Vulnerability feed
CONTRIBUTE

Community-Driven

Open Database of

Vulnerability

Exploitation

inTheWild

There are tens of thousands of vulnerabilities disclosed each year. Only a handful of them will ever be exploited.
Triaging vulnerabilities is hard, one thing is easy though: if you know something is actively exploited inTheWild you have to move within hours.
We believe that exploitation information is about safety and it should be easy to access and not be behind paywalls.

Get alerts on new reports of exploitation via RSS, Twitter, grab our docker image, the hourly database exports or get the full exploited list a /api/exploited

Most recently

exploited

in the wild

Vulnerability Feeds
CVE-2022-21882

Data reported first

01/11/2022

Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21887.

Reference

Credit

CVE-2021-45461

Data reported first

12/22/2021

FreePBX, when restapps (aka Rest Phone Apps) 15.0.19.87, 15.0.19.88, 16.0.18.40, or 16.0.18.41 is installed, allows remote attackers to execute arbitrary code, as exploited in the wild in December 2021. The fixed versions are 15.0.20 and 16.0.19.

CVE-2021-43890

Data reported first

12/14/2021

Windows AppX Installer Spoofing Vulnerability

Thanks for the exploitation information!
google
microsoft
apple
google
microsoft
apple

Know when

to panic

warn

Get alerts for new exploited vulnerabilities

Be informed about the few vulnerabilities that really matter. Subscribe to the RSS and hook it up to your alerts channel, follow us on Twitter or look at our feed or API about new exploitations.
icon

Prioritize vulnerabilities

Your vulnerability scanners probably return thousands of vulnerabilities. Triaging and prioritizing them is hard. Use our hourly database export or directly the our CLI to enrich your reports about exploits and exploitation activity.
world

Find Exploits

Need to verify a vulnerability or the exploit you found seems to be broken. We collect exploits from a number of different sources and do the github scouring for you. Check out the report page or automate your searches using the CLI.
share

Share exploitation information

If you identified a new exploitation activity during research or just saw some reports are missing from out database, you can Tweet @inthewildio or similarly tag us in you LinkedIn post. You can also just use this form.
inTheWild

Help the Community Move Fast.

Contribute Now!
Contribute

How to

Contribute

twitter

As simple as writing a tweet

Add a @inthewildio tag

Add the #cancreditme hashtag

Add a vulnerabilityId (if any) #cve_2020_17049

Add a type #exploitedinthewild

twitter
linkedIn

Post about it

Add a @inthewildio tag

Add the #cancreditme hashtag

Add a vulnerabilityId (if any) #cve_2020_17049

Add a type #exploitedinthewild

linkedIn

@inTheWild

©2021

Privacy Policy