Exploit Intelligence Platform
Updated 33m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2017-8046
9.8
CRITICAL
EXPLOITED
RANSOMWARE
13 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Spring Boot < 1.5.9 - Improper Input Validation
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
CWE-20
Jan 04, 2018
CVE-2017-11467
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.76
OrientDB <2.2.22 - RCE
OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request.
CWE-269
Jul 20, 2017
CVE-2017-9791
9.8
CRITICAL
KEV
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Struts 2.1.x-2.3.x - RCE
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
CWE-20
Jul 10, 2017
CVE-2017-1000353
9.8
CRITICAL
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Jenkins <2.56-<2.46.1 LTS - RCE
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.
CWE-502
Jan 29, 2018
CVE-2017-1000208
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Swagger-Parser <=1.0.30 - RCE
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
CWE-502
Nov 17, 2017
CVE-2017-15717
6.1
MEDIUM
2 PoCs
Analysis
EPSS 0.02
Apache Sling Xss Protection API < 1.0.18 - XSS
A flaw in the way URLs are escaped and encoded in the org.apache.sling.xss.impl.XSSAPIImpl#getValidHref and org.apache.sling.xss.impl.XSSFilterImpl#isValidHref allows special crafted URLs to pass as valid, although they carry XSS payloads. The affected versions are Apache Sling XSS Protection API 1.0.4 to 1.0.18, Apache Sling XSS Protection API Compat 1.1.0 and Apache Sling XSS Protection API 2.0.0.
CWE-79
Jan 10, 2018
CVE-2017-2666
6.5
MEDIUM
3 PoCs
Analysis
EPSS 0.01
Redhat Undertow < 1.3.31 - HTTP Request Smuggling
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
CWE-444
Jul 27, 2018
CVE-2017-1000487
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.08
Plexus-utils <3.0.16 - Command Injection
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
CWE-78
Jan 03, 2018
CVE-2017-7559
6.1
MEDIUM
2 PoCs
Analysis
EPSS 0.01
Undertow <2.0.0.Alpha2,<1.4.17.Final,<1.3.31.Final - SSRF
In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
CWE-444
Jan 10, 2018
CVE-2017-17485
9.8
CRITICAL
5 PoCs
Analysis
EPSS 0.85
Fasterxml Jackson-databind < 2.6.7.3 - Insecure Deserialization
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
CWE-502
Jan 10, 2018
CVE-2017-15095
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.09
jackson-databind <2.8.10, 2.9.1 - Code Injection
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
CWE-184
Feb 06, 2018
CVE-2017-7561
7.5
HIGH
2 PoCs
Analysis
EPSS 0.01
Red Hat JBoss EAP <4.0.0.Beta1 - SSRF
Red Hat JBoss EAP version 3.0.7 through before 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact.
CWE-346
Sep 13, 2017
CVE-2017-1000207
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Swagger-Parser <=1.0.30 & Swagger Codegen <=2.2.2 - RCE
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
CWE-502
Nov 27, 2017
CVE-2017-7662
8.8
HIGH
2 PoCs
Analysis
EPSS 0.01
Apache CXF Fediz <1.4.0-1.3.2 - CSRF
Apache CXF Fediz ships with an OpenId Connect (OIDC) service which has a Client Registration Service, which is a simple web application that allows clients to be created, deleted, etc. A CSRF (Cross Style Request Forgery) style vulnerability has been found in this web application in Apache CXF Fediz prior to 1.4.0 and 1.3.2, meaning that a malicious web application could create new clients, or reset secrets, etc, after the admin user has logged on to the client registration service and the session is still active.
CWE-352
May 16, 2017
CVE-2017-9801
7.5
HIGH
2 PoCs
Analysis
EPSS 0.01
Apache Commons Email <1.5 - Info Disclosure
When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.
CWE-20
Aug 07, 2017
CVE-2017-18640
7.5
HIGH
2 PoCs
Analysis
EPSS 0.02
SnakeYAML <1.26 - Entity Expansion
The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
CWE-776
Dec 12, 2019
CVE-2017-12197
6.5
MEDIUM
2 PoCs
Analysis
EPSS 0.01
libpam4j <1.9 - Auth Bypass
It was found that libpam4j up to and including 1.8 did not properly validate user accounts when authenticating. A user with a valid password for a disabled account would be able to bypass security restrictions and possibly access sensitive information.
CWE-20
Jan 18, 2018
CVE-2017-1000209
5.9
MEDIUM
2 PoCs
Analysis
EPSS 0.00
nv-websocket-client - Man-in-the-Middle
The Java WebSocket client nv-websocket-client does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL/TLS servers via an arbitrary valid certificate.
CWE-295
Nov 17, 2017
CVE-2017-5929
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.10
QOS Logback < 1.2.0 - Insecure Deserialization
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.
CWE-502
Mar 13, 2017
CVE-2017-7957
7.5
HIGH
2 PoCs
Analysis
EPSS 0.03
Redhat Fuse < 1.4.9 - Improper Input Validation
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call.
CWE-20
Apr 29, 2017