Exploit Intelligence Platform
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2022-4065
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.01
cbeust testng <7.5.1,7.7.1 - Path Traversal
A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027.
CWE-22
Nov 19, 2022
CVE-2022-24891
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.01
Owasp Enterprise Security API < 2.3.0.0 - XSS
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
CWE-79
Apr 27, 2022
CVE-2022-22931
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.03
Apache James < 3.6.2 - Path Traversal
Fix of CVE-2021-40525 do not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used).
CWE-22
Feb 07, 2022
CVE-2022-26049
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.02
com.diffplug.gradle:goomph <3.37.2 - Code Injection
This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution on a target system by exploiting this vulnerability. **Note:** This could have allowed a malicious zip file to extract itself into an arbitrary directory. The only file that Goomph extracts is the p2 bootstrapper and eclipse metadata files hosted at eclipse.org, which are not malicious, so the only way this vulnerability could have affected you is if you had set a custom bootstrap zip, and that zip was malicious.
CWE-22
Sep 11, 2022
CVE-2022-32287
7.5
HIGH
1 PoC
Analysis
EPSS 0.01
Apache Uimaj < 3.3.0 - Path Traversal
A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine.
CWE-22
Nov 03, 2022
CVE-2022-33140
8.8
HIGH
1 PoC
Analysis
EPSS 0.04
Apache NiFi <1.16.2 - Command Injection
The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
CWE-78
Jun 15, 2022
CVE-2022-46166
8.0
HIGH
1 PoC
Analysis
EPSS 0.27
Spring Boot Admin <2.7.8 - Info Disclosure
Spring boot admins is an open source administrative user interface for management of spring boot applications. All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are affected. Users are advised to upgrade to the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 to resolve this issue. Users unable to upgrade may disable any notifier or disable write access (POST request) on `/env` actuator endpoint.
CWE-94
Dec 09, 2022
CVE-2022-26884
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.02
Apache DolphinScheduler <2.0.6 - Info Disclosure
Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.
CWE-22
Oct 28, 2022
CVE-2022-25842
6.9
MEDIUM
1 PoC
Analysis
EPSS 0.03
Alibabagroup One-java-agent < 0.0.2 - Path Traversal
All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine.
CWE-22
May 01, 2022
CVE-2022-23082
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Mend Curekit < 1.1.3 - Path Traversal
In CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function isFileOutsideDir fails to sanitize the user input which may lead to path traversal.
CWE-22
May 31, 2022
CVE-2022-37422
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Payara < 4.1.2.191.36 - Path Traversal
Payara through 5.2022.2 allows directory traversal without authentication. This affects Payara Server, Payara Micro, and Payara Server Embedded.
CWE-22
Aug 18, 2022
CVE-2022-31160
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.10
jQuery UI <1.13.2 - XSS
jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`.
CWE-79
Jul 20, 2022
CVE-2022-25845
8.1
HIGH
7 PoCs
Analysis
EPSS 0.89
Alibaba Fastjson < 1.2.83 - Insecure Deserialization
The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).
CWE-502
Jun 10, 2022
CVE-2022-34169
7.5
HIGH
3 PoCs
Analysis
EPSS 0.07
Apache Xalan <2.7.3 - Code Injection
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
CWE-681
Jul 19, 2022
CVE-2022-24816
10.0
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Geosolutionsgroup Jai-ext < 1.1.22 - Code Injection
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
CWE-94
Apr 13, 2022
CVE-2022-22970
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
Vmware Spring Framework < 5.2.21 - Resource Allocation Without Limits
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
CWE-770
May 12, 2022
CVE-2022-40146
7.5
HIGH
2 PoCs
Analysis
EPSS 0.48
Apache Batik < 1.15 - SSRF
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14.
CWE-918
Sep 22, 2022
CVE-2022-45688
7.5
HIGH
5 PoCs
Analysis
EPSS 0.01
Hutool < 20230227 - Out-of-Bounds Write
A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
CWE-787
Dec 13, 2022
CVE-2022-40635
6.4
MEDIUM
1 PoC
Analysis
EPSS 0.13
Crafter Studio - Command Injection
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass.
CWE-913
Sep 13, 2022
CVE-2022-40634
6.4
MEDIUM
1 PoC
Analysis
EPSS 0.15
Crafter Studio - Command Injection
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker SSTI.
CWE-913
Sep 13, 2022