Exploit Intelligence Platform

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
366 results Clear all
CVE-2023-32314 9.8 CRITICAL 1 PoC Analysis EPSS 0.70
Vm2 < 3.9.18 - Injection
vm2 is a sandbox that can run untrusted code with Node's built-in modules. A sandbox escape vulnerability exists in vm2 for versions up to and including 3.9.17. It abuses an unexpected creation of a host object based on the specification of `Proxy`. As a result a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-74 May 15, 2023
CVE-2023-48309 5.3 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Nextauth.js Next-auth < 4.24.5 - Incorrect Authorization
NextAuth.js provides authentication for Next.js. `next-auth` applications prior to version 4.24.5 that rely on the default Middleware authorization are affected by a vulnerability. A bad actor could create an empty/mock user, by getting hold of a NextAuth.js-issued JWT from an interrupted OAuth sign-in flow (state, PKCE or nonce). Manually overriding the `next-auth.session-token` cookie value with this non-related JWT would let the user simulate a logged in user, albeit having no user information associated with it. (The only property on this user is an opaque randomly generated string). This vulnerability does not give access to other users' data, neither to resources that require proper authorization via scopes or other means. The created mock user has no information associated with it (ie. no name, email, access_token, etc.) This vulnerability can be exploited by bad actors to peek at logged in user states (e.g. dashboard layout). `next-auth` `v4.24.5` contains a patch for the vulnerability. As a workaround, using a custom authorization callback for Middleware, developers can manually do a basic authentication.
CWE-285 Nov 20, 2023
CVE-2023-37478 7.5 HIGH 2 PoCs Analysis EPSS 0.01
Pnpm < 7.33.4 - Improper Access Control
pnpm is a package manager. It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives. This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm. This issue has been patched in version(s) 7.33.4 and 8.6.8.
CWE-284 Aug 01, 2023
CVE-2023-45857 6.5 MEDIUM 3 PoCs Analysis EPSS 0.00
Axios 1.5.1 - Info Disclosure
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
CWE-352 Nov 08, 2023
CVE-2023-37903 9.8 CRITICAL 1 PoC Analysis EPSS 0.36
Vm2 < 3.9.19 - OS Command Injection
vm2 is an open source vm/sandbox for Node.js. In vm2 for versions up to and including 3.9.19, Node.js custom inspect function allows attackers to escape the sandbox and run arbitrary code. This may result in Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. There are no patches and no known workarounds. Users are advised to find an alternative software.
CWE-78 Jul 21, 2023
CVE-2023-46998 6.1 MEDIUM 1 PoC Analysis EPSS 0.39
BootBox Bootbox.js <6.0 - XSS
Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.
CWE-79 Nov 07, 2023
CVE-2023-31718 7.5 HIGH 1 PoC Analysis EPSS 0.38
FUXA <= 1.1.12 - Path Traversal
FUXA <= 1.1.12 is vulnerable to Local via Inclusion via /api/download.
CWE-98 Sep 22, 2023
CVE-2023-31717 7.5 HIGH 1 PoC Analysis EPSS 0.31
FUXA <= 1.1.12 - SQL Injection
A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database.
CWE-89 Sep 22, 2023
CVE-2023-31716 7.5 HIGH 1 PoC Analysis EPSS 0.37
FUXA <= 1.1.12 - Local File Inclusion
FUXA <= 1.1.12 has a Local File Inclusion vulnerability via file=fuxa.log
CWE-98 Sep 22, 2023
CVE-2023-34840 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Angular-ui-notification < 0.3.6 - XSS
angular-ui-notification v0.1.0, v0.2.0, and v0.3.6 was discovered to contain a cross-site scripting (XSS) vulnerability.
CWE-79 Jun 30, 2023
CVE-2023-22621 7.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Strapi < 4.5.6 - Injection
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
CWE-74 Apr 19, 2023
CVE-2022-29078 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
ejs 3.1.6 - Code Injection
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
CWE-94 Apr 25, 2022
CVE-2022-25927 5.3 MEDIUM 2 PoCs Analysis EPSS 0.01
Ua-parser-js < 0.7.33 - Denial of Service
Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function.
CWE-1333 Jan 26, 2023
CVE-2022-33171 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
TypeORM <0.3.0 - SQL Injection
The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id string leads to SQL injection. NOTE: the vendor's position is that the user's application is responsible for input validation
CWE-89 Jul 04, 2022
CVE-2022-24434 7.5 HIGH 1 PoC Analysis EPSS 0.02
Package Dicer - DoS
This affects all versions of package dicer. A malicious attacker can send a modified form to server, and crash the nodejs service. An attacker could sent the payload again and again so that the service continuously crashes.
May 20, 2022
CVE-2022-31147 7.5 HIGH 1 PoC Analysis EPSS 0.00
jQuery Validation Plugin <1.19.5 - DoS
The jQuery Validation Plugin (jquery-validation) provides drop-in validation for forms. Versions of jquery-validation prior to 1.19.5 are vulnerable to regular expression denial of service (ReDoS) when an attacker is able to supply arbitrary input to the url2 method. This is due to an incomplete fix for CVE-2021-43306. Users should upgrade to version 1.19.5 to receive a patch.
CWE-1333 Jul 14, 2022
CVE-2022-29622 9.8 CRITICAL 1 PoC Analysis EPSS 0.24
Formidable < 3.2.4 - Unrestricted File Upload
An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability.
CWE-434 May 16, 2022
CVE-2022-31160 6.1 MEDIUM 1 PoC Analysis EPSS 0.10
jQuery UI <1.13.2 - XSS
jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`.
CWE-79 Jul 20, 2022
CVE-2022-24785 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.02
Moment < 2.29.2 - Path Traversal
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
CWE-22 Apr 04, 2022
CVE-2022-25869 4.2 MEDIUM 1 PoC Analysis EPSS 0.08
Angularjs - XSS
All versions of the package angular; all versions of the package angularjs.core; all versions of the package angularjs are vulnerable to Cross-site Scripting (XSS) due to insecure page caching in the Internet Explorer browser, which allows interpolation of <textarea> elements.
CWE-79 Jul 15, 2022