Exploit Intelligence Platform
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
77 results
Clear all
CVE-2015-9251
6.1
MEDIUM
EXPLOITED
5 PoCs
Analysis
EPSS 0.27
Jquery < 3.0.0 - XSS
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CWE-79
Jan 18, 2018
CVE-2015-3224
7 PoCs
Analysis
NUCLEI
EPSS 0.85
Web Console <2.1.3 - XSS
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
CWE-284
Jul 26, 2015
CVE-2014-0130
7.5
HIGH
KEV
1 PoC
Analysis
EPSS 0.51
Ruby on Rails <3.2.18, <4.0.5, <4.1.1 - Path Traversal
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
CWE-22
May 07, 2014
CVE-2013-6414
1 PoC
Analysis
EPSS 0.71
Rails < 4.0.1 - Improper Input Validation
actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.
CWE-20
Dec 07, 2013
CVE-2013-0233
1 PoC
Analysis
EPSS 0.69
Plataformatec Devise < 2.2.3 - Resource Management Error
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
CWE-399
Apr 25, 2013
CVE-2013-0333
4 PoCs
Analysis
EPSS 0.92
Rails < 2.3.16 - SQL Injection
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
Jan 30, 2013
CVE-2013-0156
EXPLOITED
13 PoCs
Analysis
EPSS 0.92
Ruby on Rails JSON Processor YAML Deserialization Code Execution
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
CWE-20
Jan 13, 2013
CVE-2013-0269
1 PoC
Analysis
EPSS 0.17
Rubygems Json Gem < 1.5.5 - Improper Input Validation
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
CWE-20
Feb 13, 2013
CVE-2012-2661
1 PoC
Analysis
EPSS 0.01
Ruby on Rails <3.0.13, <3.1.5, <3.2.4 - SQL Injection
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
CWE-89
Jun 22, 2012
CVE-2012-6708
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.01
Jquery < 1.9.0 - XSS
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
CWE-79
Jan 18, 2018
CVE-2011-10026
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.65
Spree < 0.50.1 - OS Command Injection
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
CWE-78
Aug 20, 2025
CVE-2011-10019
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.69
Spree < 0.60.2 - Code Injection
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
CWE-94
Aug 13, 2025
CVE-2011-3187
1 PoC
Analysis
EPSS 0.09
Rails < 2.3.13 - Improper Input Validation
The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
CWE-20
Aug 29, 2011
CVE-2009-4492
1 PoC
Analysis
EPSS 0.18
WEBrick 1.3.1 - Code Injection
WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
Jan 13, 2010
CVE-2008-7248
1 PoC
Analysis
EPSS 0.11
Ruby on Rails <2.1.3 & <2.2.2 - CSRF
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
CWE-20
Dec 16, 2009
CVE-2008-4310
1 PoC
Analysis
EPSS 0.06
Ruby < 1.3.1 - Resource Management Error
httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.
CWE-399
Dec 09, 2008
CVE-2007-3227
1 PoC
Analysis
EPSS 0.14
Rails < 1.2.5 - XSS
Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values.
CWE-79
Jun 14, 2007