Vulnerabilities Exploited in the Wild with Public PoC
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2014-4019
7.5
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.52
ZTE ZXV10 W300 - Info Disclosure
ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to read backup files via a direct request for rom-0.
CWE-200
Feb 20, 2020
CVE-2014-10021
EXPLOITED
3 PoCs
Analysis
EPSS 0.78
Wpsymposiumpro WP Symposium - Unrestricted File Upload
Unrestricted file upload vulnerability in UploadHandler.php in the WP Symposium plugin 14.11 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in server/php/.
Jan 13, 2015
CVE-2014-9735
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.83
ThemePunch Slider Revolution <3.0.96 & Showbiz Pro <1.7.1 - RCE
The ThemePunch Slider Revolution (revslider) plugin before 3.0.96 for WordPress and Showbiz Pro plugin 1.7.1 and earlier for Wordpress does not properly restrict access to administrator AJAX functionality, which allows remote attackers to (1) upload and execute arbitrary files via an update_plugin action; (2) delete arbitrary sliders via a delete_slider action; and (3) create, (4) update, (5) import, or (6) export arbitrary sliders via unspecified vectors.
CWE-264
Jun 30, 2015
CVE-2014-0556
EXPLOITED
RANSOMWARE
2 PoCs
Analysis
EPSS 0.86
Adobe Flash Player < 13.0.0.241 - Memory Corruption
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK & Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0559.
CWE-119
Sep 10, 2014
CVE-2014-9734
EXPLOITED
2 PoCs
Analysis
EPSS 0.05
Slider Revolution <4.2 - Path Traversal
Directory traversal vulnerability in the Slider Revolution (revslider) plugin before 4.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php.
CWE-22
Jun 30, 2015
CVE-2013-2134
EXPLOITED
1 PoC
Analysis
EPSS 0.92
Apache Struts < 2.3.14.3 - Code Injection
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135.
CWE-94
Jul 16, 2013
CVE-2013-3918
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.87
Microsoft Windows 7 - Out-of-Bounds Write
The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability."
CWE-787
Nov 12, 2013
CVE-2013-3893
8.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.83
Microsoft Internet Explorer - Use After Free
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
CWE-416
Sep 18, 2013
CVE-2013-3827
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Oracle GlassFish Server <12.1.2 - Info Disclosure
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
Oct 16, 2013
CVE-2013-6117
EXPLOITED
3 PoCs
Analysis
EPSS 0.90
Dahuasecurity Dvr Firmware - Authentication Bypass
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.
CWE-287
Jul 11, 2014
CVE-2013-2416
EXPLOITED
1 PoC
Analysis
EPSS 0.38
Oracle Java SE <7.17 - Info Disclosure
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
Apr 17, 2013
CVE-2013-7091
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Zimbra 7.2.2-8.0.2 - Path Traversal
Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. NOTE: this can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.
CWE-22
Dec 13, 2013
CVE-2013-3163
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.85
Microsoft Internet Explorer 8-10 - Code Injection
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
CWE-787
Jul 10, 2013
CVE-2013-4786
7.5
HIGH
EXPLOITED
RANSOMWARE
4 PoCs
Analysis
EPSS 0.68
IPMI 2.0 - Info Disclosure
The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
CWE-255
Jul 08, 2013
CVE-2013-3881
EXPLOITED
2 PoCs
Analysis
EPSS 0.18
Microsoft Windows 7 - Resource Management Error
win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability."
CWE-399
Oct 09, 2013
CVE-2013-1300
EXPLOITED
3 PoCs
Analysis
EPSS 0.27
Microsoft Windows - Privilege Escalation
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."
CWE-264
Jul 10, 2013
CVE-2013-2597
8.4
HIGH
KEV
1 PoC
Analysis
EPSS 0.06
Linux kernel 2.6.x-3.x - Buffer Overflow
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that leverages /dev/msm_acdb access and provides a large size value in an ioctl argument.
CWE-121
Aug 31, 2014
CVE-2013-6282
8.8
HIGH
KEV
7 PoCs
Analysis
EPSS 0.68
Android get_user/put_user Exploit
The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
CWE-20
Nov 20, 2013
CVE-2013-2094
8.4
HIGH
KEV
11 PoCs
Analysis
EPSS 0.66
Linux Kernel < 3.0.75 - Numeric Error
The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.
CWE-189
May 14, 2013
CVE-2013-2596
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.03
Linux kernel <3.8.9 - Privilege Escalation
Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program.
CWE-190
Apr 13, 2013