Exploit Intelligence Platform
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
410 results
Clear all
CVE-2022-26149
7.2
HIGH
1 PoC
Analysis
EPSS 0.10
MODX Revolution <2.8.3-pl - Authenticated RCE
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.
CWE-434
Feb 26, 2022
CVE-2022-41876
7.5
HIGH
1 PoC
Analysis
EPSS 0.07
ezplatform-graphql <2.3.12, <1.0.13 - Info Disclosure
ezplatform-graphql is a GraphQL server implementation for Ibexa DXP and Ibexa Open Source. Versions prior to 2.3.12 and 1.0.13 are subject to Insecure Storage of Sensitive Information. Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically administrators and editors. This issue has been patched in versions 2.3.12, and 1.0.13 on the 1.X branch. Users unable to upgrade can remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.
CWE-200
Nov 10, 2022
CVE-2022-35649
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.08
Moodle - RCE
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
CWE-20
Jul 25, 2022
CVE-2022-41343
7.5
HIGH
1 PoC
Analysis
EPSS 0.55
Dompdf <2.0.1 - Code Injection
registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.
CWE-552
Sep 25, 2022
CVE-2022-32060
4.8
MEDIUM
1 PoC
Analysis
EPSS 0.05
Snipeitapp Snipe-it - XSS
An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.
CWE-79
Jul 07, 2022
CVE-2022-42097
4.8
MEDIUM
1 PoC
Analysis
EPSS 0.01
Backdrop - XSS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via 'Comment.' .
CWE-79
Nov 22, 2022
CVE-2022-42096
4.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.21
Backdropcms Backdrop Cms - XSS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content.
CWE-79
Nov 21, 2022
CVE-2022-42094
4.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.38
Backdrop - XSS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the 'Card' content.
CWE-79
Nov 22, 2022
CVE-2022-30600
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.07
Moodle - Privilege Escalation
A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed.
CWE-682
May 18, 2022
CVE-2022-42095
4.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.42
Backdropcms Backdrop Cms - XSS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Page content.
CWE-79
Nov 23, 2022
CVE-2022-34140
5.4
MEDIUM
2 PoCs
Analysis
EPSS 0.00
Feehi CMS v2.1.1 - XSS
A stored cross-site scripting (XSS) vulnerability in /index.php?r=site%2Fsignup of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field.
CWE-79
Jul 28, 2022
CVE-2022-31101
8.1
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.33
Prestashop <2.1.1 - SQL Injection
prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-89
Jun 27, 2022
CVE-2022-31181
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.78
PrestaShop <1.7.8.7 - SQL Injection
PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and before 1.7.8.7 PrestaShop is subject to an SQL injection vulnerability which can be chained to call PHP's Eval function on attacker input. The problem is fixed in version 1.7.8.7. Users are advised to upgrade. Users unable to upgrade may delete the MySQL Smarty cache feature.
CWE-74
Aug 01, 2022
CVE-2022-0666
7.5
HIGH
1 PoC
NUCLEI
EPSS 0.23
microweber/microweber <1.2.11 - Stack Trace Exposure
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
CWE-93
Feb 18, 2022
CVE-2022-1631
8.8
HIGH
1 PoC
Analysis
EPSS 0.12
Microweber < 1.2.15 - Incorrect Authorization
Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to the victim’s account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an account already exists, the victim will not identify if an account is already existing. Hence, the attacker’s persistence will remain. An attacker would be able to see all the activities performed by the victim user impacting the confidentiality and attempt to modify/corrupt the data impacting the integrity and availability factor. This attack becomes more interesting when an attacker can register an account from an employee’s email address. Assuming the organization uses G-Suite, it is much more impactful to hijack into an employee’s account.
CWE-284
May 09, 2022
CVE-2022-29221
8.8
HIGH
1 PoC
Analysis
EPSS 0.26
Smarty <3.1.45, <4.1.1 - Code Injection
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
CWE-94
May 24, 2022
CVE-2022-0967
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.01
Showdoc < 2.10.4 - XSS
Stored XSS via File Upload in star7th/showdoc in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.10.4.
CWE-79
Mar 15, 2022
CVE-2022-26332
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Cipi 3.1.15 - XSS
Cipi 3.1.15 allows Add Server stored XSS via the /api/servers name field.
CWE-79
Mar 01, 2022
CVE-2022-0557
7.2
HIGH
1 PoC
Analysis
EPSS 0.14
Packagist microweber/microweber <1.2.11 - Command Injection
OS Command Injection in Packagist microweber/microweber prior to 1.2.11.
CWE-78
Feb 11, 2022
CVE-2022-0332
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.03
Moodle <3.11.4 - SQL Injection
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
CWE-89
Jan 25, 2022