CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
2,435 results Clear all
CVE-2019-14466 6.5 MEDIUM EPSS 0.00
GONICUS GOsa 2.7.5.2 - Code Injection
The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.
CWE-502 Dec 31, 2019
CVE-2019-19470 7.8 HIGH 1 PoC Analysis EPSS 0.01
TinyWall <2.1.12 - Privilege Escalation
Unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITY\SYSTEM for a local attacker. Affected product is TinyWall, all versions up to and including 2.1.12. Fixed in version 2.1.13.
CWE-502 Dec 30, 2019
CVE-2019-18211 8.8 HIGH EPSS 0.03
Orckestra C1 Cms < 6.6 - Insecure Deserialization
An issue was discovered in Orckestra C1 CMS through 6.6. The EntityTokenSerializer class in Composite.dll is prone to unvalidated deserialization of wrapped BinaryFormatter payloads, leading to arbitrary remote code execution for any low-privilege user.
CWE-502 Dec 23, 2019
CVE-2019-17571 9.8 CRITICAL 3 PoCs Analysis EPSS 0.42
Apache Log4j < 1.2.17 - Insecure Deserialization
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
CWE-502 Dec 20, 2019
CVE-2019-19909 8.8 HIGH EPSS 0.01
SFU Open Journal System < 3.1.2-2 - Insecure Deserialization
An issue was discovered in Public Knowledge Project (PKP) pkp-lib before 3.1.2-2, as used in Open Journal Systems (OJS) before 3.1.2-2. Code injection can occur in the OJS report generator if an authenticated Journal Manager user visits a crafted URL, because unserialize is used.
CWE-502 Dec 19, 2019
CVE-2019-8662 9.8 CRITICAL 2 PoCs Analysis EPSS 0.12
Apple Iphone OS < 12.4 - Insecure Deserialization
This issue was addressed with improved checks. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3. An attacker may be able to trigger a use-after-free in an application deserializing an untrusted NSDictionary.
CWE-502 Dec 18, 2019
CVE-2019-19849 8.8 HIGH EPSS 0.01
Typo3 < 8.7.30 - Insecure Deserialization
An issue was discovered in TYPO3 before 8.7.30, 9.x before 9.5.12, and 10.x before 10.2.2. It has been discovered that the classes QueryGenerator and QueryView are vulnerable to insecure deserialization. One exploitable scenario requires having the system extension ext:lowlevel (Backend Module: DB Check) installed, with a valid backend user who has administrator privileges. The other exploitable scenario requires having the system extension ext:sys_action installed, with a valid backend user who has limited privileges.
CWE-502 Dec 17, 2019
CVE-2019-18956 9.8 CRITICAL 1 Writeup EPSS 0.16
Divisa Proxia Suite <9.12.16-10.1.5, SparkSpace <1.0.30-1.2.4, Prox...
Divisa Proxia Suite 9 < 9.12.16, 9.11.19, 9.10.26, 9.9.8, 9.8.43 and 9.7.10, 10.0 < 10.0.32, and 10.1 < 10.1.5, SparkSpace 1.0 < 1.0.30, 1.1 < 1.1.2, and 1.2 < 1.2.4, and Proxia PHR 1.0 < 1.0.30 and 1.1 < 1.1.2 allows remote code execution via untrusted Java deserialization. The proxia-error cookie is insecurely deserialized in every request (GET or POST). Thus, an unauthenticated attacker can easily craft a seria1.0lized payload in order to execute arbitrary code via the prepareError function in the com.divisait.dv2ee.controller.MVCControllerServlet class of the dv2eemvc.jar component. allows remote code execution via untrusted Java deserialization. The proxia-error cookie is insecurely deserialized in every request (GET or POST). Thus, an unauthenticated attacker can easily craft a serialized payload in order to execute arbitrary code via the prepareError function in the com.divisait.dv2ee.controller.MVCControllerServlet class of the dv2eemvc.jar component. Affected products include Proxia Premium Edition 2017 and Sparkspace.
CWE-502 Dec 17, 2019
CVE-2019-19826 9.8 CRITICAL EPSS 0.02
Drupal Views Dynamic Field < 6.x-1.4 - Insecure Deserialization
The Views Dynamic Fields module through 7.x-1.0-alpha4 for Drupal makes insecure unserialize calls in handlers/views_handler_filter_dynamic_fields.inc, as demonstrated by PHP object injection, involving a field_names object and an Archive_Tar object, for file deletion. Code execution might also be possible.
CWE-502 Dec 16, 2019
CVE-2014-3699 9.8 CRITICAL EPSS 0.01
Redhat Edeploy - Insecure Deserialization
eDeploy has RCE via cPickle deserialization of untrusted data
CWE-502 Dec 15, 2019
CVE-2019-16774 4.4 MEDIUM 1 Writeup EPSS 0.00
phpfastcache <5.1.3 - Code Injection
In phpfastcache before 5.1.3, there is a possible object injection vulnerability in cookie driver.
CWE-502 Dec 12, 2019
CVE-2019-18316 9.8 CRITICAL EPSS 0.02
Siemens Sppa-t3000 Application Server - Insecure Deserialization
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could gain remote code execution by sending specifically crafted packets to 1099/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
CWE-502 Dec 12, 2019
CVE-2019-18283 9.8 CRITICAL EPSS 0.11
Siemens Sppa-t3000 Application Server - Insecure Deserialization
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The AdminService is available without authentication on the Application Server. An attacker can gain remote code execution by sending specifically crafted objects to one of its functions. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
CWE-502 Dec 12, 2019
CVE-2019-17358 8.1 HIGH 1 Writeup EPSS 0.02
Cacti < 1.2.7 - Out-of-Bounds Write
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.
CWE-502 Dec 12, 2019
CVE-2019-19373 7.5 HIGH EPSS 0.04
Squiz Matrix CMS <5.5.0.3, 5.5.1 <5.5.1.8, 5.5.2 <5.5.2.4, 5.5.3 <5...
An issue was discovered in Squiz Matrix CMS 5.5.0 prior to 5.5.0.3, 5.5.1 prior to 5.5.1.8, 5.5.2 prior to 5.5.2.4, and 5.5.3 prior to 5.5.3.3 where a user can trigger arbitrary unserialization of a PHP object from a packages/cms/page_templates/page_remote_content/page_remote_content.inc POST parameter during processing of a Remote Content page type. This unserialization can be used to trigger the inclusion of arbitrary files on the filesystem (local file inclusion), and results in remote code execution.
CWE-502 Dec 11, 2019
CVE-2019-18935 9.8 CRITICAL KEV RANSOMWARE 19 PoCs Analysis EPSS 0.94
Telerik UI ASP.NET AJAX RadAsyncUpload Deserialization
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
CWE-502 Dec 11, 2019
CVE-2019-19230 9.8 CRITICAL EPSS 0.06
CA Release Automation (Nolio) 6.6 - Code Injection
An unsafe deserialization vulnerability exists in CA Release Automation (Nolio) 6.6 with the DataManagement component that can allow a remote attacker to execute arbitrary code.
CWE-502 Dec 09, 2019
CVE-2019-17556 9.8 CRITICAL EPSS 0.01
Apache Olingo < 4.6.0 - Insecure Deserialization
Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running attacker's code in the worse case.
CWE-502 Dec 04, 2019
CVE-2019-18580 10.0 CRITICAL EPSS 0.12
Dell EMC Storage Monitoring and Reporting <4.3.1 - Deserialization
Dell EMC Storage Monitoring and Reporting version 4.3.1 contains a Java RMI Deserialization of Untrusted Data vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by sending a crafted RMI request to execute arbitrary code on the target host.
CWE-502 Nov 26, 2019
CVE-2019-15271 8.8 HIGH KEV EPSS 0.06
Cisco Rv016 Multi-wan VPN Firmware - Insecure Deserialization
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.
CWE-502 Nov 26, 2019