Exploit Intelligence Platform

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
366 results Clear all
CVE-2024-22891 9.8 CRITICAL 1 PoC Analysis EPSS 0.39
Nteract <0.28.0 - RCE
Nteract v.0.28.0 was discovered to contain a remote code execution (RCE) vulnerability via the Markdown link.
CWE-601 Mar 01, 2024
CVE-2024-27088 NONE 1 PoC Analysis EPSS 0.02
es5-ext - Info Disclosure
es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63.
CWE-1333 Feb 26, 2024
CVE-2024-23339 6.3 MEDIUM 1 PoC Analysis EPSS 0.12
Elijahharry Hoolock < 2.2.1 - Prototype Pollution
hoolock is a suite of lightweight utilities designed to maintain a small footprint when bundled. Starting in version 2.0.0 and prior to version 2.2.1, utility functions related to object paths (`get`, `set`, and `update`) did not block attempts to access or alter object prototypes. Starting in version 2.2.1, the `get`, `set` and `update` functions throw a `TypeError` when a user attempts to access or alter inherited properties.
CWE-1321 Jan 22, 2024
CVE-2024-42461 9.1 CRITICAL 1 PoC Analysis EPSS 0.03
Elliptic <6.5.6 - Info Disclosure
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
CWE-347 Aug 02, 2024
CVE-2024-33883 4.0 MEDIUM 1 PoC Analysis EPSS 0.01
ejs <3.1.10 - XSS
The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certain pollution protection.
CWE-693 Apr 28, 2024
CVE-2024-29415 8.1 HIGH 1 PoC Analysis NUCLEI EPSS 0.85
ip package <2.0.1 - SSRF
The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.
CWE-918 May 27, 2024
CVE-2024-34350 7.5 HIGH 1 PoC EPSS 0.01
Next.js <13.5.1 - Use After Free
Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer.
CWE-444 May 14, 2024
CVE-2024-34342 7.1 HIGH 1 PoC 2 Writeups Analysis EPSS 0.05
react-pdf - RCE
react-pdf displays PDFs in React apps. If PDF.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain. This vulnerability is fixed in 7.7.3 and 8.0.2.
CWE-79 May 07, 2024
CVE-2024-31621 7.6 HIGH 1 PoC Analysis NUCLEI EPSS 0.83
Flowise <1.6.2 - RCE
An issue in FlowiseAI Inc Flowise v.1.6.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the api/v1 component.
CWE-94 Apr 29, 2024
CVE-2024-29272 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.89
VvvebJs < 1.7.5 - Arbitrary File Upload
Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php.
CWE-434 Mar 22, 2024
CVE-2024-25466 7.8 HIGH 1 PoC Analysis EPSS 0.01
React Native Document Picker <9.1.1 - Code Injection
Directory Traversal vulnerability in React Native Document Picker before v.9.1.1 and fixed in v.9.1.1 allows a local attacker to execute arbitrary code via a crafted script to the Android library component.
CWE-26 Feb 16, 2024
CVE-2024-24816 6.1 MEDIUM 1 PoC Analysis EPSS 0.40
CKEditor4 <4.24.0-lts - XSS
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability vulnerability has been discovered in versions prior to 4.24.0-lts in samples that use the `preview` feature. All integrators that use these samples in the production code can be affected. The vulnerability allows an attacker to execute JavaScript code by abusing the misconfigured preview feature. It affects all users using the CKEditor 4 at version < 4.24.0-lts with affected samples used in a production environment. A fix is available in version 4.24.0-lts.
CWE-79 Feb 07, 2024
CVE-2024-24397 5.4 MEDIUM 1 PoC Analysis EPSS 0.01
Stimulsoft Dashboards.js < 2024.1.2 - XSS
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field.
CWE-79 Feb 05, 2024
CVE-2024-24398 9.8 CRITICAL 1 PoC Analysis EPSS 0.31
Stimulsoft Dashboards.php < 2024.1.2 - Path Traversal
Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function.
CWE-22 Feb 06, 2024
CVE-2024-24396 6.1 MEDIUM 1 PoC Analysis EPSS 0.02
Stimulsoft Dashboard.js < 2024.1.2 - Code Injection
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component.
CWE-94 Feb 05, 2024
CVE-2024-24566 5.3 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Lobe Chat <0.122.4 - Auth Bypass
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. When the application is password-protected (deployed with the `ACCESS_CODE` option), it is possible to access plugins without proper authorization (without password). This vulnerability is patched in 0.122.4.
CWE-284 Jan 31, 2024
CVE-2023-4863 8.8 HIGH KEV 11 PoCs Analysis EPSS 0.94
Google Chrome <116.0.5845.187 - Buffer Overflow
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
CWE-787 Sep 12, 2023
CVE-2023-1001 3.5 LOW 2 PoCs 1 Writeup Analysis EPSS 0.00
NPM Vxe-table < 3.7.10 - XSS
A vulnerability, which was classified as problematic, has been found in xuliangzhan vxe-table up to 3.7.9. This issue affects the function export of the file packages/textarea/src/textarea.js of the component vxe-textarea. The manipulation of the argument inputValue leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.7.10 is able to address this issue. The patch is named d70b0e089740b65a22c89c106ebc4627ac48a22d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-266123.
CWE-79 May 24, 2024
CVE-2023-3691 3.5 LOW 2 PoCs Analysis EPSS 0.00
Layui < 2.8.0 - XSS
A vulnerability, which was classified as problematic, was found in layui up to v2.8.0-rc.16. This affects an unknown part of the component HTML Attribute Handler. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.8.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-234237 was assigned to this vulnerability.
CWE-79 Jul 16, 2023
CVE-2023-48223 5.9 MEDIUM 2 PoCs 1 Writeup Analysis EPSS 0.01
Nearform Fast-jwt < 3.3.2 - Improper Input Validation
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to version 3.3.2, the fast-jwt library does not properly prevent JWT algorithm confusion for all public key types. The 'publicKeyPemMatcher' in 'fast-jwt/src/crypto.js' does not properly match all common PEM formats for public keys. To exploit this vulnerability, an attacker needs to craft a malicious JWT token containing the HS256 algorithm, signed with the public RSA key of the victim application. This attack will only work if the victim application utilizes a public key containing the `BEGIN RSA PUBLIC KEY` header. Applications using the RS256 algorithm, a public key with a `BEGIN RSA PUBLIC KEY` header, and calling the verify function without explicitly providing an algorithm, are vulnerable to this algorithm confusion attack which allows attackers to sign arbitrary payloads which will be accepted by the verifier. Version 3.3.2 contains a patch for this issue. As a workaround, change line 29 of `blob/master/src/crypto.js` to include a regular expression.
CWE-20 Nov 20, 2023