Exploit Intelligence Platform

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
846 results Clear all
CVE-2021-28164 5.3 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.93
Eclipse Jetty - Information Disclosure
In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
CWE-551 Apr 01, 2021
CVE-2021-38294 9.8 CRITICAL 1 PoC Analysis EPSS 0.85
Apache Storm <2.2.1, <1.2.4 - Command Injection
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
CWE-78 Oct 25, 2021
CVE-2021-31684 7.5 HIGH 2 PoCs Analysis EPSS 0.00
Json-smart-v1 < 1.3.3 - Out-of-Bounds Write
A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions 1.3 and 2.4 which causes a denial of service (DOS) via a crafted web request.
CWE-787 Jun 01, 2021
CVE-2021-35516 7.5 HIGH 2 PoCs Analysis EPSS 0.01
Compress - Memory Corruption
When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
CWE-130 Jul 13, 2021
CVE-2021-35517 7.5 HIGH 2 PoCs Analysis EPSS 0.01
Compress - Memory Corruption
When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.
CWE-130 Jul 13, 2021
CVE-2021-21363 5.3 MEDIUM 2 PoCs Analysis EPSS 0.00
Smartbear Swagger-codegen < 2.4.19 - Privilege Escalation
swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. For more details refer to the referenced GitHub Security Advisory. This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21364.
CWE-378 Mar 11, 2021
CVE-2021-43859 7.5 HIGH 2 PoCs Analysis EPSS 0.02
XStream <1.4.19 - DoS
XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.
CWE-400 Feb 01, 2022
CVE-2021-20190 8.1 HIGH 2 PoCs Analysis EPSS 0.01
Fasterxml Jackson-databind < 2.6.7.5 - Insecure Deserialization
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CWE-502 Jan 19, 2021
CVE-2021-21364 5.3 MEDIUM 2 PoCs Analysis EPSS 0.00
Smartbear Swagger-codegen < 2.4.19 - Information Disclosure
swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. Because this vulnerability impacts generated code, the generated code will remain vulnerable until fixed manually! This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21363.
CWE-378 Mar 11, 2021
CVE-2021-41269 10.0 CRITICAL 3 PoCs Analysis EPSS 0.02
cron-utils <9.1.2 - RCE
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
CWE-94 Nov 15, 2021
CVE-2021-35515 7.5 HIGH 2 PoCs Analysis EPSS 0.01
Compress - DoS
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
CWE-834 Jul 13, 2021
CVE-2021-36090 7.5 HIGH 2 PoCs Analysis EPSS 0.01
Compress - Memory Corruption
When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
CWE-130 Jul 13, 2021
CVE-2021-27905 9.8 CRITICAL 5 PoCs Analysis NUCLEI EPSS 0.94
Apache Solr - SSRF
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
CWE-918 Apr 13, 2021
CVE-2021-41184 6.5 MEDIUM 2 PoCs Analysis EPSS 0.25
jQuery-UI <1.13.0 - Code Injection
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.
CWE-79 Oct 26, 2021
CVE-2021-30181 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
Apache Dubbo <2.6.9-2.7.9 - RCE
Apache Dubbo prior to 2.6.9 and 2.7.9 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by the script which by default may enable executing arbitrary code.
Jun 01, 2021
CVE-2021-26291 9.1 CRITICAL 1 PoC Analysis EPSS 0.46
Apache Maven < 3.8.1 - Origin Validation Error
Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
CWE-346 Apr 23, 2021
CVE-2021-21345 5.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.88
Netapp Oncommand Insight < 5.15.14 - Insecure Deserialization
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
CWE-502 Mar 23, 2021
CVE-2021-30180 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
Apache Dubbo <2.7.9 - RCE
Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.
CWE-444 Jun 01, 2021
CVE-2021-4178 6.7 MEDIUM 1 PoC Analysis EPSS 0.00
Redhat Fabric8-kubernetes < 5.0.3 - Insecure Deserialization
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
CWE-502 Aug 24, 2022
CVE-2021-29425 4.8 MEDIUM 2 PoCs Analysis EPSS 0.00
Apache Commons IO < 2.4.0 - Path Traversal
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
CWE-22 Apr 13, 2021