Exploit Intelligence Platform
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2020-2231
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Jenkins <2.251-<2.235.3 - XSS
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.
CWE-79
Aug 12, 2020
CVE-2020-2230
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Jenkins <2.251-<2.235.3 - XSS
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.
CWE-79
Aug 12, 2020
CVE-2020-2229
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.03
Jenkins <2.251-2.235.3 - XSS
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability.
CWE-79
Aug 12, 2020
CVE-2020-17531
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.69
Apache Tapestry 4 - Deserialization
A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
CWE-502
Dec 08, 2020
CVE-2020-17533
8.1
HIGH
1 PoC
Analysis
EPSS 0.05
Apache Accumulo <2.0.0 - Privilege Escalation
Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties.
CWE-252
Dec 29, 2020
CVE-2020-11975
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.88
Apache Unomi - RCE
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
Jun 05, 2020
CVE-2020-13951
7.5
HIGH
1 PoC
Analysis
EPSS 0.73
Apache Openmeetings < 5.0.0 - Denial of Service
Attackers can use public NetTest web service of Apache OpenMeetings 4.0.0-5.0.0 to organize denial of service attack.
Sep 30, 2020
CVE-2020-9495
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.27
Apache Archiva < 2.2.5 - Injection
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
CWE-74
Jun 19, 2020
CVE-2020-13925
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.85
Apache Kylin < 3.1.0 - OS Command Injection
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.
CWE-78
Jul 14, 2020
CVE-2020-1947
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.85
Apache Shardingsphere < 4.0.1 - Insecure Deserialization
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
CWE-502
Mar 11, 2020
CVE-2020-10204
7.2
HIGH
1 PoC
Analysis
EPSS 0.57
Sonatype Nexus < 3.21.2 - Improper Input Validation
Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
CWE-20
Apr 01, 2020
CVE-2020-1958
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.16
Apache Druid < 0.17.1 - Injection
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
CWE-74
Apr 01, 2020
CVE-2020-2096
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Jenkins Gitlab Hook < 1.4.2 - XSS
Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability.
CWE-79
Jan 15, 2020
CVE-2019-0230
9.8
CRITICAL
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Struts < 2.5.20 - Prototype Pollution
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
CWE-1321
Sep 14, 2020
CVE-2019-0232
8.1
HIGH
EXPLOITED
16 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Tomcat < 7.0.93 - OS Command Injection
When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).
CWE-78
Apr 15, 2019
CVE-2019-12086
7.5
HIGH
5 PoCs
Analysis
EPSS 0.16
FasterXML jackson-databind <2.9.9 - Code Injection
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
CWE-502
May 17, 2019
CVE-2019-5475
8.8
HIGH
4 PoCs
Analysis
EPSS 0.80
Sonatype Nexus Repository Manager < 2.14.9-01 - OS Command Injection
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
CWE-78
Sep 03, 2019
CVE-2019-11932
8.8
HIGH
24 PoCs
Analysis
EPSS 0.68
android-gif-drawable <1.2.18 - RCE
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.
CWE-415
Oct 03, 2019
CVE-2019-11358
6.1
MEDIUM
EXPLOITED
7 PoCs
Analysis
EPSS 0.02
jQuery <3.4.0 - Info Disclosure
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CWE-1321
Apr 20, 2019
CVE-2019-13234
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.02
Alkacon Opencms Apollo Template < 11.0.1 - XSS
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine.
CWE-79
Aug 27, 2019