Vulnerabilities Exploited in the Wild with Public PoC
Updated 49m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2019-9621
7.5
HIGH
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Zimbra Collaboration Suite <8.6-8.8 - SSRF
Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, and 8.8.x before 8.8.10 patch 7 or 8.8.x before 8.8.11 patch 3 allows SSRF via the ProxyServlet component.
CWE-918
Apr 30, 2019
CVE-2019-5418
7.5
HIGH
KEV
12 PoCs
Analysis
NUCLEI
EPSS 0.94
Ruby On Rails File Content Disclosure (
There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
CWE-22
Mar 27, 2019
CVE-2019-6693
6.5
MEDIUM
KEV
RANSOMWARE
4 PoCs
Analysis
EPSS 0.72
Fortinet Fortios < 5.6.10 - Hard-coded Credentials
Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).
CWE-798
Nov 21, 2019
CVE-2019-12255
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.80
Wind River VxWorks - Buffer Overflow
Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow.
CWE-120
Aug 09, 2019
CVE-2019-3980
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
EPSS 0.50
Solarwinds Dameware Mini Remote Control - Origin Validation Error
The Solarwinds Dameware Mini Remote Client agent v12.1.0.89 supports smart card authentication which can allow a user to upload an executable to be executed on the DWRCS.exe host. An unauthenticated, remote attacker can request smart card login and upload and execute an arbitrary executable run under the Local System account.
CWE-346
Oct 08, 2019
CVE-2019-18371
7.5
HIGH
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Millet Router 3G Firmware < 2.28.23 - Path Traversal
An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. There is a directory traversal vulnerability to read arbitrary files via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.
CWE-22
Oct 23, 2019
CVE-2019-16278
9.8
CRITICAL
KEV
21 PoCs
Analysis
NUCLEI
EPSS 0.94
Nostromo nhttpd <1.9.6 - RCE
Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request.
CWE-22
Oct 14, 2019
CVE-2019-8982
9.6
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.86
Wavemaker Wavemarker Studio - SSRF
com/wavemaker/studio/StudioService.java in WaveMaker Studio 6.6 mishandles the studioService.download?method=getContent&inUrl= value, leading to disclosure of local files and SSRF.
CWE-918
Feb 21, 2019
CVE-2019-1068
8.8
HIGH
EXPLOITED
RANSOMWARE
1 PoC
Analysis
EPSS 0.42
Microsoft Sql Server - Remote Code Execution
A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles processing of internal functions, aka 'Microsoft SQL Server Remote Code Execution Vulnerability'.
Jul 15, 2019
CVE-2019-15637
8.1
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.23
Tableau Server < 10.5.18 - XXE
Numerous Tableau products are vulnerable to XXE via a malicious workbook, extension, or data source, leading to information disclosure or a DoS. This affects Tableau Server, Tableau Desktop, Tableau Reader, and Tableau Public Desktop.
CWE-611
Aug 26, 2019
CVE-2019-2618
5.5
MEDIUM
EXPLOITED
7 PoCs
Analysis
EPSS 0.87
Oracle WebLogic Server <12.2.1.3 - RCE
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N).
Apr 23, 2019
CVE-2019-17564
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Dubbo < 2.5.10 - Insecure Deserialization
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
CWE-502
Apr 01, 2020
CVE-2019-19609
7.2
HIGH
EXPLOITED
9 PoCs
Analysis
EPSS 0.81
Strapi <3.0.0-beta.17.8 - RCE
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
CWE-78
Dec 05, 2019
CVE-2019-0948
4.7
MEDIUM
EXPLOITED
1 PoC
Analysis
EPSS 0.42
Windows Event Viewer - Info Disclosure
An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.
To exploit the vulnerability, an attacker could create a file containing specially crafted XML content and convince an authenticated user to import the file.
The update addresses the vulnerability by modifying the way that the Event Viewer parses XML input.
CWE-611
Jun 12, 2019
CVE-2019-9762
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.54
PHPSHE 1.7 - SQL Injection
A SQL Injection was discovered in PHPSHE 1.7 in include/plugin/payment/alipay/pay.php with the parameter id. The vulnerability does not need any authentication.
CWE-89
Mar 14, 2019
CVE-2019-1003001
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
EPSS 0.94
Pipeline: Groovy Plugin <2.61 - RCE
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
Jan 22, 2019
CVE-2019-18393
5.3
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.84
Igniterealtime Openfire < 4.4.2 - Path Traversal
PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.
CWE-22
Oct 24, 2019
CVE-2019-4061
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.80
IBM Bigfix Platform < 9.2.16 - Information Disclosure
IBM BigFix Platform 9.2 and 9.5 could allow an attacker to query the relay remotely and gather information about the updates and fixlets deployed to the associated sites due to not enabling authenticated access. IBM X-Force ID: 156869.
CWE-200
Feb 27, 2019
CVE-2019-7256
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Linear eMerge E3-Series - Command Injection
Linear eMerge E3-Series devices allow Command Injections.
CWE-78
Jul 02, 2019
CVE-2019-15846
9.8
CRITICAL
EXPLOITED
RANSOMWARE
1 PoC
Analysis
EPSS 0.64
Exim <4.92.2 - RCE
Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.
Sep 06, 2019