Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
366 results Clear all
CVE-2018-15685 8.1 HIGH 2 PoCs Analysis EPSS 0.13
Electron < 1.7.16 - Remote Code Execution
GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a WebPreferences vulnerability that can be leveraged to perform remote code execution.
CWE-1188 Aug 23, 2018
CVE-2018-1000006 8.8 HIGH 4 PoCs Analysis EPSS 0.92
Atom Electron < 1.7.10 - OS Command Injection
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
CWE-78 Jan 24, 2018
CVE-2018-0114 7.5 HIGH 15 PoCs Analysis EPSS 0.85
Cisco Node-jose < 0.11.0 - Signature Verification Bypass
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
CWE-347 Jan 04, 2018
CVE-2018-25031 4.3 MEDIUM 16 PoCs Analysis NUCLEI EPSS 0.80
Swagger UI <4.1.2 - CSRF
Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. Note: This was originally claimed to be resolved in 4.1.3. However, third parties have indicated this is not resolved in 4.1.3 and even occurs in that version and possibly others.
CWE-918 Mar 11, 2022
CVE-2018-14040 6.1 MEDIUM 2 PoCs Analysis EPSS 0.03
Bootstrap <4.1.2 - XSS
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
CWE-79 Jul 13, 2018
CVE-2018-5158 8.8 HIGH 1 PoC Analysis EPSS 0.43
Firefox ESR < 52.8-Firefox < 60 - Code Injection
The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
CWE-94 Jun 11, 2018
CVE-2018-6341 6.1 MEDIUM 1 PoC Analysis EPSS 0.11
Facebook React < 16.0.1 - XSS
React applications which rendered to HTML using the ReactDOMServer API were not escaping user-supplied attribute names at render-time. That lack of escaping could lead to a cross-site scripting vulnerability. This issue affected minor releases 16.0.x, 16.1.x, 16.2.x, 16.3.x, and 16.4.x. It was fixed in 16.0.1, 16.1.2, 16.2.1, 16.3.3, and 16.4.2.
CWE-79 Dec 31, 2018
CVE-2018-3783 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Flintcms < 1.1.9 - SQL Injection
A privilege escalation detected in flintcms versions <= 1.1.9 allows account takeover due to blind MongoDB injection in password reset.
CWE-89 Aug 17, 2018
CVE-2018-14042 6.1 MEDIUM 1 PoC Analysis EPSS 0.02
Bootstrap <4.1.2 - XSS
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
CWE-79 Jul 13, 2018
CVE-2018-14041 6.1 MEDIUM 1 PoC Analysis EPSS 0.08
Bootstrap <4.1.2 - XSS
In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy.
CWE-79 Jul 13, 2018
CVE-2018-16485 6.5 MEDIUM 1 PoC Analysis EPSS 0.01
M-server < 1.4.1 - Path Traversal
Path Traversal vulnerability in module m-server <1.4.1 allows malicious user to access unauthorized content of any file in the directory tree e.g. /etc/passwd by appending slashes to the URL request.
CWE-22 Feb 01, 2019
CVE-2018-16484 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
M-server < 1.4.2 - XSS
A XSS vulnerability was found in module m-server <1.4.2 that allows malicious Javascript code or HTML to be executed, due to the lack of escaping for special characters in folder names.
CWE-79 Feb 01, 2019
CVE-2018-16459 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Exceljs < 1.6 - XSS
An unescaped payload in exceljs <v1.6 allows a possible XSS via cell value when worksheet is displayed in browser.
CWE-79 Sep 06, 2018
CVE-2018-3773 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Metascraper < 3.9.2 - XSS
There is a stored Cross-Site Scripting vulnerability in Open Graph meta properties read by the `metascrape` npm module <= 3.9.2.
CWE-79 Jul 30, 2018
CVE-2018-3771 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Statics-server < 0.0.9 - XSS
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CWE-79 Jul 20, 2018
CVE-2018-3754 8.8 HIGH 1 PoC Analysis EPSS 0.00
Query-mysql - SQL Injection
Node.js third-party module query-mysql versions 0.0.0, 0.0.1, and 0.0.2 are vulnerable to an SQL injection vulnerability due to lack of user input sanitization. This may allow an attacker to run arbitrary SQL queries when fetching data from database.
CWE-89 Jul 03, 2018
CVE-2018-3748 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Glance < 3.0.8 - XSS
There is a Stored XSS vulnerability in the glance node module versions <= 3.0.5. File name, which contains malicious HTML (eg. embedded iframe element or javascript: pseudo-protocol handler in <a> element) allows to execute JavaScript code against any user who opens a directory listing containing such crafted file name.
CWE-79 Jul 03, 2018
CVE-2018-3747 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Public.js < 0.1.3 - XSS
The public node module versions <= 1.0.3 allows to embed HTML in file names, which (in certain conditions) might lead to execute malicious JavaScript.
CWE-79 Jul 03, 2018
CVE-2018-3731 7.5 HIGH 1 PoC Analysis EPSS 0.00
Public.js < 0.1.3 - Path Traversal
public node module suffers from a Path Traversal vulnerability due to lack of validation of filePath, which allows a malicious user to read content of any file with known path.
CWE-22 Jun 07, 2018
CVE-2018-3730 7.5 HIGH 1 PoC Analysis EPSS 0.00
Mcstatic - Path Traversal
mcstatic node module suffers from a Path Traversal vulnerability due to lack of validation of filePath, which allows a malicious user to read content of any file with known path.
CWE-22 Jun 07, 2018