Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

339,380 CVEs tracked 53,349 with exploits 4,748 exploited in wild 1,551 CISA KEV 3,945 Nuclei templates 49,139 vendors 42,810 researchers
111,437 results Clear all
CVE-2017-1292 5.3 MEDIUM EPSS 0.00
IBM Maximo Asset Management - Information Disclosure
IBM Maximo Asset Management 7.5 and 7.6 generates error messages that could reveal sensitive information that could be used in further attacks against the system. IBM X-Force ID: 125153.
CWE-200 May 26, 2017
CVE-2017-1291 5.4 MEDIUM EPSS 0.00
IBM Maximo Asset Management - XSS
IBM Maximo Asset Management 7.5 and 7.6 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 125152.
CWE-79 May 26, 2017
CVE-2017-9239 6.5 MEDIUM 1 Writeup EPSS 0.00
Exiv2 <0.26 - Memory Corruption
An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is incorrect, the program assigns pValue_ to 0x0, and the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use the value of pValue() to cause a segmentation fault. To exploit this vulnerability, someone must open a crafted tiff file.
CWE-369 May 26, 2017
CVE-2017-9037 6.1 MEDIUM EPSS 0.01
Trend Micro ServerProtect for Linux <3.0 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.
CWE-79 May 26, 2017
CVE-2017-9032 6.1 MEDIUM EPSS 0.01
Trend Micro ServerProtect for Linux <3.0 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
CWE-79 May 26, 2017
CVE-2017-5868 6.1 MEDIUM NUCLEI EPSS 0.08
OpenVPN Access Server 2.1.4 - CRLF Injection
CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via "%0A" characters in the PATH_INFO to __session_start__/.
CWE-93 May 26, 2017
CVE-2016-2165 6.5 MEDIUM EPSS 0.00
Cloudfoundry Cf-release < 231 - Improper Input Validation
The Loggregator Traffic Controller endpoints in cf-release v231 and lower, Pivotal Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 are not cleansing request URL paths when they are invalid and are returning them in the 404 response. This could allow malicious scripts to be written directly into the 404 response.
CWE-20 May 25, 2017
CVE-2016-0781 6.1 MEDIUM EPSS 0.00
Cloud Foundry <1.6.20, UAA - XSS
The UAA OAuth approval pages in Cloud Foundry v208 to v231, Login-server v1.6 to v1.14, UAA v2.0.0 to v2.7.4.1, UAA v3.0.0 to v3.2.0, UAA-Release v2 to v7 and Pivotal Elastic Runtime 1.6.x versions prior to 1.6.20 are vulnerable to an XSS attack by specifying malicious java script content in either the OAuth scopes (SCIM groups) or SCIM group descriptions.
CWE-79 May 25, 2017
CVE-2015-3190 6.1 MEDIUM EPSS 0.00
Cloud Foundry <v209 - Open Redirect
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter.
CWE-601 May 25, 2017
CVE-2015-1834 6.5 MEDIUM EPSS 0.00
Cloudfoundry Cf-release < 207 - Path Traversal
A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the 'outbreak' of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject '../' sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container.
CWE-22 May 25, 2017
CVE-2017-2801 6.5 MEDIUM EPSS 0.00
Botan - Out-of-Bounds Read
A programming error exists in a way Randombit Botan cryptographic library version 2.0.1 implements x500 string comparisons which could lead to certificate verification issues and abuse. A specially crafted X509 certificate would need to be delivered to the client or server application in order to trigger this vulnerability.
CWE-125 May 24, 2017
CVE-2017-9216 6.5 MEDIUM EPSS 0.01
Artifex jbig2dec 0.13 - Memory Corruption
libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file.
CWE-476 May 24, 2017
CVE-2017-8314 5.5 MEDIUM EPSS 0.03
Kodi < 17.1 - Path Traversal
Directory Traversal in Zip Extraction built-in function in Kodi 17.1 and earlier allows arbitrary file write on disk via a Zip file as subtitles.
CWE-22 May 23, 2017
CVE-2017-8313 5.5 MEDIUM EPSS 0.00
Videolan Vlc Media Player < 2.2.4 - Out-of-Bounds Read
Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file.
CWE-125 May 23, 2017
CVE-2017-8312 5.5 MEDIUM EPSS 0.00
Videolan Vlc Media Player < 2.2.6 - Out-of-Bounds Read
Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file.
CWE-125 May 23, 2017
CVE-2017-8310 5.5 MEDIUM EPSS 0.00
Videolan Vlc Media Player - Out-of-Bounds Read
Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file.
CWE-125 May 23, 2017
CVE-2017-3128 4.8 MEDIUM EPSS 0.00
Fortinet Fortios - XSS
A stored XSS (Cross-Site-Scripting) vulnerability in Fortinet FortiOS allows attackers to execute unauthorized code or commands via the policy global-label parameter.
CWE-79 May 23, 2017
CVE-2017-9211 5.5 MEDIUM 1 Writeup EPSS 0.00
Linux kernel <4.11.2 - DoS
The crypto_skcipher_init_tfm function in crypto/skcipher.c in the Linux kernel through 4.11.2 relies on a setkey function that lacks a key-size check, which allows local users to cause a denial of service (NULL pointer dereference) via a crafted application.
CWE-476 May 23, 2017
CVE-2017-5966 4.9 MEDIUM EPSS 0.00
Sitecore Crm - Path Traversal
Sitecore CRM 8.1 Rev 151207 allows remote authenticated administrators to read arbitrary files via an absolute path traversal attack on sitecore/shell/download.aspx with the file parameter.
CWE-22 May 23, 2017
CVE-2017-5965 6.7 MEDIUM EPSS 0.00
Sitecore CRM 8.1 - RCE
The package manager in Sitecore CRM 8.1 Rev 151207 allows remote authenticated administrators to execute arbitrary ASP code by creating a ZIP archive in which a .asp file has a ..\ in its pathname, visiting sitecore/shell/applications/install/dialogs/Upload%20Package/UploadPackage2.aspx to upload this archive and extract its contents, and visiting a URI under sitecore/ to execute the .asp file.
May 23, 2017