logo
Vulnerability feed
CONTRIBUTE

Check vulnerabilities

CVE exploitation data check using “IntheWild”

There are tens of thousands of vulnerabilities disclosed each year. Only a handful of them will ever be exploited.
Triaging vulnerabilities is hard, one thing is easy though: if you know something is actively exploited inTheWild you have to move within hours.
We believe that exploitation information is about safety and it should be easy to access and not be behind paywalls.

Get alerts on new reports of exploitation via RSS, Twitter, grab our docker image, the hourly database exports or get the full exploited list a /api/exploited

Most recently
exploited
in the wild

Vulnerability Feeds
CVE-2024-45519

Data reported first

10/03/2024

The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.

Reference

Credit

CVE-2024-29824

Data reported first

10/02/2024

An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.

CVE-2019-0344

Data reported first

09/30/2024

Due to unsafe deserialization used in SAP Commerce Cloud (virtualjdbc extension), versions 6.4, 6.5, 6.6, 6.7, 1808, 1811, 1905, it is possible to execute arbitrary code on a target machine with 'Hybris' user rights, resulting in Code Injection.

Thanks for the exploitation information!
google
microsoft
apple

Know when
to panic

warn

Get alerts for new exploited vulnerabilities

Be informed about the few vulnerabilities that really matter. Subscribe to the RSS and hook it up to your alerts channel, follow us on Twitter or look at our feed or API about new exploitations.
icon

Prioritize vulnerabilities

Your vulnerability scanners probably return thousands of vulnerabilities. Triaging and prioritizing them is hard. Use our hourly database export or directly the our CLI to enrich your reports about exploits and exploitation activity.
world

Find Exploits

Need to verify a vulnerability or the exploit you found seems to be broken. We collect exploits from a number of different sources and do the github scouring for you. Check out the report page or automate your searches using the CLI.
share

Share exploitation information

If you identified a new exploitation activity during research or just saw some reports are missing from out database, you can Tweet @inthewildio or similarly tag us in you LinkedIn post. You can also just use this form.
inTheWild

Help the Community Move Fast.

Contribute Now!
Contribute

How to
Contribute

As simple as writing a tweet

twitter
  • Add a @inthewildio tag
thumbnail
everyone can reply
Tweet

Post about it

linkedin
  • Add a @inthewildio tag

Create a post

thumbnail
You
Anyone
Add Hastag
Post

@inTheWild

©2024

Privacy Policy