CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
2,435 results Clear all
CVE-2016-6814 9.8 CRITICAL EPSS 0.26
Apache Groovy < 2.4.3 - Insecure Deserialization
When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects were subject to this vulnerability.
CWE-502 Jan 18, 2018
CVE-2017-17485 9.8 CRITICAL 4 PoCs Analysis EPSS 0.80
Fasterxml Jackson-databind < 2.6.7.3 - Insecure Deserialization
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
CWE-502 Jan 10, 2018
CVE-2014-9515 9.8 CRITICAL 1 Writeup EPSS 0.03
Dozer - RCE
Dozer improperly uses a reflection-based approach to type conversion, which might allow remote attackers to execute arbitrary code via a crafted serialized object.
CWE-502 Dec 29, 2017
CVE-2017-5641 9.8 CRITICAL EPSS 0.50
Apache Flex Blazeds < 4.7.2 - Insecure Deserialization
Previous versions of Apache Flex BlazeDS (4.7.2 and earlier) did not restrict which types were allowed for AMF(X) object deserialization by default. During the deserialization process code is executed that for several known types has undesired side-effects. Other, unknown types may also exhibit such behaviors. One vector in the Java standard library exists that allows an attacker to trigger possibly further exploitable Java deserialization of untrusted data. Other known vectors in third party libraries can be used to trigger remote code execution.
CWE-502 Dec 28, 2017
CVE-2017-17672 9.8 CRITICAL 1 PoC Analysis EPSS 0.08
Vbulletin < 5.3.3 - Insecure Deserialization
In vBulletin through 5.3.x, there is an unauthenticated deserialization vulnerability that leads to arbitrary file deletion and, under certain circumstances, code execution, because of unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, which is a publicly exposed API. This is exploited with the templateidlist parameter to ajax/api/template/cacheTemplates.
CWE-502 Dec 14, 2017
CVE-2017-11284 9.8 CRITICAL EPSS 0.24
Adobe Coldfusion - Insecure Deserialization
Adobe ColdFusion has an Untrusted Data Deserialization vulnerability. This affects Update 4 and earlier versions for ColdFusion 2016, and Update 12 and earlier versions for ColdFusion 11.
CWE-502 Dec 01, 2017
CVE-2017-11283 9.8 CRITICAL EPSS 0.24
Adobe Coldfusion - Insecure Deserialization
Adobe ColdFusion has an Untrusted Data Deserialization vulnerability. This affects Update 4 and earlier versions for ColdFusion 2016, and Update 12 and earlier versions for ColdFusion 11.
CWE-502 Dec 01, 2017
CVE-2017-1000207 8.8 HIGH 1 PoC Analysis EPSS 0.00
Swagger-Parser <=1.0.30 & Swagger Codegen <=2.2.2 - RCE
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
CWE-502 Nov 27, 2017
CVE-2017-8045 9.8 CRITICAL EPSS 0.03
Pivotal Software Spring Advanced Mess... - Insecure Deserialization
In Pivotal Spring AMQP versions prior to 1.7.4, 1.6.11, and 1.5.7, an org.springframework.amqp.core.Message may be unsafely deserialized when being converted into a string. A malicious payload could be crafted to exploit this and enable a remote code execution attack.
CWE-502 Nov 27, 2017
CVE-2017-4995 8.1 HIGH EPSS 0.01
Pivotal Spring Security <4.2.3-5.0.0 - Code Injection
An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE through 4.2.2.RELEASE, and Spring Security 5.0.0.M1. When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets." Spring Security configures Jackson with global default typing enabled, which means that (through the previous exploit) arbitrary code could be executed if all of the following is true: (1) Spring Security's Jackson support is being leveraged by invoking SecurityJackson2Modules.getModules(ClassLoader) or SecurityJackson2Modules.enableDefaultTyping(ObjectMapper); (2) Jackson is used to deserialize data that is not trusted (Spring Security does not perform deserialization using Jackson, so this is an explicit choice of the user); and (3) there is an unknown (Jackson is not blacklisting it already) "deserialization gadget" that allows code execution present on the classpath. Jackson provides a blacklisting approach to protecting against this type of attack, but Spring Security should be proactive against blocking unknown "deserialization gadgets" when Spring Security enables default typing.
CWE-502 Nov 27, 2017
CVE-2017-1000248 9.8 CRITICAL 1 Writeup EPSS 0.00
Redis-store <=v1.3.0 - Info Disclosure
Redis-store <=v1.3.0 allows unsafe objects to be loaded from redis
CWE-502 Nov 17, 2017
CVE-2017-1000208 8.8 HIGH 1 PoC Analysis EPSS 0.00
Swagger-Parser <=1.0.30 - RCE
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
CWE-502 Nov 17, 2017
CVE-2017-1000195 7.5 HIGH EPSS 0.00
October CMS <build 412 - Code Injection
October CMS build 412 is vulnerable to PHP object injection in asset move functionality resulting in ability to delete files limited by file permissions on the server.
CWE-502 Nov 17, 2017
CVE-2017-12634 9.8 CRITICAL EPSS 0.06
Apache Camel < 2.19.4 - Insecure Deserialization
The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.
CWE-502 Nov 15, 2017
CVE-2017-12633 9.8 CRITICAL EPSS 0.03
Apache Camel < 2.19.4 - Insecure Deserialization
The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.
CWE-502 Nov 15, 2017
CVE-2015-7501 9.8 CRITICAL EXPLOITED 3 PoCs Analysis EPSS 0.71
Red Hat - RCE
Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
CWE-502 Nov 09, 2017
CVE-2017-1000148 8.8 HIGH EPSS 0.01
Mahara <15.04.8, <15.10.4, <16.04.2 - Code Injection
Mahara 15.04 before 15.04.8 and 15.10 before 15.10.4 and 16.04 before 16.04.2 are vulnerable to PHP code execution as Mahara would pass portions of the XML through the PHP "unserialize()" function when importing a skin from an XML file.
CWE-502 Nov 03, 2017
CVE-2016-5003 9.8 CRITICAL EPSS 0.42
Apache Ws-xmlrpc - Insecure Deserialization
The Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to execute arbitrary code via a crafted serialized Java object in an <ex:serializable> element.
CWE-502 Oct 27, 2017
CVE-2017-12796 9.8 CRITICAL EPSS 0.06
Openmrs < 2.6.1 - Insecure Deserialization
The Reporting Compatibility Add On before 2.0.4 for OpenMRS, as distributed in OpenMRS Reference Application before 2.6.1, does not authenticate users when deserializing XML input into ReportSchema objects. The result is that remote unauthenticated users are able to execute operating system commands by crafting malicious XML payloads, as demonstrated by a single admin/reports/reportSchemaXml.form request.
CWE-502 Oct 23, 2017
CVE-2017-12628 7.8 HIGH EPSS 0.00
Apache James Server < 3.0.0 - Insecure Deserialization
The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades the incriminated library.
CWE-502 Oct 20, 2017