Exploit Intelligence Platform
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
285 results
Clear all
CVE-2024-28088
8.1
HIGH
1 PoC
Analysis
EPSS 0.13
Langchain < 0.1.12 - Path Traversal
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
CWE-22
Mar 04, 2024
CVE-2024-25169
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Mezzanine v6.0.0 - Auth Bypass
An issue in Mezzanine v6.0.0 allows attackers to bypass access control mechanisms in the admin panel via a crafted request.
CWE-284
Feb 28, 2024
CVE-2024-25170
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.02
Mezzanine v6.0.0 - CSRF
An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating the Host header.
CWE-863
Feb 28, 2024
CVE-2024-22889
7.5
HIGH
1 PoC
Analysis
EPSS 0.01
Plone <6.0.9 - Info Disclosure
Due to incorrect access control in Plone version v6.0.9, remote attackers can view and list all files hosted on the website via sending a crafted request.
CWE-276
Mar 06, 2024
CVE-2024-22416
9.6
CRITICAL
2 PoCs
Analysis
EPSS 0.06
pyLoad <0.5.0b3 - CSRF
pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release `0.5.0b3.dev78`. All users are advised to upgrade.
CWE-352
Jan 18, 2024
CVE-2023-4863
8.8
HIGH
KEV
11 PoCs
Analysis
EPSS 0.94
Google Chrome <116.0.5845.187 - Buffer Overflow
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
CWE-787
Sep 12, 2023
CVE-2023-27524
8.9
HIGH
KEV
20 PoCs
Analysis
NUCLEI
EPSS 0.84
Apache Superset Signed Cookie Priv Esc
Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.
All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database.
Add a strong SECRET_KEY to your `superset_config.py` file like:
SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY>
Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.
CWE-1188
Apr 24, 2023
CVE-2023-48795
5.9
MEDIUM
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.54
OpenSSH <9.6 - Open Redirect
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CWE-354
Dec 18, 2023
CVE-2023-1177
9.3
CRITICAL
EXPLOITED
8 PoCs
Analysis
NUCLEI
EPSS 0.93
Lfprojects Mlflow < 2.2.1 - Path Traversal
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
CWE-29
Mar 24, 2023
CVE-2023-46229
8.8
HIGH
EXPLOITED
1 PoC
1 Writeup
Analysis
EPSS 0.02
LangChain <0.0.317 - SSRF
LangChain before 0.0.317 allows SSRF via document_loaders/recursive_url_loader.py because crawling can proceed from an external server to an internal server.
CWE-918
Oct 19, 2023
CVE-2023-43364
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.30
Searchor <2.4.2 - Code Injection
main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution.
CWE-74
Dec 12, 2023
CVE-2023-6020
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.81
Ray's <static> - Info Disclosure
LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.
CWE-862
Nov 16, 2023
CVE-2023-43654
10.0
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
TorchServe <0.8.1 - RCE
TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-918
Sep 28, 2023
CVE-2023-48022
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Anyscale Ray - SSRF
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)
CWE-918
Nov 28, 2023
CVE-2023-0297
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.94
pyLoad js2py Python Execution
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
CWE-94
Jan 14, 2023
CVE-2023-6019
9.8
CRITICAL
5 PoCs
Analysis
EPSS 0.89
Ray <2.8.1 - Command Injection
A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
CWE-78
Nov 16, 2023
CVE-2023-39265
3.8
LOW
EXPLOITED
1 PoC
Analysis
EPSS 0.74
Apache Superset < 2.1.0 - Improper Input Validation
Apache Superset would allow for SQLite database connections to be incorrectly registered when an attacker uses alternative driver names like sqlite+pysqlite or by using database imports. This could allow for unexpected file creation on Superset webservers. Additionally, if Apache Superset is using a SQLite database for its metadata (not advised for production use) it could result in more severe vulnerabilities related to confidentiality and integrity. This vulnerability exists in Apache Superset versions up to and including 2.1.0.
CWE-20
Sep 06, 2023
CVE-2023-28458
4.3
MEDIUM
1 PoC
Analysis
EPSS 0.70
Pretalx Limited File Write to Remote Code Execution
pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Organizers can trigger the overwriting (with the standard pretalx 404 page content) of an arbitrary file.
CWE-22
Apr 20, 2023
CVE-2023-47248
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.85
Apache Pyarrow < 14.0.0 - Insecure Deserialization
Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files).
This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings.
It is recommended that users of PyArrow upgrade to 14.0.1. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to PyArrow 14.0.1 or later. PyPI packages are already available, and we hope that conda-forge packages will be available soon.
If it is not possible to upgrade, we provide a separate package `pyarrow-hotfix` that disables the vulnerability on older PyArrow versions. See https://pypi.org/project/pyarrow-hotfix/ for instructions.
CWE-502
Nov 09, 2023
CVE-2023-46136
8.0
HIGH
1 PoC
Analysis
EPSS 0.01
Werkzeug - DoS
Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.
CWE-407
Oct 25, 2023