Exploit Intelligence Platform

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
366 results Clear all
CVE-2017-5941 9.8 CRITICAL 9 PoCs Analysis EPSS 0.78
Node-serialize < 0.0.4 - Insecure Deserialization
An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
CWE-502 Feb 09, 2017
CVE-2017-20165 3.5 LOW 1 PoC Analysis EPSS 0.02
debug-js <3.0.x - Info Disclosure
A vulnerability classified as problematic has been found in debug-js debug up to 3.0.x. This affects the function useColors of the file src/node.js. The manipulation of the argument str leads to inefficient regular expression complexity. Upgrading to version 3.1.0 is able to address this issue. The identifier of the patch is c38a0166c266a679c8de012d4eaccec3f944e685. It is recommended to upgrade the affected component. The identifier VDB-217665 was assigned to this vulnerability.
CWE-1333 Jan 09, 2023
CVE-2017-1000170 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
jqueryFileTree <2.1.5 - Path Traversal
jqueryFileTree 2.1.5 and older Directory Traversal
CWE-22 Nov 17, 2017
CVE-2017-18635 6.1 MEDIUM 1 PoC Analysis EPSS 0.08
noVNC <0.6.2 - XSS
An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name.
CWE-79 Sep 25, 2019
CVE-2017-16088 10.0 CRITICAL 1 PoC Analysis EPSS 0.02
safe-eval - Code Injection
The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
CWE-610 Jun 07, 2018
CVE-2017-16082 9.8 CRITICAL 1 PoC Analysis EPSS 0.71
Node-postgres PG < 2.11.2 - Code Injection
A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.
CWE-94 Jun 07, 2018
CVE-2017-16570 8.8 HIGH 1 PoC Analysis EPSS 0.00
KeystoneJS <4.0.0-beta.7 - CSRF
KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests that lack an x-csrf-token header.
CWE-352 Nov 06, 2017
CVE-2017-15879 8.8 HIGH 1 PoC Analysis EPSS 0.10
Keystone < 4.0.0 - Improper Input Validation
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export.
CWE-20 Oct 24, 2017
CVE-2017-15878 6.1 MEDIUM 1 PoC Analysis EPSS 0.04
Keystone < 4.0.0 - XSS
A cross-site scripting (XSS) vulnerability exists in fields/types/markdown/MarkdownType.js in KeystoneJS before 4.0.0-beta.7 via the Contact Us feature.
CWE-79 Oct 24, 2017
CVE-2016-10555 6.5 MEDIUM 4 PoCs Analysis EPSS 0.82
Jwt-simple < 0.3.0 - Improper Input Validation
Since "algorithm" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.
CWE-310 May 31, 2018
CVE-2016-10542 7.5 HIGH 1 PoC Analysis EPSS 0.66
WS < 1.1.0 - Denial of Service
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.
CWE-20 May 31, 2018
CVE-2016-1000229 6.1 MEDIUM 1 PoC Analysis EPSS 0.05
swagger-ui - XSS
swagger-ui has XSS in key names
CWE-79 Dec 20, 2019
CVE-2016-10735 6.1 MEDIUM 1 PoC Analysis EPSS 0.07
Bootstrap < 3.4.0 - XSS
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
CWE-79 Jan 09, 2019
CVE-2015-9235 9.8 CRITICAL 5 PoCs Analysis EPSS 0.37
Auth0 Jsonwebtoken < 4.2.2 - Broken Cryptographic Algorithm
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
CWE-327 May 29, 2018
CVE-2015-1369 1 PoC Analysis EPSS 0.00
Sequelize <2.0.0-rc7 - SQL Injection
SQL injection vulnerability in Sequelize before 2.0.0-rc7 for Node.js allows remote attackers to execute arbitrary SQL commands via the order parameter.
CWE-89 Jan 27, 2015
CVE-2015-9251 6.1 MEDIUM EXPLOITED 5 PoCs Analysis EPSS 0.27
Jquery < 3.0.0 - XSS
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CWE-79 Jan 18, 2018
CVE-2015-9238 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Secure-compare < 3.0.1 - Format String Vulnerability
secure-compare 3.0.0 and below do not actually compare two strings properly. compare was actually comparing the first argument with itself, meaning the check passed for any two strings of the same length.
CWE-697 May 31, 2018
CVE-2015-1164 1 PoC Analysis EPSS 0.00
serve-static <1.7.2 - Open Redirect
Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the PATH_INFO to the default URI.
Jan 21, 2015
CVE-2014-3744 7.5 HIGH 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.78
Nodejs Node.js < 0.2.4 - Path Traversal
Directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path.
CWE-22 Oct 23, 2017
CVE-2014-4671 2 PoCs Analysis EPSS 0.36
Adobe Flash Player <14.0.0.145 - CSRF
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
CWE-352 Jul 09, 2014