Exploit Intelligence Platform

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
410 results Clear all
CVE-2022-26149 7.2 HIGH 1 PoC Analysis EPSS 0.10
MODX Revolution <2.8.3-pl - Authenticated RCE
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.
CWE-434 Feb 26, 2022
CVE-2022-41876 7.5 HIGH 1 PoC Analysis EPSS 0.07
ezplatform-graphql <2.3.12, <1.0.13 - Info Disclosure
ezplatform-graphql is a GraphQL server implementation for Ibexa DXP and Ibexa Open Source. Versions prior to 2.3.12 and 1.0.13 are subject to Insecure Storage of Sensitive Information. Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically administrators and editors. This issue has been patched in versions 2.3.12, and 1.0.13 on the 1.X branch. Users unable to upgrade can remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.
CWE-200 Nov 10, 2022
CVE-2022-35649 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
Moodle - RCE
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
CWE-20 Jul 25, 2022
CVE-2022-41343 7.5 HIGH 1 PoC Analysis EPSS 0.55
Dompdf <2.0.1 - Code Injection
registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.
CWE-552 Sep 25, 2022
CVE-2022-32060 4.8 MEDIUM 1 PoC Analysis EPSS 0.05
Snipeitapp Snipe-it - XSS
An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.
CWE-79 Jul 07, 2022
CVE-2022-42097 4.8 MEDIUM 1 PoC Analysis EPSS 0.01
Backdrop - XSS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via 'Comment.' .
CWE-79 Nov 22, 2022
CVE-2022-42096 4.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.21
Backdropcms Backdrop Cms - XSS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content.
CWE-79 Nov 21, 2022
CVE-2022-42094 4.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.38
Backdrop - XSS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the 'Card' content.
CWE-79 Nov 22, 2022
CVE-2022-30600 9.8 CRITICAL 1 PoC Analysis EPSS 0.07
Moodle - Privilege Escalation
A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed.
CWE-682 May 18, 2022
CVE-2022-42095 4.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.42
Backdropcms Backdrop Cms - XSS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Page content.
CWE-79 Nov 23, 2022
CVE-2022-34140 5.4 MEDIUM 2 PoCs Analysis EPSS 0.00
Feehi CMS v2.1.1 - XSS
A stored cross-site scripting (XSS) vulnerability in /index.php?r=site%2Fsignup of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field.
CWE-79 Jul 28, 2022
CVE-2022-31101 8.1 HIGH 3 PoCs Analysis NUCLEI EPSS 0.33
Prestashop <2.1.1 - SQL Injection
prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-89 Jun 27, 2022
CVE-2022-31181 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.78
PrestaShop <1.7.8.7 - SQL Injection
PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and before 1.7.8.7 PrestaShop is subject to an SQL injection vulnerability which can be chained to call PHP's Eval function on attacker input. The problem is fixed in version 1.7.8.7. Users are advised to upgrade. Users unable to upgrade may delete the MySQL Smarty cache feature.
CWE-74 Aug 01, 2022
CVE-2022-0666 7.5 HIGH 1 PoC NUCLEI EPSS 0.23
microweber/microweber <1.2.11 - Stack Trace Exposure
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
CWE-93 Feb 18, 2022
CVE-2022-1631 8.8 HIGH 1 PoC Analysis EPSS 0.12
Microweber < 1.2.15 - Incorrect Authorization
Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to the victim’s account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an account already exists, the victim will not identify if an account is already existing. Hence, the attacker’s persistence will remain. An attacker would be able to see all the activities performed by the victim user impacting the confidentiality and attempt to modify/corrupt the data impacting the integrity and availability factor. This attack becomes more interesting when an attacker can register an account from an employee’s email address. Assuming the organization uses G-Suite, it is much more impactful to hijack into an employee’s account.
CWE-284 May 09, 2022
CVE-2022-29221 8.8 HIGH 1 PoC Analysis EPSS 0.26
Smarty <3.1.45, <4.1.1 - Code Injection
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
CWE-94 May 24, 2022
CVE-2022-0967 5.4 MEDIUM 1 PoC Analysis EPSS 0.01
Showdoc < 2.10.4 - XSS
Stored XSS via File Upload in star7th/showdoc in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.10.4.
CWE-79 Mar 15, 2022
CVE-2022-26332 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Cipi 3.1.15 - XSS
Cipi 3.1.15 allows Add Server stored XSS via the /api/servers name field.
CWE-79 Mar 01, 2022
CVE-2022-0557 7.2 HIGH 1 PoC Analysis EPSS 0.14
Packagist microweber/microweber <1.2.11 - Command Injection
OS Command Injection in Packagist microweber/microweber prior to 1.2.11.
CWE-78 Feb 11, 2022
CVE-2022-0332 9.8 CRITICAL 2 PoCs Analysis EPSS 0.03
Moodle <3.11.4 - SQL Injection
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
CWE-89 Jan 25, 2022