Exploit Intelligence Platform

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
410 results Clear all
CVE-2018-15133 8.1 HIGH KEV 16 PoCs Analysis EPSS 0.85
Laravel Framework <5.6.30 - RCE
In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.
CWE-502 Aug 09, 2018
CVE-2018-7600 9.8 CRITICAL KEV RANSOMWARE 63 PoCs Analysis NUCLEI EPSS 0.94
Drupal Drupalgeddon 2 Forms API Property Injection
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
CWE-20 Mar 29, 2018
CVE-2018-8947 7.5 HIGH 3 PoCs Analysis EPSS 0.16
Laravel Log Viewer < 0.13.0 - Cleartext Storage
rap2hpoutre Laravel Log Viewer before v0.13.0 relies on Base64 encoding for l, dl, and del requests, which makes it easier for remote attackers to bypass intended access restrictions, as demonstrated by reading arbitrary files via a dl request.
CWE-312 Mar 25, 2018
CVE-2018-7602 9.8 CRITICAL KEV RANSOMWARE 11 PoCs Analysis NUCLEI EPSS 0.94
Drupal < 7.59 - Code Injection
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.
CWE-94 Jul 19, 2018
CVE-2018-12613 8.8 HIGH EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
phpMyAdmin 4.8.x <4.8.2 - Code Injection
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
CWE-287 Jun 21, 2018
CVE-2018-19422 7.2 HIGH 6 PoCs Analysis EPSS 0.86
Subrion CMS 4.2.1 - RCE
/panel/uploads in Subrion CMS 4.2.1 allows remote attackers to execute arbitrary PHP code via a .pht or .phar file, because the .htaccess file omits these.
CWE-434 Nov 21, 2018
CVE-2018-14058 6.5 MEDIUM 2 PoCs Analysis EPSS 0.02
Pimcore <5.3.0 - SQL Injection
Pimcore before 5.3.0 allows SQL Injection via the REST web service API.
CWE-89 Aug 17, 2018
CVE-2018-10094 9.8 CRITICAL 2 PoCs Analysis EPSS 0.74
Dolibarr <7.0.2 - SQL Injection
SQL injection vulnerability in Dolibarr before 7.0.2 allows remote attackers to execute arbitrary SQL commands via vectors involving integer parameters without quotes.
CWE-89 May 22, 2018
CVE-2018-20434 9.8 CRITICAL 4 PoCs Analysis EPSS 0.66
Librenms - OS Command Injection
LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.
CWE-78 Apr 24, 2019
CVE-2018-25080 3.5 LOW 1 PoC Analysis EPSS 0.03
MobileDetect <2.8.31 - XSS
A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The identifier of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.
CWE-79 Feb 04, 2023
CVE-2018-14040 6.1 MEDIUM 2 PoCs Analysis EPSS 0.03
Bootstrap <4.1.2 - XSS
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
CWE-79 Jul 13, 2018
CVE-2018-14716 7.5 HIGH 2 PoCs Analysis EPSS 0.61
SEOmatic <3.1.4 - SSTI
A Server Side Template Injection (SSTI) was discovered in the SEOmatic plugin before 3.1.4 for Craft CMS, because requests that don't match any elements incorrectly generate the canonicalUrl, and can lead to execution of Twig code.
CWE-94 Aug 06, 2018
CVE-2018-1133 8.8 HIGH 4 PoCs Analysis EPSS 0.64
Moodle 3.x - RCE
An issue was discovered in Moodle 3.x. A Teacher creating a Calculated question can intentionally cause remote code execution on the server, aka eval injection.
CWE-94 May 25, 2018
CVE-2018-1042 6.5 MEDIUM 2 PoCs Analysis EPSS 0.13
Moodle < 3.1.9 - SSRF
Moodle 3.x has Server Side Request Forgery in the filepicker.
CWE-918 Jan 22, 2018
CVE-2018-19246 7.5 HIGH 2 PoCs Analysis EPSS 0.47
PHP-Proxy 5.1.0 - Info Disclosure
PHP-Proxy 5.1.0 allows remote attackers to read local files if the default "pre-installed version" (intended for users who lack shell access to their web server) is used. This occurs because the aeb067ca0aa9a3193dce3a7264c90187 app_key value from the default config.php is in place, and this value can be easily used to calculate the authorization data needed for local file inclusion.
CWE-200 Nov 13, 2018
CVE-2018-14042 6.1 MEDIUM 1 PoC Analysis EPSS 0.02
Bootstrap <4.1.2 - XSS
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
CWE-79 Jul 13, 2018
CVE-2018-14041 6.1 MEDIUM 1 PoC Analysis EPSS 0.08
Bootstrap <4.1.2 - XSS
In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy.
CWE-79 Jul 13, 2018
CVE-2018-14009 9.8 CRITICAL 2 PoCs Analysis EPSS 0.50
Codiad <2.8.4 - RCE
Codiad through 2.8.4 allows Remote Code Execution, a different vulnerability than CVE-2017-11366 and CVE-2017-15689.
CWE-20 Jul 12, 2018
CVE-2018-16809 9.8 CRITICAL 1 PoC EPSS 0.01
Dolibarr <7.0.0 - SQL Injection
An issue was discovered in Dolibarr through 7.0.0. expensereport/card.php in the expense reports module allows SQL injection via the integer parameters qty and value_unit.
CWE-89 Mar 07, 2019
CVE-2018-6905 4.8 MEDIUM 2 PoCs Analysis EPSS 0.02
Typo3 < 8.7.11 - XSS
The page module in TYPO3 before 8.7.11, and 9.1.0, has XSS via $GLOBALS['TYPO3_CONF_VARS']['SYS']['sitename'], as demonstrated by an admin entering a crafted site name during the installation process.
CWE-79 Apr 08, 2018