Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
171 results Clear all
CVE-2023-4863 8.8 HIGH KEV 11 PoCs Analysis EPSS 0.94
Google Chrome <116.0.5845.187 - Buffer Overflow
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
CWE-787 Sep 12, 2023
CVE-2023-27163 6.5 MEDIUM EXPLOITED 30 PoCs Analysis NUCLEI EPSS 0.93
request-baskets <1.2.1 - SSRF
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
CWE-918 Mar 31, 2023
CVE-2023-48795 5.9 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.54
OpenSSH <9.6 - Open Redirect
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CWE-354 Dec 18, 2023
CVE-2023-28434 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.52
Minio <RELEASE.2023-03-20T20-16-18Z - Auth Bypass
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
CWE-269 Mar 22, 2023
CVE-2023-30625 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.88
Rudder Server SQLI Remote Code Execution
rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.
CWE-89 Jun 16, 2023
CVE-2023-34927 6.5 MEDIUM 3 PoCs Analysis EPSS 0.00
Casbin Casdoor < 1.331.0 - CSRF
Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.
CWE-352 Jun 22, 2023
CVE-2023-5044 7.6 HIGH 3 PoCs Analysis EPSS 0.10
Kubernetes Ingress-nginx < 1.9.0 - Code Injection
Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.
CWE-94 Oct 25, 2023
CVE-2023-3128 9.4 CRITICAL 1 PoC Analysis EPSS 0.02
Grafana - Auth Bypass
Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
CWE-290 Jun 22, 2023
CVE-2023-40029 9.9 CRITICAL 1 PoC Analysis EPSS 0.01
Argoproj Argo CD < 2.6.15 - Information Disclosure
Argo CD is a declarative continuous deployment for Kubernetes. Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored in`kubectl.kubernetes.io/last-applied-configuration` annotation. pull request #7139 introduced the ability to manage cluster labels and annotations. Since clusters are stored as secrets it also exposes the `kubectl.kubernetes.io/last-applied-configuration` annotation which includes full secret body. In order to view the cluster annotations via the Argo CD API, the user must have `clusters, get` RBAC access. **Note:** In many cases, cluster secrets do not contain any actually-secret information. But sometimes, as in bearer-token auth, the contents might be very sensitive. The bug has been patched in versions 2.8.3, 2.7.14, and 2.6.15. Users are advised to upgrade. Users unable to upgrade should update/deploy cluster secret with `server-side-apply` flag which does not use or rely on `kubectl.kubernetes.io/last-applied-configuration` annotation. Note: annotation for existing secrets will require manual removal.
CWE-532 Sep 07, 2023
CVE-2023-40297 7.5 HIGH 1 PoC Analysis EPSS 0.03
Stakater Forecastle - Path Traversal
Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the website component.
CWE-22 May 15, 2024
CVE-2023-2728 6.5 MEDIUM 1 PoC Analysis EPSS 0.05
Kubernetes < 1.24.14 - Improper Input Validation
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
CWE-20 Jul 03, 2023
CVE-2023-47108 7.5 HIGH 1 PoC Analysis EPSS 0.04
Opentelemetry < 0.46.0 - Resource Allocation Without Limits
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.
CWE-770 Nov 10, 2023
CVE-2023-45288 7.5 HIGH 1 PoC Analysis EPSS 0.71
HTTP/2 - Info Disclosure
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
Apr 04, 2024
CVE-2023-5043 7.6 HIGH 1 PoC Analysis EPSS 0.04
Kubernetes Ingress-nginx < 1.9.0 - Injection
Ingress nginx annotation injection causes arbitrary command execution.
CWE-74 Oct 25, 2023
CVE-2023-4698 7.5 HIGH 1 PoC Analysis EPSS 0.02
Memos < 0.13.2 - Improper Input Validation
Improper Input Validation in GitHub repository usememos/memos prior to 0.13.2.
CWE-20 Sep 01, 2023
CVE-2023-22463 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup NUCLEI EPSS 0.92
Fit2cloud Kubepi < 1.6.3 - Hard-coded Credentials
KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code. The vulnerability has been fixed in 1.6.3. In the patch, JWT key is specified in app.yml. If the user leaves it blank, a random key will be used. There are no workarounds aside from upgrading.
CWE-798 Jan 04, 2023
CVE-2023-4696 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Memos < 0.13.2 - Improper Access Control
Improper Access Control in GitHub repository usememos/memos prior to 0.13.2.
CWE-284 Sep 01, 2023
CVE-2023-0744 9.8 CRITICAL 1 PoC Analysis EPSS 0.09
Answer < 1.0.4 - Improper Access Control
Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4.
CWE-284 Feb 08, 2023
CVE-2022-24124 7.5 HIGH 7 PoCs Analysis NUCLEI EPSS 0.61
Casdoor <1.13.1 - SQL Injection
The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.
CWE-89 Jan 29, 2022
CVE-2022-30781 7.5 HIGH 3 PoCs Analysis EPSS 0.81
Gitea <1.16.7 - Info Disclosure
Gitea before 1.16.7 does not escape git fetch remote.
CWE-116 May 16, 2022