Exploit Intelligence Platform

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
285 results Clear all
CVE-2022-44900 9.1 CRITICAL 1 PoC Analysis EPSS 0.33
Py7zr < 0.20.1 - Path Traversal
A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file.
CWE-22 Dec 06, 2022
CVE-2022-1592 8.2 HIGH 1 PoC Analysis EPSS 0.00
Clinical-genomics Scout < 4.42 - SSRF
Server-Side Request Forgery in scout in GitHub repository clinical-genomics/scout prior to v4.42. An attacker could make the application perform arbitrary requests to fishing steal cookie, request to private area, or lead to xss...
CWE-918 May 05, 2022
CVE-2022-35411 9.8 CRITICAL 5 PoCs Analysis EPSS 0.71
Rpc.py < 0.6.0 - Insufficiently Protected Credentials
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
CWE-522 Jul 08, 2022
CVE-2022-24439 8.1 HIGH 2 PoCs Analysis EPSS 0.69
gitpython - RCE
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
CWE-20 Dec 06, 2022
CVE-2022-22817 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Pillow <9.0.0 - Code Injection
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
Jan 10, 2022
CVE-2022-39227 9.1 CRITICAL 2 PoCs Analysis EPSS 0.71
Python-jwt < 3.3.4 - Authentication Bypass by Spoofing
python-jwt is a module for generating and verifying JSON Web Tokens. Versions prior to 3.3.4 are subject to Authentication Bypass by Spoofing, resulting in identity spoofing, session hijacking or authentication bypass. An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's identities, hijack their sessions, or bypass authentication. Users should upgrade to version 3.3.4. There are no known workarounds.
CWE-290 Sep 23, 2022
CVE-2022-0869 6.1 MEDIUM 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.04
Spirit < 0.12.3 - Open Redirect
Multiple Open Redirect in GitHub repository nitely/spirit prior to 0.12.3.
CWE-601 Mar 06, 2022
CVE-2022-40127 8.8 HIGH 2 PoCs Analysis NUCLEI EPSS 0.93
Apache Airflow < 2.4.0 - Code Injection
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.
CWE-94 Nov 14, 2022
CVE-2022-4510 7.8 HIGH 4 PoCs Analysis EPSS 0.44
Microsoft Binwalk < 2.3.3 - Path Traversal
A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through 2.3.3 included.
CWE-22 Jan 26, 2023
CVE-2022-22818 6.1 MEDIUM 1 PoC Analysis EPSS 0.01
Django < 2.2.27 - XSS
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
CWE-79 Feb 03, 2022
CVE-2022-36551 6.5 MEDIUM 1 PoC Analysis EPSS 0.09
Heartex - Label Studio Community Edition <1.5.0 - SSRF
A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to create a new account and then exploit the SSRF.
CWE-918 Oct 03, 2022
CVE-2022-34668 9.8 CRITICAL 1 PoC Analysis EPSS 0.22
Nvidia Nvflare < 2.1.4 - Insecure Deserialization
NVFLARE, versions prior to 2.1.4, contains a vulnerability that deserialization of Untrusted Data due to Pickle usage may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
CWE-502 Aug 29, 2022
CVE-2022-37298 9.8 CRITICAL 1 PoC Analysis EPSS 0.16
Shinken-monitoring Shinken Monitoring - Authentication Bypass
Shinken Solutions Shinken Monitoring Version 2.4.3 affected is vulnerable to Incorrect Access Control. The SafeUnpickler class found in shinken/safepickle.py implements a weak authentication scheme when unserializing objects passed from monitoring nodes to the Shinken monitoring server.
CWE-287 Oct 20, 2022
CVE-2022-21728 8.1 HIGH 1 PoC Analysis EPSS 0.01
Google Tensorflow < 2.5.2 - Out-of-Bounds Read
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then the implementation of `Dim` would access elements before the start of an array. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
CWE-125 Feb 03, 2022
CVE-2022-21668 8.0 HIGH 1 PoC Analysis EPSS 0.01
Pypa Pipenv < 2022.1.8 - Command Injection
pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). When pip installs from a source distribution, any code in the setup.py is executed by the install process. This issue is patched in version 2022.1.8. The GitHub Security Advisory contains more information about this vulnerability.
CWE-1284 Jan 10, 2022
CVE-2021-21239 6.5 MEDIUM 4 PoCs Analysis EPSS 0.03
PySAML2 <6.5.0 - Improper Signature Verification
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ensure that a signed SAML document is correctly signed. The default CryptoBackendXmlSec1 backend is using the xmlsec1 binary to verify the signature of signed SAML documents, but by default xmlsec1 accepts any type of key found within the given document. xmlsec1 needs to be configured explicitly to only use only _x509 certificates_ for the verification process of the SAML document signature. This is fixed in PySAML2 6.5.0.
CWE-347 Jan 21, 2021
CVE-2021-32849 8.8 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.78
Gerapy <0.9.9 - Command Injection
Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds.
CWE-78 Jan 26, 2022
CVE-2021-25281 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
SaltStack Salt <3002.5 - RCE
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
CWE-287 Feb 27, 2021
CVE-2021-43857 9.8 CRITICAL 6 PoCs Analysis EPSS 0.50
Gerapy <0.9.8 - RCE
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
CWE-78 Dec 27, 2021
CVE-2021-35042 9.8 CRITICAL 6 PoCs Analysis NUCLEI EPSS 0.90
Django <3.1.13, <3.2.5 - SQL Injection
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
CWE-89 Jul 02, 2021