Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
846 results Clear all
CVE-2022-41853 8.0 HIGH 1 PoC Analysis EPSS 0.70
HSQLDB - RCE
Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.
CWE-470 Oct 06, 2022
CVE-2022-41401 6.5 MEDIUM 1 PoC Analysis EPSS 0.05
OpenRefine <3.5.2 - SSRF
OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure.
CWE-918 Aug 04, 2023
CVE-2022-23305 9.8 CRITICAL 3 PoCs Analysis EPSS 0.12
Apache Log4j < 1.2.17 - SQL Injection
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CWE-89 Jan 18, 2022
CVE-2022-41828 8.1 HIGH 1 PoC Analysis EPSS 0.10
Amazon AWS Redshift JDBC Driver <2.1.0.8 - Code Injection
In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name.
CWE-704 Sep 29, 2022
CVE-2022-36944 9.8 CRITICAL 1 PoC Analysis EPSS 0.65
Scala < 2.13.9 - Insecure Deserialization
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
CWE-502 Sep 23, 2022
CVE-2022-45047 9.8 CRITICAL 1 PoC Analysis EPSS 0.05
Apache Sshd < 2.9.1 - Insecure Deserialization
Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.
CWE-502 Nov 16, 2022
CVE-2022-41966 8.2 HIGH 1 PoC Analysis EPSS 0.02
Xstream < 1.4.20 - Denial of Service
XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.
CWE-502 Dec 28, 2022
CVE-2022-22971 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Vmware Spring Framework < 5.2.21 - Resource Allocation Without Limits
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.
CWE-770 May 12, 2022
CVE-2022-36663 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
Gluu Oxauth < 4.4.1 - SSRF
Gluu Oxauth before v4.4.1 allows attackers to execute blind SSRF (Server-Side Request Forgery) attacks via a crafted request_uri parameter.
CWE-918 Sep 06, 2022
CVE-2022-2466 9.8 CRITICAL 1 PoC Analysis EPSS 0.13
Quarkus < 2.10.4 - HTTP Request Smuggling
It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior.
CWE-444 Aug 31, 2022
CVE-2022-34298 5.3 MEDIUM 1 PoC Analysis EPSS 0.45
OpenAM <14.6.6 - Privilege Escalation
The NT auth module in OpenAM before 14.6.6 allows a "replace Samba username attack."
Jun 23, 2022
CVE-2022-22968 5.3 MEDIUM 1 PoC Analysis EPSS 0.21
Spring Framework <5.3.18,<5.2.20 - Info Disclosure
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.
CWE-178 Apr 14, 2022
CVE-2022-22976 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Vmware Spring Security < 5.5.7 - Integer Overflow
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.
CWE-190 May 19, 2022
CVE-2022-0265 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
GitHub hazelcast/hazelcast <5.1-BETA-1 - SSRF
Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
CWE-611 Mar 03, 2022
CVE-2022-27772 7.8 HIGH 1 PoC Analysis EPSS 0.00
Vmware Spring Boot < 2.2.11 - Exposure to Wrong Actor
spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer
CWE-668 Mar 30, 2022
CVE-2022-0219 5.5 MEDIUM 1 PoC Analysis EPSS 0.01
skylot/jadx <1.3.2 - XML External Entity Reference
Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
CWE-611 Jan 20, 2022
CVE-2021-44228 10.0 CRITICAL KEV RANSOMWARE 452 PoCs Analysis NUCLEI EPSS 0.94
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
CWE-502 Dec 10, 2021
CVE-2021-34429 5.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Eclipse Jetty < 9.4.43 - Information Disclosure
For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.
CWE-551 Jul 15, 2021
CVE-2021-23369 5.6 MEDIUM 2 PoCs Analysis EPSS 0.02
Handlebars < 4.7.7 - Remote Code Execution
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
Apr 12, 2021
CVE-2021-34371 9.8 CRITICAL 4 PoCs Analysis EPSS 0.65
Neo4j < 3.4.18 - Insecure Deserialization
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
CWE-502 Aug 05, 2021