Exploit Intelligence Platform
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
366 results
Clear all
CVE-2024-22891
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.39
Nteract <0.28.0 - RCE
Nteract v.0.28.0 was discovered to contain a remote code execution (RCE) vulnerability via the Markdown link.
CWE-601
Mar 01, 2024
CVE-2024-27088
NONE
1 PoC
Analysis
EPSS 0.02
es5-ext - Info Disclosure
es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63.
CWE-1333
Feb 26, 2024
CVE-2024-23339
6.3
MEDIUM
1 PoC
Analysis
EPSS 0.12
Elijahharry Hoolock < 2.2.1 - Prototype Pollution
hoolock is a suite of lightweight utilities designed to maintain a small footprint when bundled. Starting in version 2.0.0 and prior to version 2.2.1, utility functions related to object paths (`get`, `set`, and `update`) did not block attempts to access or alter object prototypes. Starting in version 2.2.1, the `get`, `set` and `update` functions throw a `TypeError` when a user attempts to access or alter inherited properties.
CWE-1321
Jan 22, 2024
CVE-2024-42461
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.03
Elliptic <6.5.6 - Info Disclosure
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
CWE-347
Aug 02, 2024
CVE-2024-33883
4.0
MEDIUM
1 PoC
Analysis
EPSS 0.01
ejs <3.1.10 - XSS
The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certain pollution protection.
CWE-693
Apr 28, 2024
CVE-2024-29415
8.1
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.85
ip package <2.0.1 - SSRF
The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.
CWE-918
May 27, 2024
CVE-2024-34350
7.5
HIGH
1 PoC
EPSS 0.01
Next.js <13.5.1 - Use After Free
Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer.
CWE-444
May 14, 2024
CVE-2024-34342
7.1
HIGH
1 PoC
2 Writeups
Analysis
EPSS 0.05
react-pdf - RCE
react-pdf displays PDFs in React apps. If PDF.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain. This vulnerability is fixed in 7.7.3 and 8.0.2.
CWE-79
May 07, 2024
CVE-2024-31621
7.6
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.83
Flowise <1.6.2 - RCE
An issue in FlowiseAI Inc Flowise v.1.6.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the api/v1 component.
CWE-94
Apr 29, 2024
CVE-2024-29272
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.89
VvvebJs < 1.7.5 - Arbitrary File Upload
Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php.
CWE-434
Mar 22, 2024
CVE-2024-25466
7.8
HIGH
1 PoC
Analysis
EPSS 0.01
React Native Document Picker <9.1.1 - Code Injection
Directory Traversal vulnerability in React Native Document Picker before v.9.1.1 and fixed in v.9.1.1 allows a local attacker to execute arbitrary code via a crafted script to the Android library component.
CWE-26
Feb 16, 2024
CVE-2024-24816
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.40
CKEditor4 <4.24.0-lts - XSS
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability vulnerability has been discovered in versions prior to 4.24.0-lts in samples that use the `preview` feature. All integrators that use these samples in the production code can be affected. The vulnerability allows an attacker to execute JavaScript code by abusing the misconfigured preview feature. It affects all users using the CKEditor 4 at version < 4.24.0-lts with affected samples used in a production environment. A fix is available in version 4.24.0-lts.
CWE-79
Feb 07, 2024
CVE-2024-24397
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.01
Stimulsoft Dashboards.js < 2024.1.2 - XSS
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field.
CWE-79
Feb 05, 2024
CVE-2024-24398
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.31
Stimulsoft Dashboards.php < 2024.1.2 - Path Traversal
Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function.
CWE-22
Feb 06, 2024
CVE-2024-24396
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.02
Stimulsoft Dashboard.js < 2024.1.2 - Code Injection
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component.
CWE-94
Feb 05, 2024
CVE-2024-24566
5.3
MEDIUM
1 PoC
1 Writeup
Analysis
EPSS 0.00
Lobe Chat <0.122.4 - Auth Bypass
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. When the application is password-protected (deployed with the `ACCESS_CODE` option), it is possible to access plugins without proper authorization (without password). This vulnerability is patched in 0.122.4.
CWE-284
Jan 31, 2024
CVE-2023-4863
8.8
HIGH
KEV
11 PoCs
Analysis
EPSS 0.94
Google Chrome <116.0.5845.187 - Buffer Overflow
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
CWE-787
Sep 12, 2023
CVE-2023-1001
3.5
LOW
2 PoCs
1 Writeup
Analysis
EPSS 0.00
NPM Vxe-table < 3.7.10 - XSS
A vulnerability, which was classified as problematic, has been found in xuliangzhan vxe-table up to 3.7.9. This issue affects the function export of the file packages/textarea/src/textarea.js of the component vxe-textarea. The manipulation of the argument inputValue leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.7.10 is able to address this issue. The patch is named d70b0e089740b65a22c89c106ebc4627ac48a22d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-266123.
CWE-79
May 24, 2024
CVE-2023-3691
3.5
LOW
2 PoCs
Analysis
EPSS 0.00
Layui < 2.8.0 - XSS
A vulnerability, which was classified as problematic, was found in layui up to v2.8.0-rc.16. This affects an unknown part of the component HTML Attribute Handler. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.8.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-234237 was assigned to this vulnerability.
CWE-79
Jul 16, 2023
CVE-2023-48223
5.9
MEDIUM
2 PoCs
1 Writeup
Analysis
EPSS 0.01
Nearform Fast-jwt < 3.3.2 - Improper Input Validation
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to version 3.3.2, the fast-jwt library does not properly prevent JWT algorithm confusion for all public key types. The 'publicKeyPemMatcher' in 'fast-jwt/src/crypto.js' does not properly match all common PEM formats for public keys. To exploit this vulnerability, an attacker needs to craft a malicious JWT token containing the HS256 algorithm, signed with the public RSA key of the victim application. This attack will only work if the victim application utilizes a public key containing the `BEGIN RSA PUBLIC KEY` header. Applications using the RS256 algorithm, a public key with a `BEGIN RSA PUBLIC KEY` header, and calling the verify function without explicitly providing an algorithm, are vulnerable to this algorithm confusion attack which allows attackers to sign arbitrary payloads which will be accepted by the verifier. Version 3.3.2 contains a patch for this issue. As a workaround, change line 29 of `blob/master/src/crypto.js` to include a regular expression.
CWE-20
Nov 20, 2023