Exploit Intelligence Platform

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
366 results Clear all
CVE-2020-7656 6.1 MEDIUM 1 PoC Analysis EPSS 0.01
Jquery < 1.9.0 - XSS
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
CWE-79 May 19, 2020
CVE-2020-7661 7.5 HIGH 1 PoC Analysis EPSS 0.01
Url-regex - Denial of Service
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
CWE-400 Jun 04, 2020
CVE-2020-28478 7.5 HIGH 1 PoC Analysis EPSS 0.01
gsap <3.6.0 - Info Disclosure
This affects the package gsap before 3.6.0.
Jan 19, 2021
CVE-2020-28360 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.02
Private-ip < 1.0.5 - SSRF
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques.
CWE-918 Nov 23, 2020
CVE-2020-7699 7.5 HIGH 1 PoC Analysis EPSS 0.04
Express-fileupload < 1.1.8 - Prototype Pollution
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
CWE-1321 Jul 30, 2020
CVE-2020-7740 8.2 HIGH 1 PoC Analysis EPSS 0.05
Node-pdf-generator - SSRF
This affects all versions of package node-pdf-generator. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.
CWE-918 Oct 06, 2020
CVE-2020-8214 7.5 HIGH 1 PoC Analysis EPSS 0.00
servey < 3 - Path Traversal
A path traversal vulnerability in servey version < 3 allows an attacker to read content of any arbitrary file.
CWE-22 Jul 20, 2020
CVE-2020-28502 8.1 HIGH 2 PoCs Analysis EPSS 0.17
Xmlhttprequest < 1.7.0 - Code Injection
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
CWE-94 Mar 05, 2021
CVE-2020-7750 9.6 CRITICAL 1 PoC Analysis EPSS 0.06
MIT Scratch-svg-renderer - XSS
This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function.
CWE-79 Oct 21, 2020
CVE-2020-15500 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.15
Tileservergl < 3.0.0 - XSS
An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.
CWE-79 Jul 01, 2020
CVE-2020-11883 5.3 MEDIUM 1 PoC Analysis EPSS 0.03
Divante Storefront-api < 1.11.1 - Error Information Exposure
In Divante vue-storefront-api through 1.11.1 and storefront-api through 1.0-rc.1, as used in VueStorefront PWA, unexpected HTTP requests lead to an exception that discloses the error stack trace, with absolute file paths and Node.js module names.
CWE-209 Apr 17, 2020
CVE-2020-8175 5.5 MEDIUM 2 PoCs Analysis EPSS 0.00
jpeg-js <0.4.0 - DoS
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
CWE-400 Jul 24, 2020
CVE-2020-15228 3.5 LOW 1 PoC Analysis EPSS 0.00
@actions/core <1.2.6 - Info Disclosure
In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.
CWE-20 Oct 01, 2020
CVE-2020-28249 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Joplin < 1.3.11 - XSS
Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note.
CWE-79 Nov 06, 2020
CVE-2020-15930 6.1 MEDIUM 1 PoC Analysis EPSS 0.04
Joplin < 1.0.245 - XSS
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
CWE-79 Sep 24, 2020
CVE-2020-7680 6.1 MEDIUM 1 PoC Analysis EPSS 0.03
Docsify < 4.11.4 - XSS
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
CWE-79 Jul 20, 2020
CVE-2020-9038 5.4 MEDIUM 2 PoCs Analysis EPSS 0.01
Joplin < 1.0.184 - XSS
Joplin through 1.0.184 allows Arbitrary File Read via XSS.
CWE-79 Feb 17, 2020
CVE-2019-20149 7.5 HIGH 1 PoC Analysis EPSS 0.00
Kind-of < 6.0.3 - Exposure to Wrong Actor
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
CWE-668 Dec 30, 2019
CVE-2019-18818 9.8 CRITICAL EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.94
Strapi CMS Unauthenticated Password Reset
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
CWE-640 Nov 07, 2019
CVE-2019-15597 9.8 CRITICAL 1 PoC Analysis EPSS 0.04
Node-df - Code Injection
A code injection exists in node-df v0.1.4 that can allow an attacker to remote code execution by unsanitized input.
CWE-94 Dec 18, 2019