Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
846 results Clear all
CVE-2024-52316 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Apache Tomcat - Unchecked Error Condition
Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.
CWE-754 Nov 18, 2024
CVE-2024-51132 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
Ca.uhn.hapi.fhir Org.hl7.fhir.convertors < 6.4.0 - XXE
An XML External Entity (XXE) vulnerability in HAPI FHIR before v6.4.0 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted request containing malicious XML entities.
CWE-611 Nov 05, 2024
CVE-2024-36823 7.5 HIGH 1 PoC Analysis EPSS 0.12
Ninja Core v7.0.0 - Info Disclosure
The encrypt() function of Ninja Core v7.0.0 was discovered to use a weak cryptographic algorithm, leading to a possible leakage of sensitive information.
CWE-327 Jun 06, 2024
CVE-2024-3656 8.1 HIGH 1 PoC Analysis NUCLEI EPSS 0.90
Org.keycloak Keycloak-services < 24.0.5 - Information Disclosure
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
CWE-200 Oct 09, 2024
CVE-2024-8698 7.7 HIGH 1 PoC Analysis NUCLEI EPSS 0.81
Keycloak - Privilege Escalation
A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.
CWE-347 Sep 19, 2024
CVE-2024-21733 5.3 MEDIUM 1 PoC Analysis EPSS 0.73
Apache Tomcat < 8.5.64 - Error Information Exposure
Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Other, EOL versions may also be affected. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.
CWE-209 Jan 19, 2024
CVE-2024-42850 9.8 CRITICAL 1 PoC Analysis EPSS 0.50
Silverpeas <6.4.2 - Auth Bypass
An issue in the password change function of Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements.
CWE-521 Aug 16, 2024
CVE-2024-26308 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
Apache Commons Compress < 1.26.0 - Resource Allocation Without Limits
Allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.21 before 1.26. Users are recommended to upgrade to version 1.26, which fixes the issue.
CWE-770 Feb 19, 2024
CVE-2024-34144 9.8 CRITICAL 1 PoC Analysis EPSS 0.50
Jenkins Script Security Plugin <=1335.vf07d9ce377a_e - Sandbox Bypass
A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
CWE-693 May 02, 2024
CVE-2024-39031 5.4 MEDIUM 1 PoC Analysis EPSS 0.07
Silverpeas < 6.4 - XSS
In Silverpeas Core <= 6.3.5, in Mes Agendas, a user can create new events and add them to their calendar. Additionally, users can invite others from the same domain, including administrators, to these events. A standard user can inject an XSS payload into the "Titre" and "Description" fields when creating an event and then add the administrator or any user to the event. When the invited user (victim) views their own profile, the payload will be executed on their side, even if they do not click on the event.
CWE-79 Jul 09, 2024
CVE-2024-29868 9.1 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.78
Apache StreamPipes <0.95.0 - Info Disclosure
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism. This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account. This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0. Users are recommended to upgrade to version 0.95.0, which fixes the issue.
CWE-338 Jun 24, 2024
CVE-2024-22234 7.4 HIGH 1 PoC Analysis EPSS 0.02
Spring Security <6.1.7 & <6.2.2 - Info Disclosure
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method. Specifically, an application is vulnerable if: * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value. An application is not vulnerable if any of the following is true: * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly. * The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated * The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html  or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html
CWE-284 Feb 20, 2024
CVE-2024-22369 7.8 HIGH 1 PoC Analysis EPSS 0.05
Apache Camel <4.4.0 - Deserialization
Deserialization of Untrusted Data vulnerability in Apache Camel SQL ComponentThis issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0. Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1
CWE-502 Feb 20, 2024
CVE-2023-44487 7.5 HIGH KEV 29 PoCs Analysis EPSS 0.94
Ietf HTTP < 1.57.0 - Denial of Service
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CWE-400 Oct 10, 2023
CVE-2023-45648 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.59
Apache Tomcat < 8.5.94 - Improper Input Validation
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.
CWE-20 Oct 10, 2023
CVE-2023-46604 10.0 CRITICAL KEV RANSOMWARE 39 PoCs Analysis NUCLEI EPSS 0.94
Java OpenWire - Deserialization RCE
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
CWE-502 Oct 27, 2023
CVE-2023-32315 8.6 HIGH KEV RANSOMWARE 15 PoCs Analysis NUCLEI EPSS 0.94
Openfire authentication bypass with RCE plugin
Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isn’t available for a specific release, or isn’t quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice.
CWE-22 May 26, 2023
CVE-2023-51282 7.5 HIGH 1 PoC 1 Writeup EPSS 0.00
mingSoft MCMS <5.2.4 - Info Disclosure
An issue in mingSoft MCMS v.5.2.4 allows a a remote attacker to obtain sensitive information via a crafted script to the password parameter.
CWE-94 Jan 16, 2024
CVE-2023-50578 9.8 CRITICAL 1 PoC NUCLEI EPSS 0.32
Mingsoft Mcms - SQL Injection
Mingsoft MCMS v5.2.9 was discovered to contain a SQL injection vulnerability via the categoryType parameter at /content/list.do.
CWE-89 Dec 30, 2023
CVE-2023-50449 7.5 HIGH 1 PoC EPSS 0.00
Jfinalcms - Path Traversal
JFinalCMS 5.0.0 could allow a remote attacker to read files via ../ Directory Traversal in the /common/down/file fileKey parameter.
CWE-22 Dec 10, 2023