CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
2,435 results Clear all
CVE-2019-5434 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
XML-RPC - Code Injection
An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the "what" parameter in the "openads.spc" RPC method. Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third party websites. This vulnerability was addressed in version 4.2.0.
CWE-502 May 06, 2019
CVE-2019-7214 9.8 CRITICAL 6 PoCs Analysis EPSS 0.83
SmarterTools SmarterMail less than build 6985 - .NET Deserialization Remote Code Execution
SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch.
CWE-502 Apr 24, 2019
CVE-2019-9056 8.8 HIGH EPSS 0.01
Cmsmadesimple Cms Made Simple - Insecure Deserialization
An issue was discovered in CMS Made Simple 2.2.8. In the module FrontEndUsers (in the file class.FrontEndUsersManipulate.php or class.FrontEndUsersManipulator.php), it is possible to reach an unserialize call with an untrusted __FEU__ cookie, and achieve authenticated object injection.
CWE-502 Apr 11, 2019
CVE-2019-7361 7.8 HIGH EPSS 0.00
Autodesk - Code Injection
An attacker may convince a victim to open a malicious action micro (.actm) file that has serialized data, which may trigger a code execution in Autodesk Advance Steel 2018, Autodesk AutoCAD 2018, Autodesk AutoCAD Architecture 2018, Autodesk AutoCAD Electrical 2018, Autodesk AutoCAD Map 3D 2018, Autodesk AutoCAD Mechanical 2018, Autodesk AutoCAD MEP 2018, Autodesk AutoCAD P&ID 2018, Autodesk AutoCAD Plant 3D 2018, Autodesk AutoCAD LT 2018, and Autodesk Civil 3D 2018.
CWE-502 Apr 09, 2019
CVE-2019-10867 8.8 HIGH 2 PoCs Analysis EPSS 0.53
Pimcore < 5.7.1 - Insecure Deserialization
An issue was discovered in Pimcore before 5.7.1. An attacker with classes permission can send a POST request to /admin/class/bulk-commit, which will make it possible to exploit the unserialize function when passing untrusted values in the data parameter to bundles/AdminBundle/Controller/Admin/DataObject/ClassController.php.
CWE-502 Apr 04, 2019
CVE-2018-12680 7.5 HIGH EPSS 0.00
CoAPthon 3.1-4.0.2 - DoS
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
CWE-502 Apr 02, 2019
CVE-2018-12679 7.5 HIGH EPSS 0.00
CoAPthon3 1.0-1.0.1 - DoS
The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages.
CWE-502 Apr 02, 2019
CVE-2017-18365 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.41
Github < 2.8.7 - Insecure Deserialization
The Management Console in GitHub Enterprise 2.8.x before 2.8.7 has a deserialization issue that allows unauthenticated remote attackers to execute arbitrary code. This occurs because the enterprise session secret is always the same, and can be found in the product's source code. By sending a crafted cookie signed with this secret, one can call Marshal.load with arbitrary data, which is a problem because the Marshal data format allows Ruby objects.
CWE-502 Mar 28, 2019
CVE-2019-10068 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Kentico <12.0.15, 11.0.48, 10.0.52, 9.x - Code Injection
An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.
CWE-502 Mar 26, 2019
CVE-2019-9061 8.8 HIGH EPSS 0.01
Cmsmadesimple Cms Made Simple < 2.2.8 - Insecure Deserialization
An issue was discovered in CMS Made Simple 2.2.8. In the module ModuleManager (in the file action.installmodule.php), it is possible to reach an unserialize call with untrusted input and achieve authenticated object injection by using the "install module" feature.
CWE-502 Mar 26, 2019
CVE-2019-9057 8.8 HIGH EPSS 0.01
Cmsmadesimple Cms Made Simple < 2.2.8 - Insecure Deserialization
An issue was discovered in CMS Made Simple 2.2.8. In the module FilePicker, it is possible to reach an unserialize call with an untrusted parameter, and achieve authenticated object injection.
CWE-502 Mar 26, 2019
CVE-2019-9055 8.8 HIGH 1 PoC Analysis EPSS 0.32
Cmsmadesimple Cms Made Simple < 2.2.8 - Insecure Deserialization
An issue was discovered in CMS Made Simple 2.2.8. In the module DesignManager (in the files action.admin_bulk_css.php and action.admin_bulk_template.php), with an unprivileged user with Designer permission, it is possible reach an unserialize call with a crafted value in the m1_allparms parameter, and achieve object injection.
CWE-502 Mar 26, 2019
CVE-2019-7539 8.8 HIGH EPSS 0.00
ipycache <2016-05-31 - Code Injection
A code injection issue was discovered in ipycache through 2016-05-31.
CWE-502 Mar 21, 2019
CVE-2018-20221 8.8 HIGH 1 PoC Analysis EPSS 0.05
Deltek Ajera Timesheets <9.10.16 - Code Injection
Secure/SAService.rem in Deltek Ajera Timesheets 9.10.16 and prior are vulnerable to remote code execution via deserialization of untrusted user input from an authenticated user. The executed code will run as the IIS Application Pool that is running the application.
CWE-502 Mar 21, 2019
CVE-2018-19276 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
OpenMRS Java Deserialization RCE
OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerability that allows an unauthenticated user to execute arbitrary commands on the targeted system via crafted XML data in a request body.
CWE-502 Mar 21, 2019
CVE-2018-12023 7.5 HIGH 2 PoCs Analysis EPSS 0.05
FasterXML jackson-databind <2.7.9.4-2.8.11.2-2.9.6 - Code Injection
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
CWE-502 Mar 21, 2019
CVE-2018-12022 7.5 HIGH 2 PoCs Analysis EPSS 0.03
FasterXML jackson-databind <2.7.9.4, 2.8.11.2, 2.9.6 - Code Injection
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
CWE-502 Mar 21, 2019
CVE-2019-0192 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Solr < 5.5.5 - Insecure Deserialization
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.
CWE-502 Mar 07, 2019
CVE-2019-0187 9.8 CRITICAL EPSS 0.01
Apache Jmeter < 5.1 - Insecure Deserialization
Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.
CWE-502 Mar 06, 2019
CVE-2019-9212 9.8 CRITICAL EPSS 0.01
SOFA-Hessian <4.0.2 - RCE
SOFA-Hessian through 4.0.2 allows remote attackers to execute arbitrary commands via a crafted serialized Hessian object because blacklisting of com.caucho.naming.QName and com.sun.org.apache.xpath.internal.objects.XString is mishandled, related to Resin Gadget. NOTE: The vendor doesn’t consider this issue a vulnerability because the blacklist is being misused. SOFA Hessian supports custom blacklist and a disclaimer was posted encouraging users to update the blacklist or to use the whitelist feature for their specific needs since the blacklist is not being actively updated
CWE-184 Feb 27, 2019