Exploit Intelligence Platform

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

339,490 CVEs tracked 53,352 with exploits 4,748 exploited in wild 1,551 CISA KEV 3,945 Nuclei templates 49,201 vendors 42,812 researchers
111,546 results Clear all
CVE-2016-5893 5.5 MEDIUM EPSS 0.00
IBM Sterling B2B Integrator Standard Edition 5.2 - Info Disclosure
IBM Sterling B2B Integrator Standard Edition 5.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 115336.
CWE-200 Jun 23, 2017
CVE-2017-3948 5.4 MEDIUM EPSS 0.00
McAfee DLP Endpoint 10.0.x - XSS
Cross Site Scripting (XSS) in IMG Tags in the ePO extension in McAfee Data Loss Prevention Endpoint (DLP Endpoint) 10.0.x allows authenticated users to inject arbitrary web script or HTML via injecting malicious JavaScript into a user's browsing session.
CWE-79 Jun 23, 2017
CVE-2017-9356 6.1 MEDIUM EPSS 0.00
Sitecore.NET <7.3 - XSS
Sitecore.NET 7.1 through 7.2 has a Cross Site Scripting Vulnerability via the searchStr parameter to the /Search-Results URI.
CWE-79 Jun 23, 2017
CVE-2017-9775 6.5 MEDIUM EPSS 0.01
Poppler <0.56 - Buffer Overflow
Stack buffer overflow in GfxState.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) via a crafted PDF document.
CWE-119 Jun 22, 2017
CVE-2017-2782 6.5 MEDIUM EPSS 0.00
Matrixssl - Integer Overflow
An integer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a length counter to overflow, leading to a controlled out of bounds copy operation. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection
CWE-190 Jun 22, 2017
CVE-2017-1326 4.3 MEDIUM EPSS 0.00
IBM Sterling File Gateway - Privilege Escalation
IBM Sterling File Gateway does not properly restrict user requests based on permission level. This allows for users to update data related to other users, by manipulating the parameters passed in the POST request. IBM X-Force ID: 126060.
CWE-269 Jun 22, 2017
CVE-2016-9983 5.3 MEDIUM EPSS 0.00
IBM Sterling B2b Integrator - Information Disclosure
IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user with special privileges to view files that they should not have access to. IBM X-Force ID: 120275.
CWE-200 Jun 22, 2017
CVE-2016-9982 6.5 MEDIUM EPSS 0.00
IBM Sterling B2b Integrator - Information Disclosure
IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user to obtain sensitive information such as account lists due to improper access control. IBM X-Force ID: 120274.
CWE-200 Jun 22, 2017
CVE-2016-9747 5.4 MEDIUM EPSS 0.00
IBM Rational Engineering Lifecycle Manager - XSS
IBM RELM 4.0, 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CWE-79 Jun 22, 2017
CVE-2017-9815 6.5 MEDIUM EPSS 0.00
LibTIFF 4.0.7 - DoS
In LibTIFF 4.0.7, the TIFFReadDirEntryLong8Array function in libtiff/tif_dirread.c mishandles a malloc operation, which allows attackers to cause a denial of service (memory leak within the function _TIFFmalloc in tif_unix.c) via a crafted file.
CWE-772 Jun 22, 2017
CVE-2017-3631 5.3 MEDIUM 2 PoCs Analysis EPSS 0.11
Oracle Sun Systems Products Suite 11 - Privilege Escalation
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
CWE-119 Jun 22, 2017
CVE-2017-3630 5.3 MEDIUM 3 PoCs Analysis EPSS 0.11
Solaris RSH Stack Clash Privilege Escalation
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
CWE-787 Jun 22, 2017
CVE-2017-9782 5.5 MEDIUM EPSS 0.00
JasPer 2.0.12 - Memory Corruption
JasPer 2.0.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jp2_decode function in libjasper/jp2/jp2_dec.c.
CWE-125 Jun 21, 2017
CVE-2017-7918 6.8 MEDIUM EPSS 0.42
Cambium Networks Epmp 1000 Firmware - Improper Access Control
An Improper Access Control issue was discovered in Cambium Networks ePMP. After a valid user has used SNMP configuration export, an attacker is able to remotely trigger device configuration backups using specific MIBs. These backups lack proper access control and may allow access to sensitive information and possibly allow for configuration changes.
CWE-284 Jun 21, 2017
CVE-2017-6053 6.1 MEDIUM EPSS 0.00
Trihedral Vtscada < 11.2.23 - XSS
A Cross-Site Scripting issue was discovered in Trihedral VTScada Versions prior to 11.2.26. A cross-site scripting vulnerability may allow JavaScript code supplied by the attacker to execute within the user's browser.
CWE-79 Jun 21, 2017
CVE-2017-9781 6.1 MEDIUM EPSS 0.00
Check_MK <1.4.0p6 - XSS
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html.
CWE-79 Jun 21, 2017
CVE-2017-9773 5.7 MEDIUM EPSS 0.00
Horde_Image <2.5.0 - DoS
Denial of Service was found in Horde_Image 2.x before 2.5.0 via a crafted URL to the "Null" image driver.
CWE-20 Jun 21, 2017
CVE-2017-1304 6.2 MEDIUM EPSS 0.00
IBM Spectrum Scale/GPFS - Memory Corruption
IBM has identified a vulnerability with IBM Spectrum Scale/GPFS utilized on the Elastic Storage Server (ESS)/GPFS Storage Server (GSS) during testing of an unsupported configuration, where users applications are running on an active ESS I/O server node and utilize direct I/O to perform a read or a write to a Spectrum Scale file. This vulnerability may result in the use of an incorrect memory address, leading to a Spectrum Scale/GPFS daemon failure with a Signal 11, and possibly leading to denial of service or undetected data corruption. IBM X-Force ID: 125458.
CWE-119 Jun 21, 2017
CVE-2017-1117 5.3 MEDIUM EPSS 0.00
IBM WebSphere MQ <9.0 - DoS
IBM WebSphere MQ 8.0 and 9.0 could allow an authenticated user to cause a denial of service to the MQXR channel when trace is enabled. IBM X-Force ID: 121155.
Jun 21, 2017
CVE-2017-2829 6.5 MEDIUM EPSS 0.05
Foscam C1 Indoor HD Camera Firmware - Path Traversal
An exploitable directory traversal vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause the application to read a file from disk but a failure to adequately filter characters results in allowing an attacker to specify a file outside of a directory. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
CWE-22 Jun 21, 2017