Vulnerabilities Exploited in the Wild with Public PoC
Updated 54m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2017-6360
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.80
Qnap Qts < 4.2.4 - OS Command Injection
QNAP QTS before 4.2.4 Build 20170313 allows attackers to gain administrator privileges and obtain sensitive information via unspecified vectors.
CWE-78
Mar 23, 2017
CVE-2016-15057
9.9
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.29
Apache Continuum - Command Injection
** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Continuum.
This issue affects Apache Continuum: all versions.
Attackers with access to the installations REST API can use this to invoke arbitrary commands on the server.
As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-77
Jan 26, 2026
CVE-2016-10033
9.8
CRITICAL
KEV
32 PoCs
Analysis
NUCLEI
EPSS 0.94
PHPMailer Sendmail Argument Injection
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
CWE-88
Dec 30, 2016
CVE-2016-10924
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.62
Zedna Ebook Download < 1.2 - Path Traversal
The ebook-download plugin before 1.2 for WordPress has directory traversal.
CWE-22
Aug 22, 2019
CVE-2016-2389
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.84
SAP Netweaver - Path Traversal
Directory traversal vulnerability in the GetFileList function in the SAP Manufacturing Integration and Intelligence (xMII) component 15.0 for SAP NetWeaver 7.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the Path parameter to /Catalog, aka SAP Security Note 2230978.
CWE-22
Feb 16, 2016
CVE-2016-6563
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.85
D-Link DIR - Buffer Overflow
Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.
CWE-119
Jul 13, 2018
CVE-2016-15042
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.74
WordPress <4.0, WordPress <1.1 - Unauthenticated RCE
The Frontend File Manager (versions < 4.0), N-Media Post Front-end Form (versions < 1.1) plugins for WordPress are vulnerable to arbitrary file uploads due to missing file type validation via the `nm_filemanager_upload_file` and `nm_postfront_upload_file` AJAX actions. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
CWE-434
Oct 16, 2024
CVE-2016-15041
7.2
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.11
MainWP Dashboard - WordPress <3.1.2 - XSS
The MainWP Dashboard – The Private WordPress Manager for Multiple Website Maintenance plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘mwp_setup_purchase_username’ parameter in versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79
Oct 16, 2024
CVE-2016-3714
8.4
HIGH
KEV
9 PoCs
Analysis
EPSS 0.94
ImageMagick <6.9.3-10 & <7.0.1-1 - RCE
The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
CWE-20
May 05, 2016
CVE-2016-4977
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Pivotal Spring Security Oauth < 2.0.10 - Remote Code Execution
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
CWE-19
May 25, 2017
CVE-2016-5734
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
EPSS 0.87
phpMyAdmin <4.0.10.16, <4.4.15.7, <4.6.3 - RCE
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
CWE-94
Jul 03, 2016
CVE-2016-6662
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
EPSS 0.90
Oracle MySQL, MariaDB, Percona Server - Privilege Escalation via my.cnf
Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
CWE-264
Sep 20, 2016
CVE-2016-10108
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Western Digital MyCloud unauthenticated command injection
Unauthenticated Remote Command injection as root occurs in the Western Digital MyCloud NAS 2.11.142 /web/google_analytics.php URL via a modified arg parameter in the POST data.
CWE-77
Jan 03, 2017
CVE-2016-20017
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.92
D-Link DSL-2750B <1.05 - Command Injection
D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.
CWE-77
Oct 19, 2022
CVE-2016-9079
7.5
HIGH
KEV
6 PoCs
Analysis
EPSS 0.85
SVG Animation - Use After Free
A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox < 50.0.2, Firefox ESR < 45.5.1, and Thunderbird < 45.5.1.
CWE-416
Jun 11, 2018
CVE-2016-0165
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.06
Microsoft Windows - Privilege Escalation
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0167.
Apr 12, 2016
CVE-2016-6415
7.5
HIGH
KEV
4 PoCs
Analysis
EPSS 0.93
Cisco IKE Information Disclosure
The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.
CWE-200
Sep 19, 2016
CVE-2016-8735
9.8
CRITICAL
KEV
1 PoC
NUCLEI
EPSS 0.94
Apache Tomcat , 7.x , 8.x , 8.5.x , 9.x <6.0.48 <7.0.73 <8.0.39 <8.5.7 - Remote Code Execution
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
Apr 06, 2017
CVE-2016-0736
7.5
HIGH
EXPLOITED
RANSOMWARE
1 PoC
Analysis
EPSS 0.42
Apache HTTP Server <2.4.24 - Info Disclosure
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
CWE-310
Jul 27, 2017
CVE-2016-10972
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.63
Tagdiv Newspaper < 6.7.2 - Improper Privilege Management
The newspaper theme before 6.7.2 for WordPress has a lack of options access control via td_ajax_update_panel.
CWE-269
Sep 16, 2019