Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
2,391 results Clear all
CVE-2018-20526 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.86
Roxyfileman Roxy Fileman - Unrestricted File Upload
Roxy Fileman 1.4.5 allows unrestricted file upload in upload.php.
CWE-434 Mar 21, 2019
CVE-2018-8639 7.8 HIGH KEV RANSOMWARE 6 PoCs Analysis EPSS 0.35
Windows - Privilege Escalation
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8641.
CWE-404 Dec 12, 2018
CVE-2018-1217 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.66
Dell Emc Avamar - Missing Authorization
Avamar Installation Manager in Dell EMC Avamar Server 7.3.1, 7.4.1, and 7.5.0, and Dell EMC Integrated Data Protection Appliance 2.0 and 2.1, is affected by a missing access control check vulnerability which could potentially allow a remote unauthenticated attacker to read or change the Local Download Service (LDLS) credentials. The LDLS credentials are used to connect to Dell EMC Online Support. If the LDLS configuration was changed to an invalid configuration, then Avamar Installation Manager may not be able to connect to Dell EMC Online Support web site successfully. The remote unauthenticated attacker can also read and use the credentials to login to Dell EMC Online Support, impersonating the AVI service actions using those credentials.
CWE-862 Apr 09, 2018
CVE-2018-19410 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.93
PRTG Network Monitor <18.2.40.1683 - Local File Inclusion
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
Nov 21, 2018
CVE-2018-9276 7.2 HIGH KEV 8 PoCs Analysis EPSS 0.87
Paessler Prtg Network Monitor < 18.2.39 - OS Command Injection
An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
CWE-78 Jul 02, 2018
CVE-2018-14933 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
NUUO NVRmini - RCE
upgrade_handle.php on NUUO NVRmini devices allows Remote Command Execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command.
CWE-78 Aug 04, 2018
CVE-2018-20463 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Jsmol2wp - Path Traversal
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
CWE-22 Dec 25, 2018
CVE-2018-18775 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.16
Microstrategy Web - XSS
Microstrategy Web, version 7, does not sufficiently encode user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability via the Login.asp Msg parameter. NOTE: this is a deprecated product.
CWE-79 Nov 01, 2018
CVE-2018-0824 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.92
Microsoft Windows 10 1507 - Insecure Deserialization
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CWE-502 May 09, 2018
CVE-2018-4404 8.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.70
Safari Proxy Object Type Confusion
In iOS before 11.4 and macOS High Sierra before 10.13.5, a memory corruption issue exists and was addressed with improved memory handling.
CWE-119 Jan 11, 2019
CVE-2018-16752 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.49
LINK-NET LW-N605R - RCE
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.
CWE-78 Sep 20, 2018
CVE-2018-4233 8.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.90
Apple Safari < 11.1.1 - Memory Corruption
An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
CWE-119 Jun 08, 2018
CVE-2018-16509 7.8 HIGH EXPLOITED 6 PoCs Analysis EPSS 0.92
Artifex Ghostscript <9.24 - Privilege Escalation
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
Sep 05, 2018
CVE-2018-19629 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.00
Hyland Perceptive Content Server <7.1.5 - DoS
A Denial of Service vulnerability in the ImageNow Server service in Hyland Perceptive Content Server before 7.1.5 allows an attacker to crash the service via a TCP connection.
CWE-20 Jul 16, 2019
CVE-2018-4443 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.19
Apple Safari < 12.0.2 - Memory Corruption
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
CWE-119 Apr 03, 2019
CVE-2018-4386 8.8 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.27
Apple Safari < 12.0.1 - Memory Corruption
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
CWE-119 Apr 03, 2019
CVE-2018-4312 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.20
Apple Safari < 12 - Use After Free
A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CWE-416 Apr 03, 2019
CVE-2018-17431 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.92
Comodo UTM Firewall <2.7.0 - RCE
Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.
CWE-287 Jan 30, 2019
CVE-2018-16167 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.87
Jpcert Logontracer < 1.2.0 - OS Command Injection
LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.
CWE-78 Jan 09, 2019
CVE-2018-1207 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.94
Dell Emc Idrac7 < 2.52.52.52 - Code Injection
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code.
CWE-94 Mar 23, 2018