Exploit Intelligence Platform
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
846 results
Clear all
CVE-2024-23673
8.5
HIGH
1 PoC
Analysis
EPSS 0.00
Apache Sling Servlets Resolver < 2.11.0 - Path Traversal
Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.
If the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script.
Users are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.
CWE-22
Feb 06, 2024
CVE-2024-22371
2.9
LOW
1 PoC
Analysis
EPSS 0.01
Apache Camel <4.4.0 - Info Disclosure
Exposure of sensitive data by by crafting a malicious EventFactory and providing a custom ExchangeCreatedEvent that exposes sensitive data. Vulnerability in Apache Camel.This issue affects Apache Camel: from 3.21.X through 3.21.3, from 3.22.X through 3.22.0, from 4.0.X through 4.0.3, from 4.X through 4.3.0.
Users are recommended to upgrade to version 3.21.4, 3.22.1, 4.0.4 or 4.4.0, which fixes the issue.
CWE-922
Feb 26, 2024
CVE-2024-28752
9.3
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.46
Apache Cxf < 3.5.8 - SSRF
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.
CWE-918
Mar 15, 2024
CVE-2024-38828
5.3
MEDIUM
4 PoCs
Analysis
EPSS 0.00
Org.springframework Spring-webmvc < 5.3.42 - Denial of Service
Spring MVC controller methods with an @RequestBody byte[] method parameter are vulnerable to a DoS attack.
CWE-400
Nov 18, 2024
CVE-2024-52550
8.0
HIGH
1 PoC
Analysis
EPSS 0.01
Jenkins Pipeline: Groovy Plugin <3990.vd281dd77a_388 - Improper Input Validation
Jenkins Pipeline: Groovy Plugin 3990.vd281dd77a_388 and earlier, except 3975.3977.v478dd9e956c3 does not check whether the main (Jenkinsfile) script for a rebuilt build is approved, allowing attackers with Item/Build permission to rebuild a previous build whose (Jenkinsfile) script is no longer approved.
CWE-354
Nov 13, 2024
CVE-2024-38816
7.5
HIGH
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Org.springframework Spring-webmvc < 6.1.13 - Path Traversal
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
Specifically, an application is vulnerable when both of the following are true:
* the web application uses RouterFunctions to serve static resources
* resource handling is explicitly configured with a FileSystemResource location
However, malicious requests are blocked and rejected when any of the following is true:
* the Spring Security HTTP Firewall https://docs.spring.io/spring-security/reference/servlet/exploits/firewall.html is in use
* the application runs on Tomcat or Jetty
CWE-22
Sep 13, 2024
CVE-2024-41447
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Alkacon Opencms - XSS
A stored cross-site scripting (XSS) vulnerability in Alkacon OpenCMS v17.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the author parameter under the Create/Modify article function.
CWE-79
Apr 18, 2025
CVE-2024-41947
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.13
Xwiki < 15.10.8 - Basic XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. By creating a conflict when another user with more rights is currently editing a page, it is possible to execute JavaScript snippets on the side of the other user, which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.8 and 16.3.0RC1.
CWE-80
Jul 31, 2024
CVE-2024-23898
8.8
HIGH
1 PoC
Analysis
EPSS 0.37
Jenkins < 2.441 - Origin Validation Error
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
CWE-346
Jan 24, 2024
CVE-2024-22243
8.1
HIGH
3 PoCs
Analysis
EPSS 0.60
UriComponentsBuilder - Open Redirect
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
CWE-601
Feb 23, 2024
CVE-2024-38821
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.13
Org.springframework.security Spring-s... - Resource Allocation Without Limits
Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances.
For this to impact an application, all of the following must be true:
* It must be a WebFlux application
* It must be using Spring's static resources support
* It must have a non-permitAll authorization rule applied to the static resources support
CWE-770
Oct 28, 2024
CVE-2024-36404
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.91
GeoTools <31.2-30.4-29.6 - RCE
GeoTools is an open source Java library that provides tools for geospatial data. Prior to versions 31.2, 30.4, and 29.6, Remote Code Execution (RCE) is possible if an application uses certain GeoTools functionality to evaluate XPath expressions supplied by user input. Versions 31.2, 30.4, and 29.6 contain a fix for this issue. As a workaround, GeoTools can operate with reduced functionality by removing the `gt-complex` jar from one's application. As an example of the impact, application schema `datastore` would not function without the ability to use XPath expressions to query complex content. Alternatively, one may utilize a drop-in replacement GeoTools jar from SourceForge for versions 31.1, 30.3, 30.2, 29.2, 28.2, 27.5, 27.4, 26.7, 26.4, 25.2, and 24.0. These jars are for download only and are not available from maven central, intended to quickly provide a fix to affected applications.
CWE-95
Jul 02, 2024
CVE-2024-43044
8.8
HIGH
5 PoCs
Analysis
EPSS 0.66
Jenkins <2.470 - Info Disclosure
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
CWE-754
Aug 07, 2024
CVE-2024-56337
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.11
Apache Tomcat < 9.0.98 - TOCTOU Race Condition
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may also be affected.
The mitigation for CVE-2024-50379 was incomplete.
Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation
parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:
- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)
- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)
- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)
Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
CWE-367
Dec 20, 2024
CVE-2024-24549
7.5
HIGH
2 PoCs
Analysis
EPSS 0.64
Apache Tomcat <11.0.0-M16, <10.1.18, <9.0.85, <=8.5.98 - DoS
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
CWE-20
Mar 13, 2024
CVE-2024-55875
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.05
Org.http4k Http4k-format-xml < 5.41.0.0 - Information Disclosure
http4k is a functional toolkit for Kotlin HTTP applications. Prior to version 5.41.0.0, there is a potential XXE (XML External Entity Injection) vulnerability when http4k handling malicious XML contents within requests, which might allow attackers to read local sensitive information on server, trigger Server-side Request Forgery and even execute code under some circumstances. Version 5.41.0.0 contains a patch for the issue.
CWE-200
Dec 12, 2024
CVE-2024-52800
LOW
1 PoC
Analysis
EPSS 0.17
Org.verapdf Core < 1.26.2 - XXE
veraPDF is an open source PDF/A validation library. Executing policy checks using custom schematron files via the CLI invokes an XSL transformation that may theoretically lead to a remote code execution (RCE) vulnerability. This doesn't affect the standard validation and policy checks functionality, veraPDF's common use cases. Most veraPDF users don't insert any custom XSLT code into policy profiles, which are based on Schematron syntax rather than direct XSL transforms. For users who do, only load custom policy files from sources you trust. This issue has not yet been patched. Users are advised to be cautious of XSLT code until a patch is available.
CWE-611
Nov 29, 2024
CVE-2024-22262
8.1
HIGH
1 PoC
Analysis
EPSS 0.13
UriComponentsBuilder - SSRF/Open Redirect
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
CWE-601
Apr 16, 2024
CVE-2024-52318
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.15
Apache Tomcat <11.0.1-9.0.97 - Memory Corruption
Incorrect object recycling and reuse vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96.
Users are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue.
CWE-326
Nov 18, 2024
CVE-2024-52317
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.21
Apache Tomcat <11.0.0-M26,<10.1.30,<9.0.95 - Memory Corruption
Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests
could lead to request and/or response mix-up between users.
This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.
Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.
CWE-326
Nov 18, 2024