Exploit Intelligence Platform
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
410 results
Clear all
CVE-2017-9841
9.8
CRITICAL
KEV
21 PoCs
Analysis
NUCLEI
EPSS 0.94
PHPUnit <4.8.28, <5.6.3 - RCE
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
CWE-94
Jun 27, 2017
CVE-2017-7615
8.8
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.93
MantisBT <2.3.0 - Info Disclosure
MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php.
CWE-640
Apr 16, 2017
CVE-2017-18357
6.5
MEDIUM
2 PoCs
Analysis
EPSS 0.57
Shopware < 5.3.4 - XXE
Shopware before 5.3.4 has a PHP Object Instantiation issue via the sort parameter to the loadPreviewAction() method of the Shopware_Controllers_Backend_ProductStream controller, with resultant XXE via instantiation of a SimpleXMLElement object.
CWE-610
Jan 15, 2019
CVE-2017-1000119
7.2
HIGH
3 PoCs
Analysis
EPSS 0.76
October CMS <build 412 - Code Injection
October CMS build 412 is vulnerable to PHP code execution in the file upload functionality resulting in site compromise and possibly other applications on the server.
CWE-434
Oct 05, 2017
CVE-2017-11366
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.34
Codiad < 2.8.3 - OS Command Injection
components/filemanager/class.filemanager.php in Codiad before 2.8.4 is vulnerable to remote command execution because shell commands can be embedded in parameter values, as demonstrated by search_file_type.
CWE-78
Aug 21, 2017
CVE-2017-1000499
8.8
HIGH
2 PoCs
Analysis
EPSS 0.11
phpMyAdmin <4.7.6.1/4.7.7 - CSRF
phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.
CWE-352
Jan 03, 2018
CVE-2017-5223
5.5
MEDIUM
2 PoCs
Analysis
EPSS 0.03
PHPMailer <5.2.22 - Code Injection
An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to /, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory.
CWE-200
Jan 16, 2017
CVE-2017-11503
6.1
MEDIUM
1 PoC
EPSS 0.02
PHPMailer 5.2.23 - XSS
PHPMailer 5.2.23 has XSS in the "From Email Address" and "To Email Address" fields of code_generator.php.
CWE-79
Jul 20, 2017
CVE-2017-15367
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.22
Bacula-web < 7.4.0 - SQL Injection
Bacula-web before 8.0.0-rc2 is affected by multiple SQL Injection vulnerabilities that could allow an attacker to access the Bacula database and, depending on configuration, escalate privileges on the server.
CWE-89
Mar 07, 2018
CVE-2017-15374
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.03
Shopware - XSS
Shopware v5.2.5 - v5.3 is vulnerable to cross site scripting in the customer and order section of the content management system backend modules. Remote attackers are able to inject malicious script code into the firstname, lastname, or order input fields to provoke persistent execution in the customer and orders section of the backend. The execution occurs in the administrator backend listing when processing a preview of the customers (kunden) or orders (bestellungen). The injection can be performed interactively via user registration or by manipulation of the order information inputs. The issue can be exploited by low privileged user accounts against higher privileged (admin or moderator) accounts.
CWE-79
Oct 16, 2017
CVE-2017-18049
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Silverstripe < 3.5.5 - Injection
In the CSV export feature of SilverStripe before 3.5.6, 3.6.x before 3.6.3, and 4.x before 4.0.1, it's possible for the output to contain macros and scripts, which may be executed if imported without sanitization into common software (including Microsoft Excel). For example, the CSV data may contain untrusted user input from the "First Name" field of a user's /myprofile page.
CWE-74
Jan 23, 2018
CVE-2017-15806
8.1
HIGH
1 PoC
Analysis
EPSS 0.16
Zetacomponents Mail < 1.8.2 - Code Injection
The send function in the ezcMailMtaTransport class in Zeta Components Mail before 1.8.2 does not properly restrict the set of characters used in the ezcMail returnPath property, which might allow remote attackers to execute arbitrary code via a crafted email address, as demonstrated by one containing "-X/path/to/wwwroot/file.php."
CWE-94
Nov 15, 2017
CVE-2017-16807
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Kirby Panel <2.3.3, <2.4.2, <2.5.7 - XSS
A cross-site Scripting (XSS) vulnerability in Kirby Panel before 2.3.3, 2.4.x before 2.4.2, and 2.5.x before 2.5.7 exists when displaying a specially prepared SVG document that has been uploaded as a content file.
CWE-79
Nov 13, 2017
CVE-2017-16244
8.8
HIGH
1 PoC
Analysis
EPSS 0.00
OctoberCMS 1.0.426 - CSRF
Cross-Site Request Forgery exists in OctoberCMS 1.0.426 (aka Build 426) due to improper validation of CSRF tokens for postback handling, allowing an attacker to successfully take over the victim's account. The attack bypasses a protection mechanism involving X-CSRF headers and CSRF tokens via a certain _handler postback variable.
CWE-352
Nov 01, 2017
CVE-2017-15284
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.02
October < 1.0.426 - XSS
Cross-Site Scripting exists in OctoberCMS 1.0.425 (aka Build 425), allowing a least privileged user to upload an SVG file containing malicious code as the Avatar for the profile. When this is opened by the Admin, it causes JavaScript execution in the context of the Admin account.
CWE-79
Oct 12, 2017
CVE-2017-9516
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.01
Craft CMS <2.6.2982 - XSS
Craft CMS before 2.6.2982 allows for a potential XSS attack vector by uploading a malicious SVG file.
CWE-79
Jun 08, 2017
CVE-2017-8382
4.5
MEDIUM
2 PoCs
Analysis
EPSS 0.01
Admidio < 4.1-Beta.1 - CSRF
admidio 3.2.8 has CSRF in adm_program/modules/members/members_function.php with an impact of deleting arbitrary user accounts.
CWE-352
May 16, 2017
CVE-2017-7620
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Mantisbt < 1.3.10 - CSRF
MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
CWE-352
May 21, 2017
CVE-2017-6086
8.8
HIGH
1 PoC
Analysis
EPSS 0.00
Vimbadmin - CSRF
Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to <vimbadmin directory>/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to <vimbadmin directory>/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to <vimbadmin directory>/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to <vimbadmin directory>/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to <vimbadmin directory>/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to <vimbadmin directory>/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to <vimbadmin directory>/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to <vimbadmin directory>/application/controllers/AliasController.php.
CWE-352
Jun 27, 2017
CVE-2017-7725
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.04
concrete5 8.1.0 - XSS
concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header; this is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.
CWE-79
Apr 13, 2017