Exploit Intelligence Platform
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2023-37602
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
Alkacon Opencms - XSS
An arbitrary file upload vulnerability in the component /workplace#!explorer of Alkacon OpenCMS v15.0 allows attackers to execute arbitrary code via uploading a crafted PNG file.
CWE-79
Jul 20, 2023
CVE-2023-24998
7.5
HIGH
1 PoC
Analysis
EPSS 0.36
Apache Commons Fileupload < 1.5 - Resource Allocation Without Limits
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.
Note that, like all of the file upload limits, the
new configuration option (FileUploadBase#setFileCountMax) is not
enabled by default and must be explicitly configured.
CWE-770
Feb 20, 2023
CVE-2023-20860
7.5
HIGH
1 PoC
Analysis
EPSS 0.56
Spring Framework <6.0.7 or <5.3.26 - Auth Bypass
Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.
Mar 27, 2023
CVE-2023-0264
5.0
MEDIUM
1 PoC
Analysis
EPSS 0.04
Keycloak - Privilege Escalation
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
CWE-287
Aug 04, 2023
CVE-2022-1471
8.3
HIGH
6 PoCs
Analysis
EPSS 0.94
PyTorch Model Server Registration and Deserialization RCE
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
CWE-502
Dec 01, 2022
CVE-2022-41678
8.8
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.93
Jolokia - RCE
Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.
In details, in ActiveMQ configurations, jetty allows
org.jolokia.http.AgentServlet to handler request to /api/jolokia
org.jolokia.http.HttpRequestHandler#handlePostRequest is able to
create JmxRequest through JSONObject. And calls to
org.jolokia.http.HttpRequestHandler#executeRequest.
Into deeper calling stacks,
org.jolokia.handler.ExecHandler#doHandleRequest can be invoked
through refection. This could lead to RCE through via
various mbeans. One example is unrestricted deserialization in jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11.
1 Call newRecording.
2 Call setConfiguration. And a webshell data hides in it.
3 Call startRecording.
4 Call copyTo method. The webshell will be written to a .jsp file.
The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia.
A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
CWE-287
Nov 28, 2023
CVE-2022-46364
9.8
CRITICAL
6 PoCs
Analysis
EPSS 0.00
Apache CXF <3.5.5, <3.4.10 - SSRF
A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.
CWE-918
Dec 13, 2022
CVE-2022-22947
10.0
CRITICAL
KEV
66 PoCs
Analysis
NUCLEI
EPSS 0.94
Spring Cloud Gateway Remote Code Execution
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
CWE-917
Mar 03, 2022
CVE-2022-42889
9.8
CRITICAL
EXPLOITED
62 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Commons Text < 1.10.0 - Code Injection
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
CWE-94
Oct 13, 2022
CVE-2022-36883
7.5
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.79
Jenkins Git < 4.11.3 - Missing Authorization
A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
CWE-862
Jul 27, 2022
CVE-2022-22965
9.8
CRITICAL
KEV
RANSOMWARE
119 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Spring Framework < 5.2.20 - Code Injection
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
CWE-94
Apr 01, 2022
CVE-2022-47042
8.8
HIGH
1 PoC
EPSS 0.00
MCMS <5.2.10 - File Write
MCMS v5.2.10 and below was discovered to contain an arbitrary file write vulnerability via the component ms/template/writeFileContent.do.
CWE-434
Jan 26, 2023
CVE-2022-4640
3.5
LOW
1 PoC
EPSS 0.00
Mingsoft MCMS 5.2.9 - XSS
A vulnerability has been found in Mingsoft MCMS 5.2.9 and classified as problematic. Affected by this vulnerability is the function save of the component Article Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216499.
CWE-707
Dec 21, 2022
CVE-2022-4375
6.3
MEDIUM
1 PoC
NUCLEI
EPSS 0.26
Mingsoft MCMS <5.2.9 - SQL Injection
A vulnerability was found in Mingsoft MCMS up to 5.2.9. It has been classified as critical. Affected is an unknown function of the file /cms/category/list. The manipulation of the argument sqlWhere leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.2.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215196.
CWE-89
Dec 09, 2022
CVE-2022-4350
3.5
LOW
1 PoC
EPSS 0.00
Mingsoft MCMS 5.2.8 - XSS
A vulnerability, which was classified as problematic, was found in Mingsoft MCMS 5.2.8. Affected is an unknown function of the file search.do. The manipulation of the argument content_title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215112.
CWE-707
Dec 08, 2022
CVE-2022-4348
3.5
LOW
1 PoC
EPSS 0.00
y_project RuoYi-Cloud - XSS
A vulnerability was found in y_project RuoYi-Cloud. It has been rated as problematic. Affected by this issue is some unknown functionality of the component JSON Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215108.
CWE-707
Dec 08, 2022
CVE-2022-36599
9.8
CRITICAL
1 PoC
EPSS 0.01
Mingsoft MCMS 5.2.8 - SQL Injection
Mingsoft MCMS 5.2.8 was discovered to contain a SQL injection vulnerability in /mdiy/model/delete URI via models Lists.
CWE-89
Aug 16, 2022
CVE-2022-32065
5.4
MEDIUM
1 PoC
1 Writeup
EPSS 0.00
Ruoyi < 4.7.3 - XSS
An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.
CWE-79
Jul 13, 2022
CVE-2022-30506
9.8
CRITICAL
1 PoC
EPSS 0.03
Mingsoft Mcms - Unrestricted File Upload
An arbitrary file upload vulnerability was discovered in MCMS 5.2.7, allowing an attacker to execute arbitrary code through a crafted ZIP file.
CWE-434
Jun 02, 2022
CVE-2022-26585
9.8
CRITICAL
1 PoC
NUCLEI
EPSS 0.48
Mingsoft MCMS <5.2.7 - SQL Injection
Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection vulnerability via /cms/content/list.
CWE-89
Apr 05, 2022