Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2019-5782 8.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.75
Google Chrome < 72.0.3626.81 - Out-of-Bounds Write
Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
CWE-125 Feb 19, 2019
CVE-2019-14223 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.37
Alfresco Community Edition <5.2.6, 6.0.N, 6.1.N - Open Redirect
An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.).
CWE-601 Sep 06, 2019
CVE-2019-11370 5.4 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.08
Carel pCOWeb <B1.2.4 - XSS
Stored XSS was discovered in Carel pCOWeb prior to B1.2.4, as demonstrated by the config/pw_snmp.html "System contact" field.
CWE-79 Jun 03, 2019
CVE-2019-2588 4.9 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.86
Oracle Fusion Middleware - Unauthorized Access
Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
Apr 23, 2019
CVE-2019-15642 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Webmin < 1.920 - Code Injection
rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."
CWE-94 Aug 26, 2019
CVE-2019-25065 6.3 MEDIUM EXPLOITED 3 PoCs Analysis EPSS 0.74
OpenNetAdmin 18.1.1 - Privilege Escalation
A vulnerability was found in OpenNetAdmin 18.1.1. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-78 Jun 09, 2022
CVE-2019-6814 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.67
Schneider-electric Net5501 Firmware < 2.1.9.7 - Authentication Bypass
A CWE-287: Improper Authentication vulnerability exists in the NET55XX Encoder with firmware prior to version 2.1.9.7 which could cause impact to confidentiality, integrity, and availability when a remote attacker crafts a malicious request to the encoder webUI.
CWE-287 May 22, 2019
CVE-2019-8387 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.67
MASTER IPCAMERA01 <3.3.4.2103 - RCE
MASTER IPCAMERA01 3.3.4.2103 devices allow Remote Command Execution, related to the thttpd component.
May 08, 2019
CVE-2019-8451 6.5 MEDIUM EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.93
Atlassian Jira Server < 8.4.0 - SSRF
The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.
CWE-918 Sep 11, 2019
CVE-2019-20933 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
InfluxDB <1.7.6 - Auth Bypass
InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
CWE-287 Nov 19, 2020
CVE-2019-11248 8.2 HIGH EXPLOITED 3 PoCs NUCLEI EPSS 0.91
Kubernetes < 1.12.10 - Missing Authorization
The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.
CWE-862 Aug 29, 2019
CVE-2019-17503 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Kirona DRS 5.5.3.5 - Info Disclosure
An issue was discovered in Kirona Dynamic Resource Scheduling (DRS) 5.5.3.5. An unauthenticated user can access /osm/REGISTER.cmd (aka /osm_tiles/REGISTER.cmd) directly: it contains sensitive information about the database through the SQL queries within this batch file. This file exposes SQL database information such as database version, table name, column name, etc.
CWE-425 Oct 11, 2019
CVE-2019-12276 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
GrandNode 4.40 - Path Traversal
A Path Traversal vulnerability in Controllers/LetsEncryptController.cs in LetsEncryptController in GrandNode 4.40 allows remote, unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests. A patch for this issue was made on 2019-05-30 in GrandNode 4.40.
CWE-22 Jun 05, 2019
CVE-2019-12593 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.78
Icewarp Mail Server < 10.4.4 - Path Traversal
IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.
CWE-22 Jun 03, 2019
CVE-2019-1821 8.8 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.94
Cisco Prime Infrastructure/EPN Manager - RCE
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
CWE-20 May 16, 2019
CVE-2019-18394 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Igniterealtime Openfire < 4.4.2 - SSRF
A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.
CWE-918 Oct 24, 2019
CVE-2019-7254 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.91
Linear eMerge E3-Series - Path Traversal
Linear eMerge E3-Series devices allow File Inclusion.
CWE-22 Jul 02, 2019
CVE-2019-20500 7.8 HIGH KEV 1 PoC Analysis EPSS 0.92
Dlink Dwl-2600ap Firmware < 4.2.0.15 - OS Command Injection
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.
CWE-78 Mar 05, 2020
CVE-2019-17621 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.93
Dlink Dir-859 Firmware < 1.05b03 - OS Command Injection
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
CWE-78 Dec 30, 2019
CVE-2019-0623 7.8 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.34
Windows - Privilege Escalation
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
Mar 05, 2019