Exploit Intelligence Platform

Updated 16m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
410 results Clear all
CVE-2024-55661 8.8 HIGH 1 PoC Analysis EPSS 0.45
Laravel Pulse < 1.3.1 - Code Injection
Laravel Pulse is a real-time application performance monitoring tool and dashboard for Laravel applications. A vulnerability has been discovered in Laravel Pulse prior to version 1.3.1 that could allow remote code execution through the public `remember()` method in the `Laravel\Pulse\Livewire\Concerns\RemembersQueries` trait. This method is accessible via Livewire components and can be exploited to call arbitrary callables within the application. An authenticated user with access to Laravel Pulse dashboard can execute arbitrary code by calling any function or static method in which the callable is a function or static method and the callable has no parameters or no strict parameter types. The vulnerable to component is `remember(callable $query, string $key = '')` method in `Laravel\Pulse\Livewire\Concerns\RemembersQueries`, and the vulnerability affects all Pulse card components that use this trait. Version 1.3.1 contains a patch.
CWE-94 Dec 13, 2024
CVE-2024-21546 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
Unisharp Laravel-filemanager < 2.9.1 - Code Injection
Versions of the package unisharp/laravel-filemanager before 2.9.1 are vulnerable to Remote Code Execution (RCE) through using a valid mimetype and inserting the . character after the php file extension. This allows the attacker to execute malicious code.
CWE-94 Dec 18, 2024
CVE-2024-44313 8.1 HIGH 1 PoC Analysis EPSS 0.02
Tastyigniter < 4.0.0 - Improper Access Control
TastyIgniter 3.7.6 contains an Incorrect Access Control vulnerability in the invoice() function within Orders.php which allows unauthorized users to access and generate invoices due to missing permission checks.
CWE-284 Mar 18, 2025
CVE-2024-55889 4.9 MEDIUM 1 PoC Analysis EPSS 0.07
phpMyFAQ <3.2.10 - XSS
phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an <iframe> element without user interaction or explicit consent. Version 3.2.10 fixes the issue.
CWE-451 Dec 13, 2024
CVE-2024-11956 4.7 MEDIUM 1 PoC Analysis EPSS 0.00
Pimcore <4.2.0 - SQL Injection
A vulnerability, which was classified as critical, has been found in Pimcore customer-data-framework up to 4.2.0. Affected by this issue is some unknown functionality of the file /admin/customermanagementframework/customers/list. The manipulation of the argument filterDefinition/filter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component.
CWE-74 Jan 28, 2025
CVE-2024-11954 2.4 LOW 1 PoC Analysis EPSS 0.00
Pimcore 11.4.2 - XSS
A vulnerability classified as problematic was found in Pimcore 11.4.2. Affected by this vulnerability is an unknown functionality of the component Search Document. The manipulation leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-80 Jan 28, 2025
CVE-2024-47605 5.4 MEDIUM 1 PoC Analysis EPSS 0.04
silverstripe-asset-admin - RCE
silverstripe-asset-admin is a silverstripe assets gallery for asset management. When using the "insert media" functionality, the linked oEmbed JSON includes an HTML attribute which will replace the embed shortcode. The HTML is not sanitized before replacing the shortcode, allowing a script payload to be executed on both the CMS and the front-end of the website. This issue has been addressed in silverstripe/framework version 5.3.8 and users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-79 Jan 14, 2025
CVE-2024-1651 10.0 CRITICAL 4 PoCs Analysis EPSS 0.81
Torrentpier - Insecure Deserialization
Torrentpier version 2.4.1 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to insecure deserialization.
CWE-502 Feb 20, 2024
CVE-2024-57610 7.5 HIGH 2 PoCs Analysis EPSS 0.10
Sylius - Brute Force
A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.
CWE-307 Feb 06, 2025
CVE-2024-40111 4.8 MEDIUM 1 PoC Analysis EPSS 0.05
Automad 2.0.0-alpha.4 - XSS
A persistent (stored) cross-site scripting (XSS) vulnerability has been identified in Automad 2.0.0-alpha.4. This vulnerability enables an attacker to inject malicious JavaScript code into the template body. The injected code is stored within the flat file CMS and is executed in the browser of any user visiting the forum.
CWE-79 Aug 23, 2024
CVE-2024-33299 4.7 MEDIUM 1 PoC Analysis EPSS 0.01
Microweber < 2.0.9 - XSS
Cross Site Scripting vulnerability in Microweber v.2.0.9 allows a remote attacker to execute arbitrary code via the First Name and Last Name parameters in the endpoint /admin/module/view?type=users
CWE-79 Jan 10, 2025
CVE-2024-33297 4.7 MEDIUM 1 PoC Analysis EPSS 0.01
Microweber < 2.0.9 - XSS
Cross Site Scripting vulnerability in Microweber v.2.0.9 allows a remote attacker to execute arbitrary code via the campaign Name (Internal Name) field in the Add new campaign function
CWE-79 Jan 10, 2025
CVE-2024-33298 6.1 MEDIUM 1 PoC Analysis EPSS 0.01
Microweber < 2.0.9 - XSS
Microweber Cross Site Scripting vulnerability in Microweber v.2.0.9 allows a remote attacker to execute arbitrary code via the create new backup function in the endpoint /admin/module/view?type=admin__backup
CWE-79 Jan 10, 2025
CVE-2024-52301 7.5 HIGH EXPLOITED 4 PoCs Analysis EPSS 0.66
Laravel - Info Disclosure
Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs.
CWE-88 Nov 12, 2024
CVE-2024-50803 5.4 MEDIUM 1 PoC Analysis EPSS 0.01
Redaxo < 5.18.0 - XSS
The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges
CWE-79 Nov 19, 2024
CVE-2024-50340 7.3 HIGH 1 PoC Analysis NUCLEI EPSS 0.86
Symfony Runtime < 5.4.46 - Injection
symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-74 Nov 06, 2024
CVE-2024-46209 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Redaxo - XSS
A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter.
CWE-79 Jan 06, 2025
CVE-2024-28116 8.8 HIGH 3 PoCs Analysis EPSS 0.62
Grav CMS <1.7.45 - SSRF
Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue.
CWE-1336 Mar 21, 2024
CVE-2024-35242 8.8 HIGH 1 PoC Analysis EPSS 0.24
Composer < 2.2.24 - Command Injection
Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `composer install` command running inside a git/hg repository which has specially crafted branch names can lead to command injection. This requires cloning untrusted repositories. Patches are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid cloning potentially compromised repositories.
CWE-77 Jun 10, 2024
CVE-2024-21514 7.4 HIGH 1 PoC Analysis EPSS 0.46
Opencart - SQL Injection
This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data.
CWE-89 Jun 22, 2024