You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use the verified, up-to-date data of inthewild.io directly, everything is free to use Apache 2.0
inTheWild is a community driven database and platform to help your vulnerability triage.
If you just need the exploitation information don't waste your time here, hit inthewild.io/api/exploited this export includes all vulnerability data, exploits and exploitation reports You can download the database from: https://pub-4c1eae2a180542b19ea7c88f1e4ccf07.r2.dev/inthewild.db
Who? How?
Information here can be useful for you if you are
In ops or vulnerability management and you want to know when to panic: sign up to RSS feed and add it to you notification list (e.g. Slack channel)
Developing vulnerability management tool/service or enriching the output of one: download the database and write your wrapper or reuse ours if you python
We provided a minimalistic CLI tool with the database to work as an example and if you want to script things without hammering our API ❤️
How to install
It is not the 90s grandpa, stop installing utils writen by 3 randos! Use docker
Getting reports
You can get all exploits and exploitation reports related to vulnerability with its description in a nice table: docker run inthewild/inthewild reports CVE-2021-30666
You can get just the exploits: docker run inthewild/inthewild exploits CVE-2021-22986
Or just reports of exploitation in the wild: docker run inthewild/inthewild exploitation CVE-2021-30666
hey man, your table is dope but I heard JSON is cooler!: docker run inthewild/inthewild reports CVE-2021-30666 --no-format-cli
this is confusing: you may always add --help if you are getting lost