Exploit Intelligence Platform
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2019-12409
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.83
Apache Solr < 8.3.0 - Unrestricted File Upload
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
CWE-434
Nov 18, 2019
CVE-2019-12401
7.5
HIGH
1 PoC
Analysis
EPSS 0.33
Solr <4.10.4 - DoS
Solr versions 1.3.0 to 1.4.1, 3.1.0 to 3.6.2 and 4.0.0 to 4.10.4 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it’s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern that will expand when the server parses the XML causing OOMs.
CWE-776
Sep 10, 2019
CVE-2019-1003030
9.9
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.93
Jenkins Pipeline: Groovy Plugin <2.63 - RCE
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
CWE-693
Mar 08, 2019
CVE-2019-12422
7.5
HIGH
1 PoC
Analysis
EPSS 0.55
Apache Shiro <1.4.2 - Info Disclosure
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
Nov 18, 2019
CVE-2019-17513
7.5
HIGH
1 PoC
Analysis
EPSS 0.01
Ratpack < 1.7.5 - Injection
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
CWE-74
Oct 18, 2019
CVE-2019-13990
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.17
Terracotta Quartz Scheduler <2.3.0 - SSRF
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
CWE-611
Jul 26, 2019
CVE-2019-15477
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
Jooby < 1.6.4 - XSS
Jooby before 1.6.4 has XSS via the default error handler.
CWE-79
Aug 23, 2019
CVE-2019-17571
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.37
Apache Log4j < 1.2.17 - Insecure Deserialization
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
CWE-502
Dec 20, 2019
CVE-2019-17564
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Dubbo < 2.5.10 - Insecure Deserialization
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
CWE-502
Apr 01, 2020
CVE-2019-0193
7.2
HIGH
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.93
Apache Solr < 7.7.3 - Code Injection
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
CWE-94
Aug 01, 2019
CVE-2019-10475
6.1
MEDIUM
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Jenkins Build-metrics < 1.3 - XSS
A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin.
CWE-79
Oct 23, 2019
CVE-2019-17195
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Connect2id Nimbus Jose+jwt < 7.9 - Improper Exception Handling
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
CWE-755
Oct 15, 2019
CVE-2019-0221
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.19
Apache Tomcat < 7.0.93 - XSS
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
CWE-79
May 28, 2019
CVE-2019-17638
9.4
CRITICAL
1 PoC
Analysis
EPSS 0.31
Eclipse Jetty <9.4.29 - Use After Free
In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with other data. Thread1 then proceeds to write the buffer that now contains different data. This results in client1, which issued request1 seeing data from another request or response which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). If the Jetty version cannot be upgraded, the vulnerability can be significantly reduced by configuring a responseHeaderSize significantly larger than the requestHeaderSize (12KB responseHeaderSize and 8KB requestHeaderSize).
CWE-675
Jul 09, 2020
CVE-2019-14900
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.02
Redhat Openstack < 5.3.18 - SQL Injection
A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.
CWE-89
Jul 06, 2020
CVE-2019-5427
7.5
HIGH
1 PoC
Analysis
EPSS 0.05
c3p0 <0.9.5.4 - Info Disclosure
c3p0 version < 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.
CWE-776
Apr 22, 2019
CVE-2019-10172
7.5
HIGH
1 PoC
Analysis
EPSS 0.01
org.codehaus.jackson:jackson-mapper-asl:1.9.x - XXE
A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
CWE-611
Nov 18, 2019
CVE-2019-17570
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.71
Apache Xml-rpc - Insecure Deserialization
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
CWE-502
Jan 23, 2020
CVE-2019-17495
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
Smartbear Swagger UI < 3.23.11 - CSRF
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
CWE-352
Oct 10, 2019
CVE-2019-17554
5.5
MEDIUM
EXPLOITED
1 PoC
Analysis
EPSS 0.53
Apache Olingo < 4.6.0 - XXE
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
CWE-611
Dec 04, 2019