Exploit Intelligence Platform
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2022-41853
8.0
HIGH
1 PoC
Analysis
EPSS 0.70
HSQLDB - RCE
Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.
CWE-470
Oct 06, 2022
CVE-2022-41401
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.05
OpenRefine <3.5.2 - SSRF
OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure.
CWE-918
Aug 04, 2023
CVE-2022-23305
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.12
Apache Log4j < 1.2.17 - SQL Injection
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CWE-89
Jan 18, 2022
CVE-2022-41828
8.1
HIGH
1 PoC
Analysis
EPSS 0.10
Amazon AWS Redshift JDBC Driver <2.1.0.8 - Code Injection
In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name.
CWE-704
Sep 29, 2022
CVE-2022-36944
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.65
Scala < 2.13.9 - Insecure Deserialization
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
CWE-502
Sep 23, 2022
CVE-2022-45047
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.05
Apache Sshd < 2.9.1 - Insecure Deserialization
Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.
CWE-502
Nov 16, 2022
CVE-2022-41966
8.2
HIGH
1 PoC
Analysis
EPSS 0.02
Xstream < 1.4.20 - Denial of Service
XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.
CWE-502
Dec 28, 2022
CVE-2022-22971
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Vmware Spring Framework < 5.2.21 - Resource Allocation Without Limits
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.
CWE-770
May 12, 2022
CVE-2022-36663
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.16
Gluu Oxauth < 4.4.1 - SSRF
Gluu Oxauth before v4.4.1 allows attackers to execute blind SSRF (Server-Side Request Forgery) attacks via a crafted request_uri parameter.
CWE-918
Sep 06, 2022
CVE-2022-2466
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.13
Quarkus < 2.10.4 - HTTP Request Smuggling
It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior.
CWE-444
Aug 31, 2022
CVE-2022-34298
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.45
OpenAM <14.6.6 - Privilege Escalation
The NT auth module in OpenAM before 14.6.6 allows a "replace Samba username attack."
Jun 23, 2022
CVE-2022-22968
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.21
Spring Framework <5.3.18,<5.2.20 - Info Disclosure
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.
CWE-178
Apr 14, 2022
CVE-2022-22976
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
Vmware Spring Security < 5.5.7 - Integer Overflow
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.
CWE-190
May 19, 2022
CVE-2022-0265
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
GitHub hazelcast/hazelcast <5.1-BETA-1 - SSRF
Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
CWE-611
Mar 03, 2022
CVE-2022-27772
7.8
HIGH
1 PoC
Analysis
EPSS 0.00
Vmware Spring Boot < 2.2.11 - Exposure to Wrong Actor
spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer
CWE-668
Mar 30, 2022
CVE-2022-0219
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.01
skylot/jadx <1.3.2 - XML External Entity Reference
Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
CWE-611
Jan 20, 2022
CVE-2021-44228
10.0
CRITICAL
KEV
RANSOMWARE
452 PoCs
Analysis
NUCLEI
EPSS 0.94
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
CWE-502
Dec 10, 2021
CVE-2021-34429
5.3
MEDIUM
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Eclipse Jetty < 9.4.43 - Information Disclosure
For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.
CWE-551
Jul 15, 2021
CVE-2021-23369
5.6
MEDIUM
2 PoCs
Analysis
EPSS 0.02
Handlebars < 4.7.7 - Remote Code Execution
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
Apr 12, 2021
CVE-2021-34371
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.65
Neo4j < 3.4.18 - Insecure Deserialization
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
CWE-502
Aug 05, 2021