to 4.0.0, WSO2 Identity Server 5.2.0 up to 5.11.0, WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0 and 5.6.0, WSO2 Identity Server as Key Manager 5.3.0 up to 5.11.0, WSO2 Enterprise Integrator 6.2.0 up to 6.6.0, WSO2 Open Banking AM 1.4.0 up to 2.0.0 and WSO2 Open Banking KM 1.4.0, up to 2.0.0.
CWE-22
Apr 18, 2022
CVE-2022-26904
7.0
HIGH
KEV
1 PoC
Analysis
EPSS 0.22
Windows User Profile Service - Privilege Escalation
Windows User Profile Service Elevation of Privilege Vulnerability
CWE-362
Apr 15, 2022
CVE-2022-0847
7.8
HIGH
KEV
RANSOMWARE
122 PoCs
Analysis
EPSS 0.83
Dirty Pipe Local Privilege Escalation via CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
CWE-665
Mar 10, 2022
CVE-2022-22718
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.08
Windows Print Spooler - Privilege Escalation
Windows Print Spooler Elevation of Privilege Vulnerability
Feb 09, 2022
CVE-2022-1364
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.18
Google Chrome < 100.0.4896.127 - Type Confusion
Type confusion in V8 Turbofan in Google Chrome prior to 100.0.4896.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-843
Jul 26, 2022