CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
291 results Clear all
CVE-2016-10711 9.8 CRITICAL EPSS 0.01
Debian Linux < 2.7 - HTTP Request Smuggling
Apsis Pound before 2.8a allows request smuggling via crafted headers, a different vulnerability than CVE-2005-3751.
CWE-444 Jan 29, 2018
CVE-2017-7559 6.1 MEDIUM 1 PoC Analysis EPSS 0.01
Undertow <2.0.0.Alpha2,<1.4.17.Final,<1.3.31.Final - SSRF
In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
CWE-444 Jan 10, 2018
CVE-2017-12158 5.4 MEDIUM EPSS 0.01
Keycloak - Reflected XSS
It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
CWE-444 Oct 26, 2017
CVE-2017-15643 7.4 HIGH 1 PoC Analysis EPSS 0.07
Ikarussecurity Ikarus Antivirus - HTTP Request Smuggling
An active network attacker (MiTM) can achieve remote code execution on a machine that runs IKARUS Anti Virus 2.16.7. IKARUS AV for Windows uses cleartext HTTP for updates along with a CRC32 checksum and an update value for verification of the downloaded files. The attacker first forces the client to initiate an update transaction by modifying an update field within an HTTP 200 response, so that it refers to a nonexistent update. The attacker then modifies the HTTP 404 response so that it specifies a successfully found update, with a Trojan horse executable file (e.g., guardxup.exe) and the correct CRC32 checksum for that file.
CWE-444 Oct 19, 2017
CVE-2015-5740 9.8 CRITICAL 1 Writeup EPSS 0.04
Go <1.4.3 - HTTP Request Smuggling
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request with two Content-length headers.
CWE-444 Oct 18, 2017
CVE-2015-5739 9.8 CRITICAL 1 Writeup EPSS 0.12
Go <1.4.3 - SSRF
The net/http library in net/textproto/reader.go in Go before 1.4.3 does not properly parse HTTP header keys, which allows remote attackers to conduct HTTP request smuggling attacks via a space instead of a hyphen, as demonstrated by "Content Length" instead of "Content-Length."
CWE-444 Oct 18, 2017
CVE-2017-7561 7.5 HIGH 1 PoC Analysis EPSS 0.01
Red Hat JBoss EAP <4.0.0.Beta1 - SSRF
Red Hat JBoss EAP version 3.0.7 through before 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact.
CWE-346 Sep 13, 2017
CVE-2017-8894 8.1 HIGH EPSS 0.01
AeroAdmin 4.1 - Code Injection
AeroAdmin 4.1 uses an insecure protocol (HTTP) to perform software updates. An attacker can hijack an update via man-in-the-middle in order to execute code in the machine.
CWE-444 Jul 02, 2017
CVE-2006-6276 EPSS 0.01
Sun Java System Proxy Server <20061130 - SSRF/XSS
HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
CWE-444 Dec 04, 2006
CVE-2005-2089 EPSS 0.36
Microsoft Internet Information Services - HTTP Request Smuggling
Microsoft IIS 5.0 and 6.0 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes IIS to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
CWE-444 Jul 05, 2005
CVE-2005-2088 EPSS 0.54
Apache HTTP Server < 2.0.55 - HTTP Request Smuggling
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
CWE-444 Jul 05, 2005