Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
366 results Clear all
CVE-2019-19609 7.2 HIGH EXPLOITED 9 PoCs Analysis EPSS 0.81
Strapi <3.0.0-beta.17.8 - RCE
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
CWE-78 Dec 05, 2019
CVE-2019-11358 6.1 MEDIUM EXPLOITED 7 PoCs Analysis EPSS 0.02
jQuery <3.4.0 - Info Disclosure
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CWE-1321 Apr 20, 2019
CVE-2019-8903 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.53
Total.js prior to 3.2.4 Directory Traversal
index.js in Total.js Platform before 3.2.3 allows path traversal.
CWE-22 Feb 18, 2019
CVE-2019-15954 9.9 CRITICAL 2 PoCs Analysis EPSS 0.57
Total.js CMS 12.0.0 - Authenticated RCE
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script>
CWE-862 Sep 05, 2019
CVE-2019-5786 6.5 MEDIUM KEV 3 PoCs Analysis EPSS 0.89
Google Chrome < 72.0.3626.121 - Use After Free
Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
CWE-416 Jun 27, 2019
CVE-2019-5413 9.8 CRITICAL 3 PoCs Analysis EPSS 0.02
morgan <1.9.1 - Command Injection
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
CWE-94 Mar 21, 2019
CVE-2019-5414 8.1 HIGH 1 PoC Analysis EPSS 0.01
kill-port < 1.3.2 - Command Injection
If an attacker can control the port, which in itself is a very sensitive value, they can inject arbitrary OS commands due to the usage of the exec function in a third-party module kill-port < 1.3.2.
CWE-78 Mar 21, 2019
CVE-2019-8331 6.1 MEDIUM 3 PoCs Analysis EPSS 0.02
Bootstrap < 3.4.1 - XSS
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
CWE-79 Feb 20, 2019
CVE-2019-19919 9.8 CRITICAL 1 PoC Analysis EPSS 0.18
Handlebars.js < 5.19.0 - Prototype Pollution
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads.
CWE-1321 Dec 20, 2019
CVE-2019-10760 9.9 CRITICAL 1 PoC Analysis EPSS 0.11
safer-eval <1.3.2 - RCE
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
Oct 15, 2019
CVE-2019-9153 7.5 HIGH 1 PoC Analysis EPSS 0.00
Openpgpjs < 4.1.2 - Signature Verification Bypass
Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to forge signed messages by replacing its signatures with a "standalone" or "timestamp" signature.
CWE-347 Aug 22, 2019
CVE-2019-10742 7.5 HIGH 1 PoC Analysis EPSS 0.13
Axios < 0.18.0 - Improper Exception Handling
Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded.
CWE-755 May 07, 2019
CVE-2019-5422 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
buttle <0.2.0 - XSS
XSS in buttle npm package version 0.2.0 causes execution of attacker-provided code in the victim's browser when an attacker creates an arbitrary file on the server.
CWE-79 Apr 03, 2019
CVE-2019-0219 9.8 CRITICAL 1 PoC Analysis EPSS 0.09
Website - XSS
A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI.
Jan 14, 2020
CVE-2019-17625 9.0 CRITICAL 1 PoC Analysis EPSS 0.05
Rambox - XSS
There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.
CWE-78 Oct 16, 2019
CVE-2019-17221 7.5 HIGH 1 PoC Analysis EPSS 0.14
PhantomJS <2.1.1 - Info Disclosure
PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.
CWE-552 Nov 05, 2019
CVE-2019-10758 9.9 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Mongo-express < 0.54.0 - Code Injection
mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment.
CWE-94 Dec 24, 2019
CVE-2019-17495 9.8 CRITICAL 1 PoC Analysis EPSS 0.12
Smartbear Swagger UI < 3.23.11 - CSRF
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
CWE-352 Oct 10, 2019
CVE-2019-5485 10.0 CRITICAL 1 PoC Analysis EPSS 0.50
Gitlabhook - OS Command Injection
NPM package gitlabhook version 0.0.17 is vulnerable to a Command Injection vulnerability. Arbitrary commands can be injected through the repository name.
CWE-78 Sep 13, 2019
CVE-2018-9206 9.8 CRITICAL EXPLOITED 12 PoCs Analysis NUCLEI EPSS 0.94
Blueimp jQuery-File-Upload <=9.22.0 - File Upload
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
CWE-434 Oct 11, 2018