Exploit Intelligence Platform

Updated 33m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
846 results Clear all
CVE-2017-8046 9.8 CRITICAL EXPLOITED RANSOMWARE 13 PoCs Analysis NUCLEI EPSS 0.94
Vmware Spring Boot < 1.5.9 - Improper Input Validation
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
CWE-20 Jan 04, 2018
CVE-2017-11467 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.76
OrientDB <2.2.22 - RCE
OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request.
CWE-269 Jul 20, 2017
CVE-2017-9791 9.8 CRITICAL KEV 10 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts 2.1.x-2.3.x - RCE
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
CWE-20 Jul 10, 2017
CVE-2017-1000353 9.8 CRITICAL KEV 7 PoCs Analysis NUCLEI EPSS 0.94
Jenkins <2.56-<2.46.1 LTS - RCE
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.
CWE-502 Jan 29, 2018
CVE-2017-1000208 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Swagger-Parser <=1.0.30 - RCE
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
CWE-502 Nov 17, 2017
CVE-2017-15717 6.1 MEDIUM 2 PoCs Analysis EPSS 0.02
Apache Sling Xss Protection API < 1.0.18 - XSS
A flaw in the way URLs are escaped and encoded in the org.apache.sling.xss.impl.XSSAPIImpl#getValidHref and org.apache.sling.xss.impl.XSSFilterImpl#isValidHref allows special crafted URLs to pass as valid, although they carry XSS payloads. The affected versions are Apache Sling XSS Protection API 1.0.4 to 1.0.18, Apache Sling XSS Protection API Compat 1.1.0 and Apache Sling XSS Protection API 2.0.0.
CWE-79 Jan 10, 2018
CVE-2017-2666 6.5 MEDIUM 3 PoCs Analysis EPSS 0.01
Redhat Undertow < 1.3.31 - HTTP Request Smuggling
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
CWE-444 Jul 27, 2018
CVE-2017-1000487 9.8 CRITICAL 3 PoCs Analysis EPSS 0.08
Plexus-utils <3.0.16 - Command Injection
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
CWE-78 Jan 03, 2018
CVE-2017-7559 6.1 MEDIUM 2 PoCs Analysis EPSS 0.01
Undertow <2.0.0.Alpha2,<1.4.17.Final,<1.3.31.Final - SSRF
In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
CWE-444 Jan 10, 2018
CVE-2017-17485 9.8 CRITICAL 5 PoCs Analysis EPSS 0.85
Fasterxml Jackson-databind < 2.6.7.3 - Insecure Deserialization
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
CWE-502 Jan 10, 2018
CVE-2017-15095 9.8 CRITICAL 2 PoCs Analysis EPSS 0.09
jackson-databind <2.8.10, 2.9.1 - Code Injection
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
CWE-184 Feb 06, 2018
CVE-2017-7561 7.5 HIGH 2 PoCs Analysis EPSS 0.01
Red Hat JBoss EAP <4.0.0.Beta1 - SSRF
Red Hat JBoss EAP version 3.0.7 through before 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact.
CWE-346 Sep 13, 2017
CVE-2017-1000207 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Swagger-Parser <=1.0.30 & Swagger Codegen <=2.2.2 - RCE
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
CWE-502 Nov 27, 2017
CVE-2017-7662 8.8 HIGH 2 PoCs Analysis EPSS 0.01
Apache CXF Fediz <1.4.0-1.3.2 - CSRF
Apache CXF Fediz ships with an OpenId Connect (OIDC) service which has a Client Registration Service, which is a simple web application that allows clients to be created, deleted, etc. A CSRF (Cross Style Request Forgery) style vulnerability has been found in this web application in Apache CXF Fediz prior to 1.4.0 and 1.3.2, meaning that a malicious web application could create new clients, or reset secrets, etc, after the admin user has logged on to the client registration service and the session is still active.
CWE-352 May 16, 2017
CVE-2017-9801 7.5 HIGH 2 PoCs Analysis EPSS 0.01
Apache Commons Email <1.5 - Info Disclosure
When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.
CWE-20 Aug 07, 2017
CVE-2017-18640 7.5 HIGH 2 PoCs Analysis EPSS 0.02
SnakeYAML <1.26 - Entity Expansion
The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
CWE-776 Dec 12, 2019
CVE-2017-12197 6.5 MEDIUM 2 PoCs Analysis EPSS 0.01
libpam4j <1.9 - Auth Bypass
It was found that libpam4j up to and including 1.8 did not properly validate user accounts when authenticating. A user with a valid password for a disabled account would be able to bypass security restrictions and possibly access sensitive information.
CWE-20 Jan 18, 2018
CVE-2017-1000209 5.9 MEDIUM 2 PoCs Analysis EPSS 0.00
nv-websocket-client - Man-in-the-Middle
The Java WebSocket client nv-websocket-client does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL/TLS servers via an arbitrary valid certificate.
CWE-295 Nov 17, 2017
CVE-2017-5929 9.8 CRITICAL 2 PoCs Analysis EPSS 0.10
QOS Logback < 1.2.0 - Insecure Deserialization
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.
CWE-502 Mar 13, 2017
CVE-2017-7957 7.5 HIGH 2 PoCs Analysis EPSS 0.03
Redhat Fuse < 1.4.9 - Improper Input Validation
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call.
CWE-20 Apr 29, 2017