Exploit Intelligence Platform
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
366 results
Clear all
CVE-2019-19609
7.2
HIGH
EXPLOITED
9 PoCs
Analysis
EPSS 0.81
Strapi <3.0.0-beta.17.8 - RCE
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
CWE-78
Dec 05, 2019
CVE-2019-11358
6.1
MEDIUM
EXPLOITED
7 PoCs
Analysis
EPSS 0.02
jQuery <3.4.0 - Info Disclosure
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CWE-1321
Apr 20, 2019
CVE-2019-8903
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.53
Total.js prior to 3.2.4 Directory Traversal
index.js in Total.js Platform before 3.2.3 allows path traversal.
CWE-22
Feb 18, 2019
CVE-2019-15954
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.57
Total.js CMS 12.0.0 - Authenticated RCE
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script>
CWE-862
Sep 05, 2019
CVE-2019-5786
6.5
MEDIUM
KEV
3 PoCs
Analysis
EPSS 0.89
Google Chrome < 72.0.3626.121 - Use After Free
Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
CWE-416
Jun 27, 2019
CVE-2019-5413
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.02
morgan <1.9.1 - Command Injection
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
CWE-94
Mar 21, 2019
CVE-2019-5414
8.1
HIGH
1 PoC
Analysis
EPSS 0.01
kill-port < 1.3.2 - Command Injection
If an attacker can control the port, which in itself is a very sensitive value, they can inject arbitrary OS commands due to the usage of the exec function in a third-party module kill-port < 1.3.2.
CWE-78
Mar 21, 2019
CVE-2019-8331
6.1
MEDIUM
3 PoCs
Analysis
EPSS 0.02
Bootstrap < 3.4.1 - XSS
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
CWE-79
Feb 20, 2019
CVE-2019-19919
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.18
Handlebars.js < 5.19.0 - Prototype Pollution
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads.
CWE-1321
Dec 20, 2019
CVE-2019-10760
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.11
safer-eval <1.3.2 - RCE
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
Oct 15, 2019
CVE-2019-9153
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Openpgpjs < 4.1.2 - Signature Verification Bypass
Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to forge signed messages by replacing its signatures with a "standalone" or "timestamp" signature.
CWE-347
Aug 22, 2019
CVE-2019-10742
7.5
HIGH
1 PoC
Analysis
EPSS 0.13
Axios < 0.18.0 - Improper Exception Handling
Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded.
CWE-755
May 07, 2019
CVE-2019-5422
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
buttle <0.2.0 - XSS
XSS in buttle npm package version 0.2.0 causes execution of attacker-provided code in the victim's browser when an attacker creates an arbitrary file on the server.
CWE-79
Apr 03, 2019
CVE-2019-0219
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.09
Website - XSS
A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI.
Jan 14, 2020
CVE-2019-17625
9.0
CRITICAL
1 PoC
Analysis
EPSS 0.05
Rambox - XSS
There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.
CWE-78
Oct 16, 2019
CVE-2019-17221
7.5
HIGH
1 PoC
Analysis
EPSS 0.14
PhantomJS <2.1.1 - Info Disclosure
PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.
CWE-552
Nov 05, 2019
CVE-2019-10758
9.9
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Mongo-express < 0.54.0 - Code Injection
mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment.
CWE-94
Dec 24, 2019
CVE-2019-17495
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.12
Smartbear Swagger UI < 3.23.11 - CSRF
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
CWE-352
Oct 10, 2019
CVE-2019-5485
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.50
Gitlabhook - OS Command Injection
NPM package gitlabhook version 0.0.17 is vulnerable to a Command Injection vulnerability. Arbitrary commands can be injected through the repository name.
CWE-78
Sep 13, 2019
CVE-2018-9206
9.8
CRITICAL
EXPLOITED
12 PoCs
Analysis
NUCLEI
EPSS 0.94
Blueimp jQuery-File-Upload <=9.22.0 - File Upload
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
CWE-434
Oct 11, 2018