Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
2,390 results Clear all
CVE-2014-4019 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.52
ZTE ZXV10 W300 - Info Disclosure
ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to read backup files via a direct request for rom-0.
CWE-200 Feb 20, 2020
CVE-2014-10021 EXPLOITED 3 PoCs Analysis EPSS 0.78
Wpsymposiumpro WP Symposium - Unrestricted File Upload
Unrestricted file upload vulnerability in UploadHandler.php in the WP Symposium plugin 14.11 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in server/php/.
Jan 13, 2015
CVE-2014-9735 EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.83
ThemePunch Slider Revolution <3.0.96 & Showbiz Pro <1.7.1 - RCE
The ThemePunch Slider Revolution (revslider) plugin before 3.0.96 for WordPress and Showbiz Pro plugin 1.7.1 and earlier for Wordpress does not properly restrict access to administrator AJAX functionality, which allows remote attackers to (1) upload and execute arbitrary files via an update_plugin action; (2) delete arbitrary sliders via a delete_slider action; and (3) create, (4) update, (5) import, or (6) export arbitrary sliders via unspecified vectors.
CWE-264 Jun 30, 2015
CVE-2014-0556 EXPLOITED RANSOMWARE 2 PoCs Analysis EPSS 0.86
Adobe Flash Player < 13.0.0.241 - Memory Corruption
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK & Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0559.
CWE-119 Sep 10, 2014
CVE-2014-9734 EXPLOITED 2 PoCs Analysis EPSS 0.05
Slider Revolution <4.2 - Path Traversal
Directory traversal vulnerability in the Slider Revolution (revslider) plugin before 4.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php.
CWE-22 Jun 30, 2015
CVE-2013-2134 EXPLOITED 1 PoC Analysis EPSS 0.92
Apache Struts < 2.3.14.3 - Code Injection
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135.
CWE-94 Jul 16, 2013
CVE-2013-3918 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.87
Microsoft Windows 7 - Out-of-Bounds Write
The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability."
CWE-787 Nov 12, 2013
CVE-2013-3893 8.8 HIGH KEV 4 PoCs Analysis EPSS 0.83
Microsoft Internet Explorer - Use After Free
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
CWE-416 Sep 18, 2013
CVE-2013-3827 EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Oracle GlassFish Server <12.1.2 - Info Disclosure
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
Oct 16, 2013
CVE-2013-6117 EXPLOITED 3 PoCs Analysis EPSS 0.90
Dahuasecurity Dvr Firmware - Authentication Bypass
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.
CWE-287 Jul 11, 2014
CVE-2013-2416 EXPLOITED 1 PoC Analysis EPSS 0.38
Oracle Java SE <7.17 - Info Disclosure
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
Apr 17, 2013
CVE-2013-7091 EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Zimbra 7.2.2-8.0.2 - Path Traversal
Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. NOTE: this can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.
CWE-22 Dec 13, 2013
CVE-2013-3163 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.85
Microsoft Internet Explorer 8-10 - Code Injection
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
CWE-787 Jul 10, 2013
CVE-2013-4786 7.5 HIGH EXPLOITED RANSOMWARE 4 PoCs Analysis EPSS 0.68
IPMI 2.0 - Info Disclosure
The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
CWE-255 Jul 08, 2013
CVE-2013-3881 EXPLOITED 2 PoCs Analysis EPSS 0.18
Microsoft Windows 7 - Resource Management Error
win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability."
CWE-399 Oct 09, 2013
CVE-2013-1300 EXPLOITED 3 PoCs Analysis EPSS 0.27
Microsoft Windows - Privilege Escalation
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."
CWE-264 Jul 10, 2013
CVE-2013-2597 8.4 HIGH KEV 1 PoC Analysis EPSS 0.06
Linux kernel 2.6.x-3.x - Buffer Overflow
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that leverages /dev/msm_acdb access and provides a large size value in an ioctl argument.
CWE-121 Aug 31, 2014
CVE-2013-6282 8.8 HIGH KEV 7 PoCs Analysis EPSS 0.68
Android get_user/put_user Exploit
The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
CWE-20 Nov 20, 2013
CVE-2013-2094 8.4 HIGH KEV 11 PoCs Analysis EPSS 0.66
Linux Kernel < 3.0.75 - Numeric Error
The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.
CWE-189 May 14, 2013
CVE-2013-2596 7.8 HIGH KEV 1 PoC Analysis EPSS 0.03
Linux kernel <3.8.9 - Privilege Escalation
Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program.
CWE-190 Apr 13, 2013