CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
2,435 results Clear all
CVE-2017-2295 8.2 HIGH EPSS 0.02
Puppet <4.10.1 - Code Injection
Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.
CWE-502 Jul 05, 2017
CVE-2017-10803 6.5 MEDIUM 1 PoC Analysis EPSS 0.02
Odoo - Insecure Deserialization
In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, insecure handling of anonymization data in the Database Anonymization module allows remote authenticated privileged users to execute arbitrary Python code, because unpickle is used.
CWE-502 Jul 04, 2017
CVE-2017-2292 9.0 CRITICAL EPSS 0.02
MCollective <2.10.4 - Code Injection
Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior.
CWE-502 Jun 30, 2017
CVE-2017-9830 9.8 CRITICAL 1 PoC Analysis EPSS 0.09
Code42 CrashPlan <5.4 - RCE
Remote Code Execution is possible in Code42 CrashPlan 5.4.x via the org.apache.commons.ssl.rmi.DateRMI Java class, because (upon instantiation) it creates an RMI server that listens on a TCP port and deserializes objects sent by TCP clients.
CWE-502 Jun 27, 2017
CVE-2017-9424 9.8 CRITICAL EPSS 0.04
IdeaBlade Breeze <1.6.5 - Code Injection
IdeaBlade Breeze Breeze.Server.NET before 1.6.5 allows remote attackers to execute arbitrary code, related to use of TypeNameHandling in JSON deserialization.
CWE-502 Jun 22, 2017
CVE-2016-7050 9.8 CRITICAL EPSS 0.01
Redhat Enterprise Linux Desktop - Insecure Deserialization
SerializableProvider in RESTEasy in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to execute arbitrary code.
CWE-502 Jun 08, 2017
CVE-2016-3690 9.8 CRITICAL EPSS 0.02
JBoss EAP <5.x - RCE
The PooledInvokerServlet in JBoss EAP 4.x and 5.x allows remote attackers to execute arbitrary code via a crafted serialized payload.
CWE-502 Jun 08, 2017
CVE-2017-5878 9.8 CRITICAL 1 Writeup EPSS 0.03
Red5 Media Server - Insecure Deserialization
The AMF unmarshallers in Red5 Media Server before 1.0.8 do not restrict the classes for which it performs deserialization, which allows remote attackers to execute arbitrary code via crafted serialized Java data.
CWE-502 Jun 08, 2017
CVE-2017-4914 9.8 CRITICAL 1 PoC Analysis EPSS 0.13
VMware VDP <6.1 - Deserialization
VMware vSphere Data Protection (VDP) 6.1.x, 6.0.x, 5.8.x, and 5.5.x contains a deserialization issue. Exploitation of this issue may allow a remote attacker to execute commands on the appliance.
CWE-502 Jun 07, 2017
CVE-2017-9363 9.8 CRITICAL EPSS 0.04
Soffid IAM <1.7.5 - Code Injection
Untrusted Java serialization in Soffid IAM console before 1.7.5 allows remote attackers to achieve arbitrary remote code execution via a crafted authentication request.
CWE-502 Jun 02, 2017
CVE-2017-7504 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.90
Jboss <4.X - Code Injection
HTTPServerILServlet.java in JMS over HTTP Invocation Layer of the JbossMQ implementation, which is enabled by default in Red Hat Jboss Application Server <= Jboss 4.X does not restrict the classes for which it performs deserialization, which allows remote attackers to execute arbitrary code via crafted serialized data.
CWE-502 May 19, 2017
CVE-2017-8829 7.8 HIGH EPSS 0.00
Debian Lintian < 2.5.50.3 - Insecure Deserialization
Deserialization vulnerability in lintian through 2.5.50.3 allows attackers to trigger code execution by requesting a review of a source package with a crafted YAML file.
CWE-502 May 08, 2017
CVE-2017-8804 7.5 HIGH EPSS 0.04
GNU Glibc - Insecure Deserialization
The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references
CWE-502 May 07, 2017
CVE-2017-3066 9.8 CRITICAL KEV 3 PoCs Analysis EPSS 0.93
Adobe Coldfusion - Insecure Deserialization
Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution.
CWE-502 Apr 27, 2017
CVE-2017-7293 7.8 HIGH 3 PoCs Analysis EPSS 0.02
Dolby DAX2/DAX3 - Privilege Escalation
The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and Dolby Audio X3 (DAX3) 1.0 and 1.1. An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50.
CWE-502 Apr 26, 2017
CVE-2017-5645 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.94
Apache Log4j < 2.8.2 - Insecure Deserialization
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CWE-502 Apr 17, 2017
CVE-2016-4483 7.5 HIGH EPSS 0.01
Xmlsoft Libxml2 < 2.9.4 - Insecure Deserialization
The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
CWE-502 Apr 11, 2017
CVE-2016-0779 9.8 CRITICAL EPSS 0.05
Apache TomEE <1.7.4, <7.0.0-M3 - RCE
The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object.
CWE-502 Apr 11, 2017
CVE-2017-5983 9.8 CRITICAL NUCLEI EPSS 0.08
Atlassian Jira - Insecure Deserialization
The JIRA Workflow Designer Plugin in Atlassian JIRA Server before 6.3.0 improperly uses an XML parser and deserializer, which allows remote attackers to execute arbitrary code, read arbitrary files, or cause a denial of service via a crafted serialized Java object.
CWE-502 Apr 10, 2017
CVE-2016-10304 6.5 MEDIUM EPSS 0.01
SAP Netweaver Application Server Java - Insecure Deserialization
The SAP EP-RUNTIME component in SAP NetWeaver AS JAVA 7.5 allows remote authenticated users to cause a denial of service (out-of-memory error and service instability) via a crafted serialized Java object, as demonstrated by serial.cc3, aka SAP Security Note 2315788.
CWE-502 Apr 10, 2017