Exploit Intelligence Platform
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
366 results
Clear all
CVE-2020-7656
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.01
Jquery < 1.9.0 - XSS
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
CWE-79
May 19, 2020
CVE-2020-7661
7.5
HIGH
1 PoC
Analysis
EPSS 0.01
Url-regex - Denial of Service
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
CWE-400
Jun 04, 2020
CVE-2020-28478
7.5
HIGH
1 PoC
Analysis
EPSS 0.01
gsap <3.6.0 - Info Disclosure
This affects the package gsap before 3.6.0.
Jan 19, 2021
CVE-2020-28360
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.02
Private-ip < 1.0.5 - SSRF
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques.
CWE-918
Nov 23, 2020
CVE-2020-7699
7.5
HIGH
1 PoC
Analysis
EPSS 0.04
Express-fileupload < 1.1.8 - Prototype Pollution
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
CWE-1321
Jul 30, 2020
CVE-2020-7740
8.2
HIGH
1 PoC
Analysis
EPSS 0.05
Node-pdf-generator - SSRF
This affects all versions of package node-pdf-generator. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.
CWE-918
Oct 06, 2020
CVE-2020-8214
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
servey < 3 - Path Traversal
A path traversal vulnerability in servey version < 3 allows an attacker to read content of any arbitrary file.
CWE-22
Jul 20, 2020
CVE-2020-28502
8.1
HIGH
2 PoCs
Analysis
EPSS 0.17
Xmlhttprequest < 1.7.0 - Code Injection
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
CWE-94
Mar 05, 2021
CVE-2020-7750
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.06
MIT Scratch-svg-renderer - XSS
This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function.
CWE-79
Oct 21, 2020
CVE-2020-15500
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.15
Tileservergl < 3.0.0 - XSS
An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.
CWE-79
Jul 01, 2020
CVE-2020-11883
5.3
MEDIUM
1 PoC
Analysis
EPSS 0.03
Divante Storefront-api < 1.11.1 - Error Information Exposure
In Divante vue-storefront-api through 1.11.1 and storefront-api through 1.0-rc.1, as used in VueStorefront PWA, unexpected HTTP requests lead to an exception that discloses the error stack trace, with absolute file paths and Node.js module names.
CWE-209
Apr 17, 2020
CVE-2020-8175
5.5
MEDIUM
2 PoCs
Analysis
EPSS 0.00
jpeg-js <0.4.0 - DoS
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
CWE-400
Jul 24, 2020
CVE-2020-15228
3.5
LOW
1 PoC
Analysis
EPSS 0.00
@actions/core <1.2.6 - Info Disclosure
In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.
CWE-20
Oct 01, 2020
CVE-2020-28249
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
Joplin < 1.3.11 - XSS
Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note.
CWE-79
Nov 06, 2020
CVE-2020-15930
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.04
Joplin < 1.0.245 - XSS
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
CWE-79
Sep 24, 2020
CVE-2020-7680
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.03
Docsify < 4.11.4 - XSS
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
CWE-79
Jul 20, 2020
CVE-2020-9038
5.4
MEDIUM
2 PoCs
Analysis
EPSS 0.01
Joplin < 1.0.184 - XSS
Joplin through 1.0.184 allows Arbitrary File Read via XSS.
CWE-79
Feb 17, 2020
CVE-2019-20149
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Kind-of < 6.0.3 - Exposure to Wrong Actor
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
CWE-668
Dec 30, 2019
CVE-2019-18818
9.8
CRITICAL
EXPLOITED
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Strapi CMS Unauthenticated Password Reset
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
CWE-640
Nov 07, 2019
CVE-2019-15597
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.04
Node-df - Code Injection
A code injection exists in node-df v0.1.4 that can allow an attacker to remote code execution by unsanitized input.
CWE-94
Dec 18, 2019