Check vulnerabilities
CVE exploitation data check using “IntheWild”
There are tens of thousands of vulnerabilities disclosed each year. Only a handful of them will ever be exploited.
Triaging vulnerabilities is hard, one thing is easy though: if you know something is actively exploited inTheWild you have to move within hours.
We believe that exploitation information is about safety and it should be easy to access and not be behind paywalls.
Most recently
exploited
in the wild
CVE-2024-38217
Data reported first
09/10/2024
Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-38226
Data reported first
09/10/2024
Microsoft Publisher Security Feature Bypass Vulnerability
Thanks for the exploitation information!disclaimer
Know when
to panic
Get alerts for new exploited vulnerabilities
Prioritize vulnerabilities
Your vulnerability scanners probably return thousands of vulnerabilities. Triaging and prioritizing them is hard. Use our hourly database export or directly the our CLI to enrich your reports about exploits and exploitation activity.
Find Exploits
Need to verify a vulnerability or the exploit you found seems to be broken. We collect exploits from a number of different sources and do the github scouring for you. Check out the report page or automate your searches using the CLI.
Share exploitation information
If you identified a new exploitation activity during research or just saw some reports are missing from out database, you can Tweet @inthewildio or similarly tag us in you LinkedIn post. You can also just use this form.