Exploit Intelligence Platform

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
171 results Clear all
CVE-2022-3294 6.6 MEDIUM 1 PoC Analysis EPSS 0.01
Kubernetes - Info Disclosure
Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.
CWE-20 Mar 01, 2023
CVE-2022-41924 9.6 CRITICAL 1 PoC Analysis EPSS 0.53
Tailscale < 1.32.3 - CSRF
A vulnerability identified in the Tailscale Windows client allows a malicious website to reconfigure the Tailscale daemon `tailscaled`, which can then be used to remotely execute code. In the Tailscale Windows client, the local API was bound to a local TCP socket, and communicated with the Windows client GUI in cleartext with no Host header verification. This allowed an attacker-controlled website visited by the node to rebind DNS to an attacker-controlled DNS server, and then make local API requests in the client, including changing the coordination server to an attacker-controlled coordination server. An attacker-controlled coordination server can send malicious URL responses to the client, including pushing executables or installing an SMB share. These allow the attacker to remotely execute code on the node. All Windows clients prior to version v.1.32.3 are affected. If you are running Tailscale on Windows, upgrade to v1.32.3 or later to remediate the issue.
CWE-346 Nov 23, 2022
CVE-2022-33082 7.5 HIGH 1 PoC Analysis EPSS 0.01
Open Policy Agent <0.10.2 - DoS
An issue in the AST parser (ast/compile.go) of Open Policy Agent v0.10.2 allows attackers to cause a Denial of Service (DoS) via a crafted input.
Jun 30, 2022
CVE-2022-1227 8.8 HIGH 1 PoC Analysis EPSS 0.34
Podman < 4.0.0 - Improper Privilege Management
A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
CWE-269 Apr 29, 2022
CVE-2022-45003 7.5 HIGH 1 PoC Analysis EPSS 0.01
Gophish < 0.12.1 - Denial of Service
Gophish through 0.12.1 allows attackers to cause a Denial of Service (DoS) via a crafted payload involving autofocus.
CWE-400 Mar 22, 2023
CVE-2022-45004 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Gophish < 0.12.1 - XSS
Gophish through 0.12.1 was discovered to contain a cross-site scripting (XSS) vulnerability via a crafted landing page.
CWE-79 Mar 22, 2023
CVE-2022-38580 9.8 CRITICAL 1 PoC Analysis EPSS 0.49
Zalando Skipper <0.13.236 - SSRF
Zalando Skipper v0.13.236 is vulnerable to Server-Side Request Forgery (SSRF).
CWE-918 Oct 25, 2022
CVE-2022-41717 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Go Server < - Memory Corruption
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
CWE-770 Dec 08, 2022
CVE-2022-3328 7.8 HIGH 1 PoC Analysis EPSS 0.00
snap-confine - Buffer Overflow
Race condition in snap-confine's must_mkdir_and_open_with_perms()
CWE-362 Jan 08, 2024
CVE-2022-36633 8.8 HIGH 1 PoC Analysis EPSS 0.30
Teleport < 10.1.2 - OS Command Injection
Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload.
CWE-78 Aug 24, 2022
CVE-2022-23648 7.5 HIGH 1 PoC Analysis EPSS 0.06
Linuxfoundation Containerd < 1.4.13 - Information Disclosure
containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd’s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.
CWE-200 Mar 03, 2022
CVE-2022-0811 8.8 HIGH 1 PoC Analysis EPSS 0.22
Kubernetes Cri-o < 1.19.6 - Code Injection
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
CWE-94 Mar 16, 2022
CVE-2022-24348 7.7 HIGH 1 PoC Analysis EPSS 0.03
Argo CD <2.1.9 & <2.2.4 - Path Traversal
Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related to Helm charts because of an error in helmTemplate in repository.go. For example, an attacker may be able to discover credentials stored in a YAML file.
CWE-22 Feb 04, 2022
CVE-2021-43798 7.5 HIGH KEV 58 PoCs Analysis NUCLEI EPSS 0.94
Grafana Plugin Path Traversal
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
CWE-22 Dec 07, 2021
CVE-2021-39156 8.1 HIGH 1 PoC Analysis EPSS 0.00
Istio < 1.9.8 - Incorrect Authorization
Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies. Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize the path.
CWE-706 Aug 24, 2021
CVE-2021-25741 8.8 HIGH 3 PoCs Analysis EPSS 0.33
Kubernetes - Path Traversal
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.
CWE-552 Sep 20, 2021
CVE-2021-46398 8.8 HIGH 3 PoCs Analysis EPSS 0.10
Filebrowser <2.18.0 - CSRF
A Cross-Site Request Forgery vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. An admin can run commands using the FileBrowser and hence it leads to RCE.
CWE-352 Feb 04, 2022
CVE-2021-25735 6.5 MEDIUM 2 PoCs Analysis EPSS 0.14
Kube-apiserver - Privilege Escalation
A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.
CWE-372 Sep 06, 2021
CVE-2021-36782 9.9 CRITICAL 2 PoCs Analysis EPSS 0.80
Suse Rancher < 2.5.16 - Cleartext Storage
A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners, Project Members and User Base to use the Kubernetes API to retrieve plaintext version of sensitive data. This issue affects: SUSE Rancher Rancher versions prior to 2.5.16; Rancher versions prior to 2.6.7.
CWE-312 Sep 07, 2022
CVE-2021-28378 3.7 LOW 1 PoC Analysis EPSS 0.13
Gitea <1.13.4 - XSS
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
CWE-79 Mar 15, 2021