Vulnerabilities Exploited in the Wild with Public PoC

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
2,390 results Clear all
CVE-2017-8224 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.12
Wificam Wireless IP Camera (p2p) Firmware - Hard-coded Credentials
Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account that can be accessed with TELNET.
CWE-798 Apr 25, 2017
CVE-2017-8223 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.18
Wificam Wireless IP Camera (p2p) Firmware - Authentication Bypass
On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0.
CWE-287 Apr 25, 2017
CVE-2017-8222 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.07
Wificam Wireless IP Camera (p2p) Firm... - Insufficiently Protected Credentials
Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.
CWE-522 Apr 25, 2017
CVE-2017-8221 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.19
Wificam Wireless IP Camera (p2p) Firmware - Missing Encryption
Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the network.
CWE-311 Apr 25, 2017
CVE-2017-5174 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.65
Geutebruck IP Camera G-Cam/EFD-2250 <1.11.0.12 - Auth Bypass
An Authentication Bypass issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An authentication bypass vulnerability has been identified. The existing file system architecture could allow attackers to bypass the access control that may allow remote code execution.
CWE-288 May 19, 2017
CVE-2017-5173 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.85
Geutebruck IP Camera G-Cam/EFD-2250 <1.11.0.12 - Command Injection
An Improper Neutralization of Special Elements (in an OS command) issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An improper neutralization of special elements vulnerability has been identified. If special elements are not properly neutralized, an attacker can call multiple parameters that can allow access to the root level operating system which could allow remote code execution.
CWE-78 May 19, 2017
CVE-2017-13156 7.8 HIGH EXPLOITED 11 PoCs Analysis EPSS 0.63
Android Janus APK Signature bypass
An elevation of privilege vulnerability in the Android system (art). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-64211847.
CWE-434 Dec 06, 2017
CVE-2017-6549 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.25
Asus Rt-ac53 Firmware - Authentication Bypass
Session hijack vulnerability in httpd on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488; and Asuswrt-Merlin firmware before 380.65_2 allows remote attackers to steal any active admin session by sending cgi_logout and asusrouter-Windows-IFTTT-1.0 in certain HTTP headers.
CWE-287 Mar 09, 2017
CVE-2017-6361 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.91
Qnap Qts < 4.2.4 - OS Command Injection
QNAP QTS before 4.2.4 Build 20170313 allows attackers to execute arbitrary commands via unspecified vectors.
CWE-78 Mar 23, 2017
CVE-2017-20149 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis EPSS 0.06
Mikrotik RouterOS <6.38.5 - Long-term 6.37.5 - Memory Corruption
The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later.
CWE-787 Oct 15, 2022
CVE-2017-11467 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.76
OrientDB <2.2.22 - RCE
OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request.
CWE-269 Jul 20, 2017
CVE-2017-16929 8.1 HIGH EXPLOITED 1 PoC Analysis EPSS 0.27
Claymore Dual GPU miner 10.1 - Path Traversal
The remote management interface on the Claymore Dual GPU miner 10.1 is vulnerable to an authenticated directory traversal vulnerability exploited by issuing a specially crafted request, allowing a remote attacker to read/write arbitrary files. This can be exploited via ../ sequences in the pathname to miner_file or miner_getfile.
CWE-22 Dec 05, 2017
CVE-2017-17215 8.8 HIGH EXPLOITED 4 PoCs Analysis EPSS 0.93
Huawei HG532 - RCE
Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code.
CWE-20 Mar 20, 2018
CVE-2017-8487 7.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.69
Microsoft Windows Server 2003 - Remote Code Execution
Windows OLE in Windows XP and Windows Server 2003 allows an attacker to execute code when a victim opens a specially crafted file or program aka "Windows olecnv32.dll Remote Code Execution Vulnerability."
Jun 15, 2017
CVE-2017-8225 9.8 CRITICAL EXPLOITED 4 PoCs Analysis EPSS 0.71
Wificam Wireless IP Camera (p2p) Firm... - Insufficiently Protected Credentials
On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
CWE-522 Apr 25, 2017
CVE-2017-7533 7.0 HIGH 1 PoC Analysis EPSS 0.09
Linux Kernel <4.12.4 - Privilege Escalation
Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
CWE-362 Aug 05, 2017
CVE-2017-3623 10.0 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.77
Solaris - RCE
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel RPC). For supported versions that are affected see note. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3623 is assigned for "Ebbisland". Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue. CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
Apr 24, 2017
CVE-2017-3622 7.8 HIGH EXPLOITED 2 PoCs Analysis EPSS 0.20
Oracle Sun Systems Products Suite <10 - RCE
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Common Desktop Environment (CDE)). The supported version that is affected is 10. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3622 is assigned for the "Extremeparr". CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Apr 24, 2017
CVE-2017-1274 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.18
IBM Domino - Memory Corruption
IBM Domino 8.5.3, and 9.0 is vulnerable to a stack based overflow in the IMAP service that could allow an authenticated attacker to execute arbitrary code by specifying a large mailbox name. IBM X-Force ID: 124749.
CWE-119 Apr 25, 2017
CVE-2017-13794 8.8 HIGH 1 PoC Analysis EPSS 0.21
Apple Safari < 11.0.1 - Memory Corruption
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
CWE-119 Nov 13, 2017