Exploit Intelligence Platform
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
366 results
Clear all
CVE-2025-49223
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Naver Billboard.js < 3.15.1 - Prototype Pollution
billboard.js before 3.15.1 was discovered to contain a prototype pollution via the function generate, which could allow attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
CWE-1321
Jun 04, 2025
CVE-2025-43865
8.2
HIGH
1 PoC
Analysis
EPSS 0.00
NPM React-router < 7.5.2 - Data Authenticity Bypass
React Router is a router for React. In versions on the 7.0 branch prior to version 7.5.2, it's possible to modify pre-rendered data by adding a header to the request. This allows to completely spoof its contents and modify all the values of the data object passed to the HTML. This issue has been patched in version 7.5.2.
CWE-345
Apr 25, 2025
CVE-2025-43864
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
NPM React-router < 7.5.2 - Improper Exception Handling
React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2.
CWE-755
Apr 25, 2025
CVE-2025-32965
CRITICAL
1 PoC
Analysis
EPSS 0.00
xrpl.js <4.2.1-4.2.4, 2.14.2 - Code Injection
xrpl.js is a JavaScript/TypeScript API for interacting with the XRP Ledger in Node.js and the browser. Versions 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js were compromised and contained malicious code designed to exfiltrate private keys. Version 2.14.2 is also malicious, though it is less likely to lead to exploitation as it is not compatible with other 2.x versions. Anyone who used one of these versions should stop immediately and rotate any private keys or secrets used with affected systems. Users of xrpl.js should pgrade to version 4.2.5 or 2.14.3 to receive a patch. To secure funds, think carefully about whether any keys may have been compromised by this supply chain attack, and mitigate by sending funds to secure wallets, and/or rotating keys. If any account's master key is potentially compromised, disable the key.
CWE-506
Apr 22, 2025
CVE-2025-31137
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
React-router Express < 7.4.1 - HTTP Request Smuggling
React Router is a multi-strategy router for React bridging the gap from React 18 to React 19. There is a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler. This issue has been patched and released in Remix 2.16.3 and React Router 7.4.1.
CWE-444
Apr 01, 2025
CVE-2025-24963
5.9
MEDIUM
2 PoCs
Analysis
NUCLEI
EPSS 0.24
Vitest Browser Mode - Local File Read
Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handler from remote to get the content of arbitrary files.This `__screenshot-error` handler on the browser mode HTTP server responds any file on the file system. This code was added by commit `2d62051`. Users explicitly exposing the browser mode server to the network by `browser.api.host: true` may get any files exposed. This issue has been addressed in versions 2.1.9 and 3.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-22
Feb 04, 2025
CVE-2025-30144
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.02
fast-jwt <5.0.6 - Info Disclosure
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly validate the iss claim based on the RFC 7519. The iss (issuer) claim validation within the fast-jwt library permits an array of strings as a valid iss value. This design flaw enables a potential attack where a malicious actor crafts a JWT with an iss claim structured as ['https://attacker-domain/', 'https://valid-iss']. Due to the permissive validation, the JWT will be deemed valid. Furthermore, if the application relies on external libraries like get-jwks that do not independently validate the iss claim, the attacker can leverage this vulnerability to forge a JWT that will be accepted by the victim application. Essentially, the attacker can insert their own domain into the iss array, alongside the legitimate issuer, and bypass the intended security checks. This issue is fixed in 5.0.6.
CWE-290
Mar 19, 2025
CVE-2024-34351
7.5
HIGH
6 PoCs
Analysis
NUCLEI
EPSS 0.93
Next.js - SSRF
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.
CWE-918
May 14, 2024
CVE-2024-4367
8.8
HIGH
26 PoCs
Analysis
EPSS 0.35
Mozilla Firefox < 115.11.0 - Improper Condition Check
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
CWE-754
May 14, 2024
CVE-2024-56143
8.2
HIGH
1 PoC
1 Writeup
Analysis
EPSS 0.00
Strapi < 5.5.2 - IDOR
Strapi is an open-source headless content management system. In versions from 5.0.0 to before 5.5.2, the lookup operator provided by the document service does not properly sanitize query parameters for private fields. An attacker can access private fields, including admin passwords and reset tokens, by crafting queries with the lookup parameter. This vulnerability is fixed in 5.5.2.
CWE-639
Oct 16, 2025
CVE-2024-53900
9.1
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.64
Mongoose <8.8.3 - SQL Injection
Mongoose before 8.8.3 can improperly use $where in match, leading to search injection.
CWE-89
Dec 02, 2024
CVE-2024-39338
7.5
HIGH
1 PoC
Analysis
EPSS 0.03
Axios < 1.7.4 - SSRF
axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.
CWE-918
Aug 12, 2024
CVE-2024-21534
9.8
CRITICAL
4 PoCs
Analysis
EPSS 0.93
NPM Jsonpath-plus < 10.2.0 - Code Injection
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.
**Note:**
There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
CWE-94
Oct 11, 2024
CVE-2024-39943
9.9
CRITICAL
3 PoCs
Analysis
EPSS 0.78
Rejetto HTTP File Server < 0.52.10 - Improper Access Control
rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).
CWE-78
Jul 04, 2024
CVE-2024-21508
9.8
CRITICAL
1 PoC
1 Writeup
EPSS 0.40
NPM Mysql2 < 3.9.4 - Code Injection
Versions of the package mysql2 before 3.9.4 are vulnerable to Remote Code Execution (RCE) via the readCodeFor function due to improper validation of the supportBigNumbers and bigNumberStrings values.
CWE-94
Apr 11, 2024
CVE-2024-22363
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
SheetJS Community Edition <0.20.2 - DoS
SheetJS Community Edition before 0.20.2 is vulnerable.to Regular Expression Denial of Service (ReDoS).
CWE-1333
Apr 05, 2024
CVE-2024-32964
9.0
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.74
Lobehub Lobe Chat < 0.150.6 - SSRF
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.
CWE-918
May 14, 2024
CVE-2024-45590
7.5
HIGH
2 PoCs
Analysis
EPSS 0.02
Openjsf Body-parser < 1.20.3 - Denial of Service
body-parser is Node.js body parsing middleware. body-parser <1.20.3 is vulnerable to denial of service when url encoding is enabled. A malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. This issue is patched in 1.20.3.
CWE-405
Sep 10, 2024
CVE-2024-46982
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
EPSS 0.49
Vercel Next.js < 13.5.7 - IDOR
Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.
CWE-639
Sep 17, 2024
CVE-2024-38355
7.3
HIGH
1 PoC
Analysis
EPSS 0.00
Socket.IO <4.6.2 - DoS
Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `[email protected]` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
CWE-20
Jun 19, 2024