Exploit Intelligence Platform

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
846 results Clear all
CVE-2020-36185 8.1 HIGH 2 PoCs Analysis EPSS 0.03
Fasterxml Jackson-databind < 2.6.7.5 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.
CWE-502 Jan 06, 2021
CVE-2020-11112 8.8 HIGH 2 PoCs Analysis EPSS 0.07
FasterXML jackson-databind <2.9.10.4 - RCE
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
CWE-502 Mar 31, 2020
CVE-2020-35491 8.1 HIGH 2 PoCs Analysis EPSS 0.06
Fasterxml Jackson-databind < 2.9.10.8 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.
CWE-502 Dec 17, 2020
CVE-2020-36187 8.1 HIGH 2 PoCs Analysis EPSS 0.02
Fasterxml Jackson-databind < 2.6.7.5 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
CWE-502 Jan 06, 2021
CVE-2020-36518 7.5 HIGH 3 PoCs Analysis EPSS 0.01
Fasterxml Jackson-databind < 2.12.6.1 - Out-of-Bounds Write
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
CWE-787 Mar 11, 2022
CVE-2020-9548 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.58
Fasterxml Jackson-databind < 2.7.9.7 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
CWE-502 Mar 02, 2020
CVE-2020-14062 8.1 HIGH 2 PoCs Analysis EPSS 0.07
Fasterxml Jackson-databind < 2.9.10.5 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
CWE-502 Jun 14, 2020
CVE-2020-11111 8.8 HIGH 2 PoCs Analysis EPSS 0.02
FasterXML jackson-databind <2.9.10.4 - Code Injection
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
CWE-502 Mar 31, 2020
CVE-2020-8840 9.8 CRITICAL 9 PoCs Analysis EPSS 0.08
FasterXML Jackson-Databind <2.9.10.2 - RCE
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
CWE-502 Feb 10, 2020
CVE-2020-26258 6.3 MEDIUM 5 PoCs Analysis NUCLEI EPSS 0.94
XStream <1.4.15 - SSRF
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
CWE-918 Dec 16, 2020
CVE-2020-36182 8.1 HIGH 2 PoCs Analysis EPSS 0.03
Oracle Primavera Unifier < 2.6.7.5 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.
CWE-502 Jan 07, 2021
CVE-2020-11113 8.8 HIGH 3 PoCs Analysis EPSS 0.61
FasterXML Jackson-Databind <2.9.10.4 - Code Injection
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
CWE-502 Mar 31, 2020
CVE-2020-24750 8.1 HIGH 3 PoCs Analysis EPSS 0.02
Fasterxml Jackson-databind < 2.6.7.5 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
CWE-502 Sep 17, 2020
CVE-2020-11619 8.1 HIGH 2 PoCs Analysis EPSS 0.01
Fasterxml Jackson-databind < 2.9.10.4 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
CWE-502 Apr 07, 2020
CVE-2020-14195 8.1 HIGH 3 PoCs Analysis EPSS 0.09
Fasterxml Jackson-databind < 2.9.10.5 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
CWE-502 Jun 16, 2020
CVE-2020-7692 7.4 HIGH 2 PoCs Analysis EPSS 0.00
Google Oauth Client Library For Java - Incorrect Authorization
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
CWE-863 Jul 09, 2020
CVE-2020-26217 8.0 HIGH 9 PoCs Analysis NUCLEI EPSS 0.93
Xstream < 1.4.14 - OS Command Injection
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
CWE-78 Nov 16, 2020
CVE-2020-36186 8.1 HIGH 2 PoCs Analysis EPSS 0.02
Fasterxml Jackson-databind < 2.6.7.5 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.
CWE-502 Jan 06, 2021
CVE-2020-35490 8.1 HIGH 2 PoCs Analysis EPSS 0.04
Fasterxml Jackson-databind < 2.9.10.8 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.
CWE-502 Dec 17, 2020
CVE-2020-1695 7.5 HIGH 2 PoCs Analysis EPSS 0.00
Redhat Resteasy < 3.12.0 - Improper Input Validation
A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
CWE-20 May 19, 2020