Exploit Intelligence Platform
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
366 results
Clear all
CVE-2023-31719
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.65
FUXA <= 1.1.12 - SQL Injection
FUXA <= 1.1.12 is vulnerable to SQL Injection via /api/signin.
CWE-89
Sep 22, 2023
CVE-2023-29017
10.0
CRITICAL
4 PoCs
Analysis
EPSS 0.75
vm2 <3.9.15 - RCE
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. Prior to version 3.9.15, vm2 was not properly handling host objects passed to `Error.prepareStackTrace` in case of unhandled async errors. A threat actor could bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.15 of vm2. There are no known workarounds.
CWE-913
Apr 06, 2023
CVE-2023-5217
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.04
Webmproject Libvpx < 1.13.1 - Out-of-Bounds Write
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-787
Sep 28, 2023
CVE-2023-41646
5.3
MEDIUM
2 PoCs
Analysis
EPSS 0.00
Buttercup v2.20.3 - Info Disclosure
Buttercup v2.20.3 allows attackers to obtain the hash of the master password for the password manager via accessing the file /vaults.json/
CWE-916
Sep 07, 2023
CVE-2023-32235
7.5
HIGH
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Ghost < 5.42.1 - Path Traversal
Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
CWE-22
May 05, 2023
CVE-2023-30533
7.8
HIGH
2 PoCs
Analysis
EPSS 0.08
Sheetjs < 0.19.3 - Prototype Pollution
SheetJS Community Edition before 0.19.3 allows Prototype Pollution via a crafted file. In other words. 0.19.2 and earlier are affected, whereas 0.19.3 and later are unaffected.
CWE-1321
Apr 24, 2023
CVE-2023-40028
4.9
MEDIUM
11 PoCs
Analysis
EPSS 0.78
Ghost < 5.59.1 - Path Traversal
Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-22
Aug 15, 2023
CVE-2023-49785
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Nextchat < 2.11.2 - SSRF
NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.
CWE-918
Mar 12, 2024
CVE-2023-26136
6.5
MEDIUM
7 PoCs
Analysis
EPSS 0.07
Tough-Cookie <4.1.3 - Prototype Pollution
Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
CWE-1321
Jul 01, 2023
CVE-2023-22894
4.9
MEDIUM
2 PoCs
Analysis
EPSS 0.17
Strapi < 4.8.0 - Cleartext Storage
Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.
CWE-312
Apr 19, 2023
CVE-2023-22493
8.8
HIGH
1 PoC
Analysis
EPSS 0.00
Rsshub < 2023-01-10 - SSRF
RSSHub is an open source RSS feed generator. RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. An attacker could also use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. The patch for this issue can be found in commit a66cbcf.
CWE-918
Jan 13, 2023
CVE-2023-25813
10.0
CRITICAL
5 PoCs
Analysis
EPSS 0.04
Sequelize < 6.19.1 - SQL Injection
Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query.
CWE-89
Feb 22, 2023
CVE-2023-39141
7.5
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.86
webui-aria2 <4fe2 - Path Traversal
webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.
CWE-22
Aug 22, 2023
CVE-2023-33831
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
FUXA 1.1.13 - RCE
A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
CWE-77
Sep 18, 2023
CVE-2023-45827
7.3
HIGH
1 PoC
Analysis
EPSS 0.10
Clickbar Dot-diver < 1.0.2 - Prototype Pollution
Dot diver is a lightweight, powerful, and dependency-free TypeScript utility library that provides types and functions to work with object paths in dot notation. In versions prior to 1.0.2 there is a Prototype Pollution vulnerability in the `setByPath` function which can leads to remote code execution (RCE). This issue has been addressed in commit `98daf567` which has been included in release 1.0.2. Users are advised to upgrade. There are no known workarounds to this vulnerability.
CWE-1321
Nov 06, 2023
CVE-2023-43646
8.6
HIGH
1 PoC
Analysis
EPSS 0.02
get-func-name <2.0.1 - DoS
get-func-name is a module to retrieve a function's name securely and consistently both in NodeJS and the browser. Versions prior to 2.0.1 are subject to a regular expression denial of service (redos) vulnerability which may lead to a denial of service when parsing malicious input. This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input: '\t'.repeat(54773) + '\t/function/i'. This issue has been addressed in commit `f934b228b` which has been included in releases from 2.0.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-1333
Sep 27, 2023
CVE-2023-4771
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.22
Cksource Ckeditor < 4.15.1 - XSS
A Cross-Site scripting vulnerability has been found in CKSource CKEditor affecting versions 4.15.1 and earlier. An attacker could send malicious javascript code through the /ckeditor/samples/old/ajax.html file and retrieve an authorized user's information.
CWE-79
Nov 16, 2023
CVE-2023-30547
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.84
Vm2 < 3.9.16 - Injection
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
CWE-74
Apr 17, 2023
CVE-2023-26144
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.03
graphql <16.8.1 - DoS
Versions of the package graphql from 16.3.0 and before 16.8.1 are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This vulnerability allows an attacker to degrade system performance.
**Note:** It was not proven that this vulnerability can crash the process.
CWE-400
Sep 20, 2023
CVE-2023-27564
7.5
HIGH
1 PoC
Analysis
EPSS 0.04
N8n < 0.216.1 - Exposure to Wrong Actor
The n8n package 0.218.0 for Node.js allows Information Disclosure.
CWE-668
May 10, 2023