Exploit Intelligence Platform
Updated 33m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2022-23315
9.8
CRITICAL
1 PoC
EPSS 0.01
Mingsoft Mcms - Unrestricted File Upload
MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component /ms/template/writeFileContent.do.
CWE-434
Jan 21, 2022
CVE-2022-22930
9.8
CRITICAL
1 PoC
EPSS 0.11
Mingsoft Mcms < 5.2.9 - Remote Code Execution
A remote code execution (RCE) vulnerability in the Template Management function of MCMS v5.2.4 allows attackers to execute arbitrary code via a crafted payload.
Jan 21, 2022
CVE-2022-22929
9.8
CRITICAL
1 PoC
EPSS 0.03
Mingsoft Mcms - Unrestricted File Upload
MCMS v5.2.4 was discovered to have an arbitrary file upload vulnerability in the New Template module, which allows attackers to execute arbitrary code via a crafted ZIP file.
CWE-434
Jan 21, 2022
CVE-2022-33891
8.8
HIGH
KEV
14 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Spark UI - Privilege Escalation
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.
CWE-78
Jul 18, 2022
CVE-2022-22963
9.8
CRITICAL
KEV
35 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Spring Cloud Function < 3.1.6 - Remote Code Execution
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
CWE-917
Apr 01, 2022
CVE-2022-40664
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Apache Shiro < 1.10.0 - Authentication Bypass
Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
CWE-287
Oct 12, 2022
CVE-2022-33980
9.8
CRITICAL
6 PoCs
Analysis
EPSS 0.87
Apache Commons Configuration <2.8 - RCE
Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.
Jul 06, 2022
CVE-2022-32532
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.81
Apache Shiro < 1.9.1 - Incorrect Authorization
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
CWE-863
Jun 29, 2022
CVE-2022-29885
7.5
HIGH
4 PoCs
Analysis
EPSS 0.56
Apache Tomcat < 8.5.78 - Denial of Service
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.
CWE-400
May 12, 2022
CVE-2022-31692
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.08
Vmware Spring Security < 5.6.9 - IDOR
Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and include dispatcher types. The application uses the AuthorizationFilter either manually or via the authorizeHttpRequests() method. The application configures the FilterChainProxy to apply to forward and/or include requests (e.g. spring.security.filter.dispatcher-types = request, error, async, forward, include). The application may forward or include the request to a higher privilege-secured endpoint.The application configures Spring Security to apply to every dispatcher type via authorizeHttpRequests().shouldFilterAllDispatcherTypes(true)
CWE-639
Oct 31, 2022
CVE-2022-34305
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.17
Apache Tomcat < 8.5.81 - XSS
In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.
CWE-79
Jun 23, 2022
CVE-2022-22978
9.8
CRITICAL
9 PoCs
Analysis
EPSS 0.91
Vmware Spring Security < 5.5.7 - Incorrect Authorization
In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
CWE-863
May 19, 2022
CVE-2022-22980
9.8
CRITICAL
8 PoCs
Analysis
EPSS 0.83
Spring Data MongoDB - Code Injection
A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized.
CWE-917
Jun 23, 2022
CVE-2022-28108
8.8
HIGH
3 PoCs
Analysis
EPSS 0.22
Selenium Grid < 4.0.0 - CSRF
Selenium Server (Grid) before 4 allows CSRF because it permits non-JSON content types such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.
CWE-352
Apr 19, 2022
CVE-2022-23457
7.5
HIGH
3 PoCs
Analysis
EPSS 0.00
Owasp Enterprise Security API < 2.3.0.0 - Path Traversal
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
CWE-22
Apr 25, 2022
CVE-2022-29599
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Apache Maven maven-shared-utils <3.3.3 - Command Injection
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
CWE-116
May 23, 2022
CVE-2022-4361
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.01
Keycloak - XSS
Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.
CWE-81
Jul 07, 2023
CVE-2022-4137
8.1
HIGH
1 PoC
Analysis
EPSS 0.01
Redhat Keycloak < 20.0.5 - XSS
A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.
CWE-81
Sep 25, 2023
CVE-2022-3782
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Redhat Keycloak < 20.0.2 - Path Traversal
keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.
CWE-22
Jan 13, 2023
CVE-2022-1274
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.01
Redhat Keycloak < 20.0.5 - Basic XSS
A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.
CWE-80
Mar 29, 2023