Vulnerabilities Exploited in the Wild with Public PoC
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2019-1064
7.8
HIGH
KEV
RANSOMWARE
4 PoCs
Analysis
EPSS 0.12
Microsoft Windows 10 1607 - Symlink Following
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
CWE-59
Jun 12, 2019
CVE-2019-0841
7.8
HIGH
KEV
RANSOMWARE
9 PoCs
Analysis
EPSS 0.83
Windows AppX Deployment Service - Privilege Escalation
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836.
CWE-59
Apr 09, 2019
CVE-2019-0543
7.8
HIGH
KEV
RANSOMWARE
1 PoC
Analysis
EPSS 0.25
Microsoft Windows 10 1507 - Authentication Bypass
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka "Microsoft Windows Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CWE-287
Jan 08, 2019
CVE-2019-11581
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Jira Server/Data Center <7.6.14, <7.13.5, <8.0.3, <8.1.2, <8.2.3 - RCE
There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
CWE-74
Aug 09, 2019
CVE-2019-1652
7.2
HIGH
KEV
4 PoCs
Analysis
EPSS 0.93
Cisco Rv320 Firmware < 1.4.2.22 - OS Command Injection
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
CWE-78
Jan 24, 2019
CVE-2019-10098
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.80
Apache HTTP Server <2.4.40 - SSRF
In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
CWE-601
Sep 25, 2019
CVE-2019-0752
7.5
HIGH
KEV
RANSOMWARE
3 PoCs
Analysis
EPSS 0.92
Internet Explorer - Memory Corruption
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0739, CVE-2019-0753, CVE-2019-0862.
CWE-843
Apr 09, 2019
CVE-2019-1458
7.8
HIGH
KEV
RANSOMWARE
6 PoCs
Analysis
EPSS 0.92
Windows Win32k - Privilege Escalation
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
Dec 10, 2019
CVE-2019-1579
8.1
HIGH
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.93
PAN-OS <7.1.18, <8.0.11-h1, <8.1.2 - RCE
Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code.
CWE-134
Jul 19, 2019
CVE-2019-10149
9.8
CRITICAL
KEV
24 PoCs
Analysis
EPSS 0.94
Exim 4.87 - 4.91 Local Privilege Escalation
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
CWE-78
Jun 05, 2019
CVE-2019-9670
9.8
CRITICAL
KEV
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Synacor Zimbra Collaboration Suite <8.7.11p10 - XXE
mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml.
CWE-611
May 29, 2019
CVE-2019-2725
9.8
CRITICAL
KEV
RANSOMWARE
27 PoCs
Analysis
NUCLEI
EPSS 0.94
Oracle Agile Plm < 5.2.36 - Injection
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-74
Apr 26, 2019
CVE-2019-7609
10.0
CRITICAL
KEV
17 PoCs
Analysis
NUCLEI
EPSS 0.94
Kibana Timelion Prototype Pollution RCE
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
CWE-94
Mar 25, 2019
CVE-2019-10758
9.9
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Mongo-express < 0.54.0 - Code Injection
mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment.
CWE-94
Dec 24, 2019
CVE-2019-3978
7.5
HIGH
1 PoC
Analysis
EPSS 0.17
Mikrotik Routeros < 6.44.5 - Missing Authentication
RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning
CWE-306
Oct 29, 2019
CVE-2019-0193
7.2
HIGH
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.93
Apache Solr < 7.7.3 - Code Injection
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
CWE-94
Aug 01, 2019
CVE-2019-13272
7.8
HIGH
KEV
28 PoCs
Analysis
EPSS 0.81
Linux Polkit pkexec helper PTRACE_TRACEME local root exploit
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
Jul 17, 2019
CVE-2019-7238
9.8
CRITICAL
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Sonatype Nexus Repository Manager <3.15.0 - Privilege Escalation
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
Mar 21, 2019
CVE-2019-5591
6.5
MEDIUM
KEV
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.48
Fortinet Fortios < 6.2.0 - Missing Authentication
A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.
CWE-306
Aug 14, 2020
CVE-2019-17026
8.8
HIGH
KEV
3 PoCs
Analysis
EPSS 0.60
Mozilla Firefox < 68.4.1 - Type Confusion
Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.
CWE-843
Mar 02, 2020