Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
846 results Clear all
CVE-2020-13941 8.8 HIGH 1 PoC Analysis EPSS 0.03
Apache Solr < 8.6.0 - Improper Input Validation
Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parameter, which was not validated, i.e you could read/write to any location the solr user can access.
CWE-20 Aug 17, 2020
CVE-2020-7656 6.1 MEDIUM 1 PoC Analysis EPSS 0.01
Jquery < 1.9.0 - XSS
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
CWE-79 May 19, 2020
CVE-2020-1948 9.8 CRITICAL 4 PoCs Analysis EPSS 0.64
Apache Dubbo < 2.5.10 - Insecure Deserialization
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
CWE-502 Jul 14, 2020
CVE-2020-17523 9.8 CRITICAL 2 PoCs Analysis EPSS 0.89
Apache Shiro <1.7.1 - Auth Bypass
Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
CWE-287 Feb 03, 2021
CVE-2020-5421 6.5 MEDIUM 2 PoCs Analysis EPSS 0.64
Spring Framework <5.2.9 - RCE
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
Sep 19, 2020
CVE-2020-9480 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Apache Spark < 2.4.5 - Missing Authentication
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
CWE-306 Jun 23, 2020
CVE-2020-27838 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.85
Redhat Keycloak < 13.0.0 - Authentication Bypass
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
CWE-287 Mar 08, 2021
CVE-2020-5245 7.9 HIGH 1 PoC Analysis EPSS 0.06
Dropwizard Validation < 1.3.19 - Injection
Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2.
CWE-74 Feb 24, 2020
CVE-2020-5398 7.5 HIGH 1 PoC Analysis EPSS 0.90
Vmware Spring Framework < 5.0.16 - XSS
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
CWE-494 Jan 17, 2020
CVE-2020-13937 5.3 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.93
Apache Kylin <4.0.0 - Info Disclosure
Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it is dangerous because some confidential information entries will be disclosed to everyone.
CWE-922 Oct 19, 2020
CVE-2020-13935 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.92
Apache Tomcat < 7.0.104 - Infinite Loop
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
CWE-835 Jul 14, 2020
CVE-2020-7934 5.4 MEDIUM 3 PoCs Analysis EPSS 0.03
LifeRay Portal CE <7.2.1 GA2 - XSS
In LifeRay Portal CE 7.1.0 through 7.2.1 GA2, the First Name, Middle Name, and Last Name fields for user accounts in MyAccountPortlet are all vulnerable to a persistent XSS issue. Any user can modify these fields with a particular XSS payload, and it will be stored in the database. The payload will then be rendered when a user utilizes the search feature to search for other users (i.e., if a user with modified fields occurs in the search results). This issue was fixed in Liferay Portal CE version 7.3.0 GA1.
CWE-79 Jan 28, 2020
CVE-2020-11996 7.5 HIGH 1 PoC Analysis EPSS 0.45
Apache Tomcat <10.0.0-M6, <9.0.36, <8.5.56 - DoS
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
Jun 26, 2020
CVE-2020-27223 5.2 MEDIUM 2 PoCs Analysis EPSS 0.34
Eclipse Jetty 9.4.6-11.0.0 - DoS
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
CWE-407 Feb 26, 2021
CVE-2020-1956 8.8 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
Apache Kylin < 2.3.2 - OS Command Injection
Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
CWE-78 May 22, 2020
CVE-2020-13957 9.8 CRITICAL 1 PoC Analysis EPSS 0.85
Apache Solr < 6.6.6 - Incorrect Authorization
Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions.
CWE-863 Oct 13, 2020
CVE-2020-17527 7.5 HIGH 1 PoC Analysis EPSS 0.11
Apache Tomcat <10.0.0-M9, 9.0.39, 8.5.59 - Info Disclosure
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
CWE-200 Dec 03, 2020
CVE-2020-17518 7.5 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Apache Flink <1.11.3-1.12.0 - Path Traversal
Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.
CWE-22 Jan 05, 2021
CVE-2020-28052 8.1 HIGH 2 PoCs Analysis EPSS 0.04
Legion of the Bouncy Castle BC Java <1.67 - Info Disclosure
An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.
Dec 18, 2020
CVE-2020-1937 8.8 HIGH 1 PoC Analysis EPSS 0.07
Apache Kylin < 2.3.2 - SQL Injection
Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
CWE-89 Feb 24, 2020