Exploit Intelligence Platform

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
77 results Clear all
CVE-2022-31160 6.1 MEDIUM 1 PoC Analysis EPSS 0.10
jQuery UI <1.13.2 - XSS
jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`.
CWE-79 Jul 20, 2022
CVE-2022-21831 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Rubyonrails Active Storage < 5.2.6.3 - Code Injection
A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments.
CWE-94 May 26, 2022
CVE-2022-36231 9.8 CRITICAL 1 PoC Analysis EPSS 0.19
pdf_info 0.5.3 - Command Injection
pdf_info 0.5.3 is vulnerable to Command Execution because the Ruby code uses backticks instead of Open3.
CWE-78 Feb 23, 2023
CVE-2022-32224 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
Activerecord < 5.2.8.1 - Insecure Deserialization
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.
CWE-502 Dec 05, 2022
CVE-2021-23337 7.2 HIGH 1 PoC Analysis NUCLEI EPSS 0.04
Lodash <4.17.21 - Command Injection
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
CWE-94 Feb 15, 2021
CVE-2021-41184 6.5 MEDIUM 2 PoCs Analysis EPSS 0.25
jQuery-UI <1.13.0 - Code Injection
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.
CWE-79 Oct 26, 2021
CVE-2021-41182 6.5 MEDIUM 2 PoCs Analysis EPSS 0.28
jQuery-UI <1.13.0 - Code Injection
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.
CWE-79 Oct 26, 2021
CVE-2021-22880 7.5 HIGH 1 PoC Analysis EPSS 0.03
Active Record <6.1.2.1, 6.0.3.5, 5.2.4.5 - DoS
The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
CWE-400 Feb 11, 2021
CVE-2021-33564 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Dragonfly <1.4.0 - Command Injection
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
CWE-88 May 29, 2021
CVE-2020-11022 6.9 MEDIUM EXPLOITED 7 PoCs Analysis EPSS 0.07
jQuery <3.5.0 - XSS
In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CWE-79 Apr 29, 2020
CVE-2020-8163 8.8 HIGH 5 PoCs Analysis NUCLEI EPSS 0.91
Rails <5.0.1 - Code Injection
The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.
CWE-94 Jul 02, 2020
CVE-2020-8165 9.8 CRITICAL 8 PoCs Analysis EPSS 0.90
Rails <5.2.4.3-6.0.3.1 - Deserialization
A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.
CWE-502 Jun 19, 2020
CVE-2020-11023 6.9 MEDIUM KEV 7 PoCs Analysis EPSS 0.59
jQuery <3.5.0 - XSS
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CWE-79 Apr 29, 2020
CVE-2020-7656 6.1 MEDIUM 1 PoC Analysis EPSS 0.01
Jquery < 1.9.0 - XSS
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
CWE-79 May 19, 2020
CVE-2020-10663 7.5 HIGH 1 PoC Analysis EPSS 0.08
JSON gem <2.2.0 - Code Injection
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
CWE-20 Apr 28, 2020
CVE-2020-8162 7.5 HIGH 1 PoC Analysis EPSS 0.02
Rails <5.2.4.2, <6.0.3.1 - Info Disclosure
A client side enforcement of server side security vulnerability exists in rails < 5.2.4.2 and rails < 6.0.3.1 ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user bypassing upload limits.
CWE-434 Jun 19, 2020
CVE-2020-5267 4.0 MEDIUM 1 PoC Analysis EPSS 0.01
Rubyonrails Actionview < 5.2.4.2 - Basic XSS
In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
CWE-80 Mar 19, 2020
CVE-2020-25613 7.5 HIGH 1 PoC Analysis EPSS 0.00
Ruby < 2.5.8 - HTTP Request Smuggling
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
CWE-444 Oct 06, 2020
CVE-2020-15169 5.4 MEDIUM 1 PoC Analysis EPSS 0.01
Action View <6.0.3.3 - XSS
In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.
CWE-79 Sep 11, 2020
CVE-2020-11076 7.5 HIGH 1 PoC Analysis EPSS 0.02
Puma <4.3.4, <3.12.5 - SSRF
In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
CWE-444 May 22, 2020