Skip to main content

Overview

This page provides a complete list of all Common Vulnerabilities and Exposures (CVEs) that scan4all can detect and exploit through its built-in POC database.

All Supported CVEs

Spring Framework

2 CVEs including Spring4Shell

Oracle Weblogic

10 CVEs from 2014-2021

Apache Products

Log4j, Tomcat, Shiro, ZooKeeper, CouchDB

Jenkins

5 CVEs and unauthorized access

Other Systems

VMware, Confluence, GitLab, F5, ThinkPHP, and more

CVE Database Summary

By Severity

CategoryCVE CountPrimary Impact
Remote Code Execution30+Critical
Arbitrary File Read/Upload5+High
SSRF & Authentication Bypass8+High
SQL Injection3+High

Complete CVE List by System

Spring Framework

CVE IDDescriptionAffected Versions
CVE-2022-22965Spring4Shell - RCE via Data Binding on JDK 9+Spring Framework
CVE-2022-22947Spring Cloud Gateway RCE3.1.1+ and 3.0.7+

Oracle Weblogic

CVE IDDescriptionAffected Versions
CVE-2014-4210SSRF Vulnerability10.0.2 - 10.3.6
CVE-2017-3506WLS-WSAT RCE10.3.6.0, 12.1.3.0, 12.2.1.0-2
CVE-2017-10271WLS-WSAT RCE10.3.6.0, 12.1.3.0, 12.2.1.1-2
CVE-2018-2894Deserialization File Upload12.1.3.0, 12.2.1.2-3
CVE-2019-2725WLS9-Async Deserialization RCE10.3.6.0, 12.1.3.0
CVE-2019-2729WLS9-Async Deserialization RCE10.3.6.0, 12.1.3.0
CVE-2020-2883IIOP/T3 Deserialization RCE10.3.6.0, 12.1.3.0, 12.2.1.3-4
CVE-2020-14882Console RCE10.3.6.0, 12.1.3.0, 12.2.1.3-4, 14.1.1.0
CVE-2020-14883Console RCE10.3.6.0, 12.1.3.0, 12.2.1.3-4, 14.1.1.0
CVE-2021-2109Unauthorized JNDI10.3.6.0, 12.1.3.0, 12.2.1.3-4, 14.1.1.0
CNVD-C-2019-48814Oracle Weblogic VulnerabilityVarious

Apache Products

Apache Log4j

CVE IDDescriptionAffected Versions
CVE-2021-44228Log4Shell RCE2.0 - 2.14.1

Apache Tomcat

CVE IDDescriptionAffected Versions
CVE-2017-12615PUT Method File Upload7.0.0 - 7.0.81
CVE-2020-1938Ghostcat - Arbitrary File Read6.x, 7.x < 7.0.100, 8.x < 8.5.51, 9.x < 9.0.31

Apache Shiro

CVE IDDescriptionAffected Versions
CVE-2016-4437Shiro-550 Deserialization RCE1.2.4 and earlier

Apache ZooKeeper

CVE IDDescriptionAffected Versions
N/AUnauthorized AccessVarious

Apache CouchDB

CVE IDDescriptionAffected Versions
CVE-2022-24706Erlang Cookie RCEVarious
CVE-2020-13935WebSocket DoSVarious

Jenkins

CVE IDDescriptionAffected Versions
CVE-2016-0792Jenkins VulnerabilityVarious
CVE-2018-1000110User SearchVarious
CVE-2018-1000861Groovy Script RCE≤ 2.153, LTS ≤ 2.138.3
CVE-2019-1003000Groovy Script Security RCEGroovy ≤ 2.61, Script Security ≤ 1.49
N/AUnauthorized Groovy Script RCEVarious

Atlassian Confluence

CVE IDDescriptionAffected Versions
CVE-2021-26084OGNL Injection RCEVarious
CVE-2021-26085Confluence VulnerabilityVarious
CVE-2022-26134OGNL Injection RCEVarious
CVE-2022-26318Confluence VulnerabilityVarious

VMware vCenter

CVE IDDescriptionAffected Versions
CVE-2021-21985vCenter RCEVarious
CVE-2022-22954VMware Workspace ONE RCEVarious
CVE-2022-22972Authentication BypassVarious

GitLab

CVE IDDescriptionAffected Versions
CVE-2021-22205RCE via ExifToolVarious
CVE-2022-2185GitLab VulnerabilityVarious

F5 BIG-IP

CVE IDDescriptionAffected Versions
CVE-2020-5902TMUI RCEVarious
CVE-2021-22986iControl REST RCEVarious
CVE-2022-1388Authentication Bypass RCEVarious

Fastjson

CVE IDDescriptionAffected Versions
VER-1262Autotype RCE≤ 1.2.62

JBoss

CVE IDDescriptionAffected Versions
CVE-2017-12149Deserialization RCEJBoss AS 5.x/6.x

PHPUnit

CVE IDDescriptionAffected Versions
CVE-2017-9841RCE4.x < 4.8.28, 5.x < 5.6.3

ThinkPHP

CVE IDDescriptionAffected Versions
CVE-2019-9082RCE< 3.2.4
CVE-2018-20062RCE≤ 5.0.23, 5.1.31

Microsoft Products

CVE IDDescriptionAffected Versions
CVE-2020-0796SMBGhostWindows 10
CVE-2021-26855ProxyLogon Exchange RCEExchange Server
CVE-2018-14847MikroTik RouterOSVarious

Other Systems

CVE IDDescriptionSystem
CVE-2018-13380FortiOS SSL VPNFortinet
CVE-2021-38647OMI RCEOpen Management Infrastructure
CVE-2022-23131Zabbix AuthenticationZabbix

POC Format

All POCs are implemented in Go and available in the pocs_go/ directory of the scan4all source code.

POC Types

  1. Detection POCs - Check if a system is vulnerable
  2. Exploitation POCs - Demonstrate exploitability (used responsibly)
  3. Verification POCs - Verify successful exploitation

Usage

All POCs are automatically invoked when scan4all detects the corresponding service or application:
# Scan a target for all vulnerabilities
scan4all -h target.example.com

# Enable POC scanning explicitly
scan4all -h target.example.com -poc

References

These POCs are provided for security testing and research purposes only. Always obtain proper authorization before testing systems you do not own.

Build docs developers (and LLMs) love