Exploit Intelligence Platform
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2019-0192
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Solr < 5.5.5 - Insecure Deserialization
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.
CWE-502
Mar 07, 2019
CVE-2019-10086
7.3
HIGH
1 PoC
EPSS 0.01
Apache Commons Beanutils 1.9.2 - Info Disclosure
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
CWE-502
Aug 20, 2019
CVE-2019-0227
7.5
HIGH
2 PoCs
Analysis
EPSS 0.90
Apache Axis < 7.3.5 - SSRF
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
CWE-918
May 01, 2019
CVE-2019-3778
6.5
MEDIUM
2 PoCs
Analysis
EPSS 0.19
Pivotal Software Spring Security Oauth < 2.0.17 - Open Redirect
Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and 2.1 prior to 2.1.4, and 2.0 prior to 2.0.17, and older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the "redirect_uri" parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and uses the DefaultRedirectResolver in the AuthorizationEndpoint. This vulnerability does not expose applications that: Act in the role of an Authorization Server and uses a different RedirectResolver implementation other than DefaultRedirectResolver, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient).
CWE-601
Mar 07, 2019
CVE-2019-13237
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.04
Alkacon Opencms Apollo Template < 11.0.1 - Path Traversal
In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp.
CWE-22
Aug 27, 2019
CVE-2019-13236
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.04
Alkacon Opencms < 11.0.1 - XSS
In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface.
CWE-79
Aug 27, 2019
CVE-2019-13235
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.04
Alkacon Opencms Apollo Template < 11.0.1 - XSS
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.
CWE-79
Aug 27, 2019
CVE-2019-10349
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.01
Jenkins Dependency Graph Viewer < 0.13 - XSS
A stored cross site scripting vulnerability in Jenkins Dependency Graph Viewer Plugin 0.13 and earlier allowed attackers able to configure jobs in Jenkins to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.
CWE-79
Jul 11, 2019
CVE-2019-6588
4.7
MEDIUM
1 PoC
Analysis
EPSS 0.01
Liferay Portal < 6.0.6 - XSS
In Liferay Portal before 7.1 CE GA4, an XSS vulnerability exists in the SimpleCaptcha API when custom code passes unsanitized input into the "url" parameter of the JSP taglib call <liferay-ui:captcha url="<%= url %>" /> or <liferay-captcha:captcha url="<%= url %>" />. Liferay Portal out-of-the-box behavior with no customizations is not vulnerable.
CWE-79
Jun 03, 2019
CVE-2019-0186
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.06
Apache Pluto < 3.1.0 - XSS
The input fields of the Apache Pluto "Chat Room" demo portlet 3.0.0 and 3.0.1 are vulnerable to Cross-Site Scripting (XSS) attacks. Mitigation: * Uninstall the ChatRoomDemo war file - or - * migrate to version 3.1.0 of the chat-room-demo war file
CWE-79
Apr 26, 2019
CVE-2019-6804
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.09
Pagerduty Rundeck < 3.0.13 - XSS
An XSS issue was discovered on the Job Edit page in Rundeck Community Edition before 3.0.13, related to assets/javascripts/workflowStepEditorKO.js and views/execution/_wfitemEdit.gsp.
CWE-79
Jan 25, 2019
CVE-2018-17366
8.8
HIGH
1 PoC
EPSS 0.00
MCMS 4.6.5 - CSRF
An issue was discovered in MCMS 4.6.5. There is a CSRF vulnerability that can add an administrator account via ms/basic/manager/save.do.
CWE-352
Sep 23, 2018
CVE-2018-18831
7.5
HIGH
1 PoC
EPSS 0.00
Mingsoft Mcms - Path Traversal
An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter.
CWE-22
Oct 30, 2018
CVE-2018-18830
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Mingsoft Mcms - Unrestricted File Upload
An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code.
CWE-434
Oct 30, 2018
CVE-2018-11776
8.1
HIGH
KEV
RANSOMWARE
28 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Struts 2 Namespace Redirect OGNL Injection
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.
Aug 22, 2018
CVE-2018-1999002
7.5
HIGH
6 PoCs
Analysis
EPSS 0.93
Jenkins <2.132, <2.121.1 - Info Disclosure
A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to.
Jul 23, 2018
CVE-2018-1270
9.8
CRITICAL
6 PoCs
Analysis
EPSS 0.90
Vmware Spring Framework < 4.3.16 - Remote Code Execution
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
CWE-358
Apr 06, 2018
CVE-2018-12533
9.8
CRITICAL
5 PoCs
Analysis
EPSS 0.80
JBoss RichFaces 3.1.0-3.3.4 - RCE
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
CWE-917
Jun 18, 2018
CVE-2018-1335
8.1
HIGH
EXPLOITED
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Tika <1.18 - Command Injection
From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.
Apr 25, 2018
CVE-2018-11770
4.2
MEDIUM
EXPLOITED
2 PoCs
Analysis
EPSS 0.89
Apache Spark < 2.4.0 - Authentication Bypass
From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'.
CWE-287
Aug 13, 2018