Exploit Intelligence Platform

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
846 results Clear all
CVE-2021-44667 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Alibaba Nacos < 2.1.0-BETA - XSS
A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.
CWE-79 Mar 11, 2022
CVE-2021-4104 7.5 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.72
Apache Log4j < 12.0.0.4.0 - Insecure Deserialization
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CWE-502 Dec 14, 2021
CVE-2021-29505 7.5 HIGH 3 PoCs Analysis NUCLEI EPSS 0.91
Xstream < 1.4.17 - Insecure Deserialization
XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.
CWE-502 May 28, 2021
CVE-2021-27568 5.9 MEDIUM 1 PoC Analysis EPSS 0.01
netplex json-smart-v1/v2 - Info Disclosure
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
CWE-754 Feb 23, 2021
CVE-2021-3754 5.3 MEDIUM 1 PoC Analysis EPSS 0.12
Keycloak - Info Disclosure
A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.
CWE-20 Aug 26, 2022
CVE-2021-2471 5.9 MEDIUM 4 PoCs Analysis EPSS 0.64
Oracle MySQL Connector/J <8.0.26 - Privilege Escalation
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H).
Oct 20, 2021
CVE-2021-41182 6.5 MEDIUM 2 PoCs Analysis EPSS 0.28
jQuery-UI <1.13.0 - Code Injection
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.
CWE-79 Oct 26, 2021
CVE-2021-20323 6.1 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.66
Redhat Keycloak < 17.0.0 - XSS
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.
CWE-79 Mar 25, 2022
CVE-2021-43116 8.8 HIGH 2 PoCs Analysis EPSS 0.06
Nacos 2.0.3 - Privilege Escalation
An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then change the returned package, which lets a malicious user login.
CWE-287 Jul 05, 2022
CVE-2021-46361 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Magnolia CMS <6.2.11 - Code Injection
An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload.
Feb 11, 2022
CVE-2021-46366 8.8 HIGH 1 PoC Analysis EPSS 0.01
Magnolia CMS <6.2.3 - CSRF,Open Redirect
An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials.
CWE-601 Feb 11, 2022
CVE-2021-46365 7.8 HIGH 1 PoC Analysis EPSS 0.01
Magnolia <6.2.3 - XSS
An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute XML External Entity attacks via a crafted XLF file.
CWE-611 Feb 11, 2022
CVE-2021-46363 7.8 HIGH 1 PoC Analysis EPSS 0.01
Magnolia <6.2.3 - Code Injection
An issue in the Export function of Magnolia v6.2.3 and below allows attackers to perform Formula Injection attacks via crafted CSV/XLS files. These formulas may result in arbitrary code execution on a victim's computer when opening the exported files with Microsoft Excel.
CWE-1236 Feb 11, 2022
CVE-2021-46364 7.8 HIGH 1 PoC Analysis EPSS 0.01
Magnolia CMS <6.2.3 - RCE
A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.
CWE-502 Feb 11, 2022
CVE-2021-28165 7.5 HIGH 1 PoC Analysis EPSS 0.12
Eclipse Jetty < 9.4.39 - Improper Exception Handling
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
CWE-755 Apr 01, 2021
CVE-2021-34428 2.9 LOW 1 PoC Analysis EPSS 0.00
Eclipse Jetty < 9.4.40 - Insufficient Session Expiration
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
CWE-613 Jun 22, 2021
CVE-2021-37580 9.8 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.94
Apache Shenyu < 2.4.1 - Authentication Bypass
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
CWE-287 Nov 16, 2021
CVE-2021-44832 6.6 MEDIUM EXPLOITED RANSOMWARE 2 PoCs Analysis EPSS 0.54
Apache Log4j < 2.3.2 - Injection
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
CWE-74 Dec 28, 2021
CVE-2021-22053 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
Vmware Spring Cloud Netflix < 2.2.10 - Code Injection
Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.
CWE-94 Nov 19, 2021
CVE-2021-25641 9.8 CRITICAL 2 PoCs Analysis EPSS 0.75
Apache Dubbo < 2.6.9 - Insecure Deserialization
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
CWE-502 Jun 01, 2021