Exploit Intelligence Platform
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
410 results
Clear all
CVE-2023-5546
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.02
Moodle < 4.0.11 - XSS
ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.
CWE-79
Nov 09, 2023
CVE-2023-39526
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.11
Prestashop < 1.7.8.10 - SQL Injection
PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to remote code execution through SQL injection and arbitrary file write in the back office. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds.
CWE-89
Aug 07, 2023
CVE-2023-38490
6.8
MEDIUM
1 PoC
Analysis
EPSS 0.19
Kirby <3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, 3.9.6 - XXE
Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 only affects Kirby sites that use the `Xml` data handler (e.g. `Data::decode($string, 'xml')`) or the `Xml::parse()` method in site or plugin code. The Kirby core does not use any of the affected methods.
XML External Entities (XXE) is a little used feature in the XML markup language that allows to include data from external files in an XML structure. If the name of the external file can be controlled by an attacker, this becomes a vulnerability that can be abused for various system impacts like the disclosure of internal or confidential data that is stored on the server (arbitrary file disclosure) or to perform network requests on behalf of the server (server-side request forgery, SSRF).
Kirby's `Xml::parse()` method used PHP's `LIBXML_NOENT` constant, which enabled the processing of XML external entities during the parsing operation. The `Xml::parse()` method is used in the `Xml` data handler (e.g. `Data::decode($string, 'xml')`). Both the vulnerable method and the data handler are not used in the Kirby core. However they may be used in site or plugin code, e.g. to parse RSS feeds or other XML files. If those files are of an external origin (e.g. uploaded by a user or retrieved from an external URL), attackers may be able to include an external entity in the XML file that will then be processed in the parsing process. Kirby sites that don't use XML parsing in site or plugin code are *not* affected.
The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have removed the `LIBXML_NOENT` constant as processing of external entities is out of scope of the parsing logic. This protects all uses of the method against the described vulnerability.
CWE-611
Jul 27, 2023
CVE-2023-29918
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.05
RosarioSIS 10.8.4 - Code Injection
RosarioSIS 10.8.4 is vulnerable to CSV injection via the Periods Module.
CWE-1236
May 02, 2023
CVE-2023-37269
2.0
LOW
1 PoC
Analysis
EPSS 0.01
Winter < 1.2.3 - XSS
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Users with the `backend.manage_branding` permission can upload SVGs as the application logo. Prior to version 1.2.3, SVG uploads were not sanitized, which could have allowed a stored cross-site scripting (XSS) attack. To exploit the vulnerability, an attacker would already need to have developer or super user level permissions in Winter CMS. This means they would already have extensive access and control within the system. Additionally, to execute the XSS, the attacker would need to convince the victim to directly visit the URL of the maliciously uploaded SVG, and the application would have to be using local storage where uploaded files are served under the same domain as the application itself instead of a CDN. This is because all SVGs in Winter CMS are rendered through an `img` tag, which prevents any payloads from being executed directly. These two factors significantly limit the potential harm of this vulnerability. This issue has been patched in v1.2.3 through the inclusion of full support for SVG uploads and automatic sanitization of uploaded SVG files. As a workaround, one may apply the patches manually.
CWE-79
Jul 07, 2023
CVE-2023-35840
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.06
Std42 Elfinder < 2.1.62 - Path Traversal
_joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver connector.
CWE-22
Jun 19, 2023
CVE-2023-3009
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.02
nilsteampassnet/teampass <3.0.9 - XSS
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
CWE-79
May 31, 2023
CVE-2023-2859
8.8
HIGH
1 PoC
Analysis
EPSS 0.06
nilsteampassnet/teampass <3.0.9 - Code Injection
Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
CWE-94
May 24, 2023
CVE-2023-2591
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Teampass < 3.0.7 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitHub repository nilsteampassnet/teampass prior to 3.0.7.
CWE-79
May 09, 2023
CVE-2023-2516
5.4
MEDIUM
1 PoC
Analysis
EPSS 0.01
Teampass < 3.0.7 - XSS
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7.
CWE-79
May 05, 2023
CVE-2023-32073
8.8
HIGH
1 PoC
Analysis
EPSS 0.06
Wwbn Avideo < 12.4 - Command Injection
WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3.
CWE-77
May 12, 2023
CVE-2023-53929
8.8
HIGH
1 PoC
Analysis
EPSS 0.00
phpMyFAQ 3.1.12 - Code Injection
phpMyFAQ 3.1.12 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into their profile names. Attackers can modify their user profile name with a payload like 'calc|a!z|' to trigger code execution when an administrator exports user data as a CSV file.
CWE-1236
Dec 17, 2025
CVE-2023-30854
8.8
HIGH
1 PoC
Analysis
EPSS 0.70
Wwbn Avideo < 12.4 - OS Command Injection
AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution. This issue is fixed in version 12.4.
CWE-78
Apr 28, 2023
CVE-2023-30839
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.09
Prestashop < 1.7.8.9 - SQL Injection
PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds.
CWE-89
Apr 25, 2023
CVE-2023-24788
8.8
HIGH
1 PoC
Analysis
EPSS 0.01
NotrinosERP v0.7 - SQL Injection
NotrinosERP v0.7 was discovered to contain a SQL injection vulnerability via the OrderNumber parameter at /NotrinosERP/sales/customer_delivery.php.
CWE-89
Mar 23, 2023
CVE-2023-53957
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Kimai <1.30.10 - XSS
Kimai 1.30.10 contains a SameSite cookie vulnerability that allows attackers to steal user session cookies through malicious exploitation. Attackers can trick victims into executing a crafted PHP script that captures and writes session cookie information to a file, enabling potential session hijacking.
CWE-1275
Dec 19, 2025
CVE-2023-24775
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.31
Funadmin v3.2.0 - SQL Injection
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\Member.php.
CWE-89
Mar 07, 2023
CVE-2023-28447
7.1
HIGH
1 PoC
Analysis
EPSS 0.01
Smarty <3.1.47-4.2.30 - XSS
Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.
CWE-79
Mar 28, 2023
CVE-2023-23924
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.51
Dompdf <2.0.1 - SSRF
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.
CWE-551
Feb 01, 2023
CVE-2022-35650
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Moodle - Path Traversal
The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default.
CWE-22
Jul 25, 2022