CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
2,435 results Clear all
CVE-2019-5326 7.2 HIGH EPSS 0.03
Aruba Airwave VisualRF - Code Injection
An administrative application user of or application user with write access to Aruba Airwave VisualRF is able to obtain code execution on the AMP platform. This is possible due to the ability to overwrite a file on disk which is subsequently deserialized by the Java application component.
CWE-502 Feb 27, 2020
CVE-2020-8441 9.8 CRITICAL 1 Writeup EPSS 0.08
JYaml <1.3 - Code Injection
JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
CWE-502 Feb 19, 2020
CVE-2019-20477 9.8 CRITICAL 1 Writeup EPSS 0.00
Pyyaml < 5.1.2 - Insecure Deserialization
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
CWE-502 Feb 19, 2020
CVE-2020-9006 9.8 CRITICAL 1 PoC Analysis EPSS 0.41
Sygnoos Popup Builder < 2.6.7.6 - Insecure Deserialization
The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)
CWE-502 Feb 17, 2020
CVE-2020-8801 7.2 HIGH EPSS 0.00
SuiteCRM <7.11.11 - Code Injection
SuiteCRM through 7.11.11 allows PHAR Deserialization.
CWE-502 Feb 13, 2020
CVE-2020-2123 8.8 HIGH EPSS 0.01
Jenkins Radargun < 1.7 - Insecure Deserialization
Jenkins RadarGun Plugin 1.7 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CWE-502 Feb 12, 2020
CVE-2020-0618 8.8 HIGH KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Microsoft Sql Server - Insecure Deserialization
A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'.
CWE-502 Feb 11, 2020
CVE-2020-8840 9.8 CRITICAL 9 PoCs Analysis EPSS 0.08
FasterXML Jackson-Databind <2.9.10.2 - RCE
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
CWE-502 Feb 10, 2020
CVE-2020-6770 10.0 CRITICAL EPSS 0.11
Bosch Video Management System Mobile ... - Insecure Deserialization
Deserialization of Untrusted Data in the BVMS Mobile Video Service (BVMS MVS) allows an unauthenticated remote attacker to execute arbitrary code on the system. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000 and DIVAR IP 7000 if a vulnerable BVMS version is installed.
CWE-502 Feb 07, 2020
CVE-2013-4521 9.8 CRITICAL 1 Writeup EPSS 0.03
Nuxeo Platform <5.6.0-HF27 & <5.8.0-HF-01 - Code Injection
RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.
CWE-502 Feb 06, 2020
CVE-2020-3716 9.8 CRITICAL EPSS 0.17
Magento <2.3.3, <2.2.10, <1.14.4.3, <1.9.4.3 - Code Injection
Magento versions 2.3.3 and earlier, 2.2.10 and earlier, 1.14.4.3 and earlier, and 1.9.4.3 and earlier have a deserialization of untrusted data vulnerability. Successful exploitation could lead to arbitrary code execution.
CWE-502 Jan 29, 2020
CVE-2019-17570 9.8 CRITICAL 2 PoCs Analysis EPSS 0.71
Apache Xml-rpc - Insecure Deserialization
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
CWE-502 Jan 23, 2020
CVE-2020-6959 9.8 CRITICAL EPSS 0.01
Honeywell Maxpro Nvr XE Firmware < 5.6 - Insecure Deserialization
The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch are vulnerable to an unsafe deserialization of untrusted data. An attacker may be able to remotely modify deserialized data without authentication using a specially crafted web request, resulting in remote code execution.
CWE-502 Jan 22, 2020
CVE-2019-17635 7.8 HIGH EPSS 0.00
Eclipse Memory Analyzer < 1.9.1 - Insecure Deserialization
Eclipse Memory Analyzer version 1.9.1 and earlier is subject to a deserialization vulnerability if an index file of a parsed heap dump is replaced by a malicious version and the heap dump is reopened in Memory Analyzer. The user must chose to reopen an already parsed heap dump with an untrusted index for the problem to occur. The problem can be averted if the index files from an untrusted source are deleted and the heap dump is opened and reparsed. Also some local configuration data is subject to a deserialization vulnerability if the local data were to be replaced with a malicious version. This can be averted if the local configuration data stored on the file system cannot be changed by an attacker. The vulnerability could possibly allow code execution on the local system.
CWE-502 Jan 17, 2020
CVE-2020-2604 8.1 HIGH EPSS 0.02
Oracle Java SE <13.0.1 - RCE
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-502 Jan 15, 2020
CVE-2020-2555 9.8 CRITICAL KEV 10 PoCs Analysis EPSS 0.93
Oracle Coherence 3.7.1.0/12.1.3.0.0/12.2.1.3-4 - RCE
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-502 Jan 15, 2020
CVE-2019-17076 9.8 CRITICAL EPSS 0.06
Jamf < 9.101.4 - Insecure Deserialization
An issue was discovered in Jamf Pro 9.x and 10.x before 10.15.1. Deserialization of untrusted data when parsing JSON in several APIs may cause Denial of Service (DoS), remote code execution (RCE), and/or deletion of files on the Jamf Pro server.
CWE-502 Jan 08, 2020
CVE-2014-1860 9.8 CRITICAL EPSS 0.00
Contao CMS <3.2.4 - Code Injection
Contao CMS through 3.2.4 has PHP Object Injection Vulnerabilities
CWE-502 Jan 08, 2020
CVE-2019-20330 9.8 CRITICAL 2 PoCs Analysis EPSS 0.02
Netapp Snapcenter < 2.7.9.7 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
CWE-502 Jan 03, 2020
CVE-2016-1000027 9.8 CRITICAL 6 PoCs Analysis EPSS 0.60
Pivotal Spring Framework <5.3.16 - RCE
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
CWE-502 Jan 02, 2020