Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2019-5526 7.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.07
Vmware Workstation < 15.1.0 - Uncontrolled Search Path
VMware Workstation (15.x before 15.1.0) contains a DLL hijacking issue because some DLL files are improperly loaded by the application. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to administrator on a windows host where Workstation is installed.
CWE-427 May 15, 2019
CVE-2019-1388 7.8 HIGH KEV RANSOMWARE 5 PoCs Analysis EPSS 0.09
Windows Certificate Dialog - Privilege Escalation
An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'.
CWE-269 Nov 12, 2019
CVE-2019-18818 9.8 CRITICAL EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.94
Strapi CMS Unauthenticated Password Reset
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
CWE-640 Nov 07, 2019
CVE-2019-8646 7.5 HIGH 1 PoC Analysis EPSS 0.05
Apple Iphone OS < 12.4 - Out-of-Bounds Read
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3. A remote attacker may be able to leak memory.
CWE-125 Dec 18, 2019
CVE-2019-10655 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.72
Grandstream Gac2500 Firmware < 1.0.3.35 - Memory Corruption
Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow (via the phonecookie cookie) to overwrite a data structure and consequently bypass authentication. This can be exploited remotely or via CSRF because the cookie can be placed in an Accept HTTP header in an XMLHttpRequest call to lighttpd.
CWE-78 Mar 30, 2019
CVE-2019-9810 8.8 HIGH EXPLOITED 5 PoCs Analysis EPSS 0.72
Firefox < 66.0.1 - Buffer Overflow
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
CWE-119 Apr 26, 2019
CVE-2019-16098 7.8 HIGH EXPLOITED RANSOMWARE 6 PoCs Analysis EPSS 0.77
Micro-Star MSI Afterburner 4.6.2.15658 - Privilege Escalation
The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
CWE-125 Sep 11, 2019
CVE-2019-5736 8.6 HIGH EXPLOITED 34 PoCs Analysis EPSS 0.59
Docker Container Escape Via runC Overwrite
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
CWE-78 Feb 11, 2019
CVE-2019-8605 7.8 HIGH KEV 4 PoCs Analysis EPSS 0.12
Apple Iphone OS < 12.3 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges.
CWE-416 Dec 18, 2019
CVE-2019-7195 9.8 CRITICAL KEV RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.94
QNAP Photo Station - Path Traversal
This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
CWE-22 Dec 05, 2019
CVE-2019-7194 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.94
QNAP Photo Station - Path Traversal
This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
CWE-22 Dec 05, 2019
CVE-2019-7192 9.8 CRITICAL KEV RANSOMWARE 3 PoCs Analysis NUCLEI EPSS 0.94
QNAP Photo Station - Info Disclosure
This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.
CWE-863 Dec 05, 2019
CVE-2019-5825 6.5 MEDIUM KEV 3 PoCs Analysis EPSS 0.74
Google Chrome < 73.0.3683.86 - Out-of-Bounds Write
Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-787 Nov 25, 2019
CVE-2019-3010 8.8 HIGH KEV 4 PoCs Analysis EPSS 0.50
Oracle Solaris 11 - RCE
Vulnerability in the Oracle Solaris product of Oracle Systems (component: XScreenSaver). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
Oct 16, 2019
CVE-2019-6111 5.9 MEDIUM EXPLOITED RANSOMWARE 4 PoCs Analysis EPSS 0.55
Openbsd Openssh < 7.9 - Path Traversal
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CWE-22 Jan 31, 2019
CVE-2019-6110 6.8 MEDIUM EXPLOITED RANSOMWARE 2 PoCs Analysis EPSS 0.58
OpenSSH 7.9 - Info Disclosure
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CWE-838 Jan 31, 2019
CVE-2019-18426 8.2 HIGH KEV RANSOMWARE 3 PoCs Analysis EPSS 0.55
WhatsApp Desktop <0.3.9309 - XSS
A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message.
CWE-79 Jan 21, 2020
CVE-2019-7286 7.8 HIGH KEV 1 PoC Analysis EPSS 0.01
iOS <12.1.4 - Privilege Escalation
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. An application may be able to gain elevated privileges.
CWE-787 Dec 18, 2019
CVE-2019-13720 8.8 HIGH KEV 5 PoCs Analysis EPSS 0.90
Google Chrome <78.0.3904.87 - Use After Free
Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CWE-416 Nov 25, 2019
CVE-2019-1385 7.8 HIGH KEV RANSOMWARE 1 PoC EPSS 0.00
Windows AppX Deployment Extensions - Privilege Escalation
An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.
CWE-59 Nov 12, 2019