Exploit Intelligence Platform
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2016-3081
8.1
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Struts < 2.3.20.3 - Command Injection
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.
CWE-77
Apr 26, 2016
CVE-2016-0710
8.8
HIGH
2 PoCs
Analysis
EPSS 0.79
Apache Jetspeed Arbitrary File Upload
Multiple SQL injection vulnerabilities in the User Manager service in Apache Jetspeed before 2.3.1 allow remote attackers to execute arbitrary SQL commands via the (1) role or (2) user parameter to services/usermanager/users/.
CWE-89
Apr 11, 2016
CVE-2016-0792
8.8
HIGH
6 PoCs
Analysis
EPSS 0.91
Jenkins XStream Groovy classpath Deserialization Vulnerability
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
CWE-20
Apr 07, 2016
CVE-2016-9299
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.89
Jenkins <2.32-2.19.3 - RCE
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
CWE-90
Jan 12, 2017
CVE-2016-9589
7.5
HIGH
2 PoCs
Analysis
EPSS 0.02
Redhat Jboss Wildfly Application Server < 10.1.0 - Denial of Service
Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection.
CWE-400
Mar 12, 2018
CVE-2016-9606
8.1
HIGH
2 PoCs
Analysis
EPSS 0.02
Redhat Resteasy < 3.1.1 - Improper Input Validation
JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions.
CWE-20
Mar 09, 2018
CVE-2016-4464
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.02
Apache Cxf Fediz < 1.2.3 - Improper Access Control
The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature.
CWE-284
Sep 21, 2016
CVE-2016-6809
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.07
Apache Tika < 1.13 - Insecure Deserialization
Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.
CWE-502
Apr 06, 2017
CVE-2016-6801
8.8
HIGH
3 PoCs
Analysis
EPSS 0.00
Apache Jackrabbit < 2.4.6 - CSRF
Cross-site request forgery (CSRF) vulnerability in the CSRF content-type check in Jackrabbit-Webdav in Apache Jackrabbit 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.3, 2.10.x before 2.10.4, 2.12.x before 2.12.4, and 2.13.x before 2.13.3 allows remote attackers to hijack the authentication of unspecified victims for requests that create a resource via an HTTP POST request with a (1) missing or (2) crafted Content-Type header.
CWE-352
Sep 21, 2016
CVE-2016-8744
8.8
HIGH
2 PoCs
Analysis
EPSS 0.00
Apache Brooklyn <0.10.0 - Code Injection
Apache Brooklyn uses the SnakeYAML library for parsing YAML inputs. SnakeYAML allows the use of YAML tags to indicate that SnakeYAML should unmarshal data to a Java type. In the default configuration in Brooklyn before 0.10.0, SnakeYAML will allow unmarshalling to any Java type available on the classpath. This could provide an authenticated user with a means to cause the JVM running Brooklyn to load and run Java code without detection by Brooklyn. Such code would have the privileges of the Java process running Brooklyn, including the ability to open files and network connections, and execute system commands. There is known to be a proof-of-concept exploit using this vulnerability.
CWE-502
Sep 13, 2017
CVE-2016-6802
7.5
HIGH
2 PoCs
Analysis
EPSS 0.14
Apache Shiro < 1.3.2 - Improper Access Control
Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path.
CWE-284
Sep 20, 2016
CVE-2016-4974
7.5
HIGH
2 PoCs
Analysis
EPSS 0.02
Apache Amqp 0-x Jms Client < 6.0.3 - Improper Input Validation
Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.
CWE-20
Jul 13, 2016
CVE-2016-9177
7.5
HIGH
4 PoCs
Analysis
EPSS 0.06
Spark 2.5 - Path Traversal
Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.
CWE-22
Nov 04, 2016
CVE-2016-8741
7.5
HIGH
2 PoCs
Analysis
EPSS 0.00
Apache Qpid Broker for Java <6.0.6, <6.1.1 - Info Disclosure
The Apache Qpid Broker for Java can be configured to use different so called AuthenticationProviders to handle user authentication. Among the choices are the SCRAM-SHA-1 and SCRAM-SHA-256 AuthenticationProvider types. It was discovered that these AuthenticationProviders in Apache Qpid Broker for Java 6.0.x before 6.0.6 and 6.1.x before 6.1.1 prematurely terminate the SCRAM SASL negotiation if the provided user name does not exist thus allowing remote attacker to determine the existence of user accounts. The Vulnerability does not apply to AuthenticationProviders other than SCRAM-SHA-1 and SCRAM-SHA-256.
CWE-200
May 15, 2017
CVE-2016-3092
7.5
HIGH
2 PoCs
Analysis
EPSS 0.34
Apache Tomcat < 1.3.1 - Improper Input Validation
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
CWE-20
Jul 04, 2016
CVE-2016-7051
8.6
HIGH
2 PoCs
Analysis
EPSS 0.01
Fasterxml Jackson-dataformat-xml < 2.7.8 - SSRF
XmlMapper in the Jackson XML dataformat component (aka jackson-dataformat-xml) before 2.7.8 and 2.8.x before 2.8.4 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD.
CWE-611
Apr 14, 2017
CVE-2016-1000031
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.50
Apache Commons FileUpload <1.3.3 - RCE
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
CWE-284
Oct 25, 2016
CVE-2016-6812
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.09
Apache Cxf < 3.0.11 - XSS
The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.
CWE-79
Aug 10, 2017
CVE-2016-10735
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.07
Bootstrap < 3.4.0 - XSS
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
CWE-79
Jan 09, 2019
CVE-2016-10006
6.1
MEDIUM
2 PoCs
Analysis
EPSS 0.01
OWASP AntiSamy <1.5.5 - XSS
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
CWE-79
Dec 24, 2016