CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
2,435 results Clear all
CVE-2024-10079 8.8 HIGH EPSS 0.01
WP Easy Post Types <1.4.4 - Code Injection
The WP Easy Post Types plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.4 via deserialization of untrusted input from the 'text' parameter in the 'ajax_import_content' function. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Oct 18, 2024
CVE-2024-49318 9.8 CRITICAL EPSS 0.01
My Reading Library <1.0 - Code Injection
Deserialization of Untrusted Data vulnerability in Scott Olson My Reading Library allows Object Injection.This issue affects My Reading Library: from n/a through 1.0.
CWE-502 Oct 17, 2024
CVE-2024-47836 3.5 LOW EPSS 0.02
Admidio <4.3.12 - Code Injection
Admidio is an open-source user management solution. Prior to version 4.3.12, an unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server. Version 4.3.12 fixes this issue.
CWE-502 Oct 16, 2024
CVE-2024-49227 8.8 HIGH EPSS 0.01
Innovaweb Free Stock Photos Foter <1.5.4 - Code Injection
Deserialization of Untrusted Data vulnerability in Innovaweb Sp. Z o.O. Free Stock Photos Foter allows Object Injection.This issue affects Free Stock Photos Foter: from n/a through 1.5.4.
CWE-502 Oct 16, 2024
CVE-2024-49226 8.8 HIGH EPSS 0.01
TAKETIN To WP Membership <2.8.0 - Code Injection
Deserialization of Untrusted Data vulnerability in TAKETIN TAKETIN To WP Membership allows Object Injection.This issue affects TAKETIN To WP Membership: from n/a through 2.8.0.
CWE-502 Oct 16, 2024
CVE-2024-49218 9.8 CRITICAL EPSS 0.01
Al Imran Akash Recently <1.1 - Object Injection
Deserialization of Untrusted Data vulnerability in Al Imran Akash Recently allows Object Injection.This issue affects Recently: from n/a through 1.1.
CWE-502 Oct 16, 2024
CVE-2024-48030 9.8 CRITICAL EPSS 0.01
Gabriele Valenti Telecash Ricaricaweb <2.2 - Code Injection
Deserialization of Untrusted Data vulnerability in Gabriele Valenti Telecash Ricaricaweb allows Object Injection.This issue affects Telecash Ricaricaweb: from n/a through 2.2.
CWE-502 Oct 16, 2024
CVE-2024-48028 9.8 CRITICAL EPSS 0.01
Boyan Raichev IP Loc8 - Object Injection
Deserialization of Untrusted Data vulnerability in Boyan Raichev IP Loc8 allows Object Injection.This issue affects IP Loc8: from n/a through 1.1.
CWE-502 Oct 16, 2024
CVE-2024-48026 9.8 CRITICAL EPSS 0.01
Grayson Robbins Disc Golf Manager <1.0.0 - Code Injection
Deserialization of Untrusted Data vulnerability in Grayson Robbins Disc Golf Manager allows Object Injection.This issue affects Disc Golf Manager: from n/a through 1.0.0.
CWE-502 Oct 16, 2024
CVE-2021-4451 6.6 MEDIUM EPSS 0.01
Nintechnet Ninjafirewall < 4.3.3 - Insecure Deserialization
The NinjaFirewall plugin for WordPress is vulnerable to Authenticated PHAR Deserialization in versions up to, and including, 4.3.3. This allows authenticated attackers to perform phar deserialization on the server. This deserialization can allow other plugin or theme exploits if vulnerable software is present (WordPress, and NinjaFirewall).
CWE-502 Oct 16, 2024
CVE-2024-9634 9.8 CRITICAL EPSS 0.23
Givewp < 3.16.4 - Insecure Deserialization
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.3 via deserialization of untrusted input from the give_company_name parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution.
CWE-502 Oct 16, 2024
CVE-2024-21217 3.7 LOW EPSS 0.00
Oracle Graalvm - Insecure Deserialization
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CWE-502 Oct 15, 2024
CVE-2024-9953 4.9 MEDIUM EPSS 0.00
CERT VINCE <3.0.8 - DoS
A potential denial-of-service (DoS) vulnerability exists in CERT VINCE software versions prior to 3.0.8. An authenticated administrative user can inject an arbitrary pickle object into a user’s profile, which may lead to a DoS condition when the profile is accessed. While the Django server restricts unpickling to prevent server crashes, this vulnerability could still disrupt operations.
CWE-502 Oct 14, 2024
CVE-2024-45733 8.8 HIGH EPSS 0.07
Splunk < 9.1.6 - Insecure Deserialization
In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.
CWE-502 Oct 14, 2024
CVE-2024-9917 6.3 MEDIUM 1 Writeup EPSS 0.03
Usualtoolcms - Insecure Deserialization
A vulnerability, which was classified as critical, was found in HuangDou UTCMS V9. This affects an unknown part of the file app/modules/ut-template/admin/template_creat.php. The manipulation of the argument content leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Oct 13, 2024
CVE-2024-48033 9.8 CRITICAL EPSS 0.00
Elie Burstein, Baptiste Gourdin Talkback <1.0 - Code Injection
Deserialization of Untrusted Data vulnerability in Elie Burstein, Baptiste Gourdin Talkback allows Object Injection.This issue affects Talkback: from n/a through 1.0.
CWE-502 Oct 11, 2024
CVE-2024-47074 9.8 CRITICAL 1 Writeup EPSS 0.01
DataEase - Code Injection
DataEase is an open source data visualization analysis tool. In Dataease, the PostgreSQL data source in the data source function can customize the JDBC connection parameters and the PG server target to be connected. In backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, PgConfiguration class don't filter any parameters, directly concat user input. So, if the attacker adds some parameters in JDBC url, and connect to evil PG server, the attacker can trigger the PG jdbc deserialization vulnerability, and eventually the attacker can execute through the deserialization vulnerability system commands and obtain server privileges. The vulnerability has been fixed in v1.18.25.
CWE-502 Oct 11, 2024
CVE-2024-47636 9.8 CRITICAL EPSS 0.01
Eyecix JobSearch <2.5.9 - Code Injection
Deserialization of Untrusted Data vulnerability in Eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.9.
CWE-502 Oct 10, 2024
CVE-2023-25581 1 PoC Analysis EPSS 0.19
Org.pac4j Pac4j-core < 4.0.0 - Insecure Deserialization
pac4j is a security framework for Java. `pac4j-core` prior to version 4.0.0 is affected by a Java deserialization vulnerability. The vulnerability affects systems that store externally controlled values in attributes of the `UserProfile` class from pac4j-core. It can be exploited by providing an attribute that contains a serialized Java object with a special prefix `{#sb64}` and Base64 encoding. This issue may lead to Remote Code Execution (RCE) in the worst case. Although a `RestrictedObjectInputStream` is in place, that puts some restriction on what classes can be deserialized, it still allows a broad range of java packages and potentially exploitable with different gadget chains. pac4j versions 4.0.0 and greater are not affected by this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-502 Oct 10, 2024
CVE-2024-9005 EPSS 0.00
Unspecified - Code Injection
CWE-502: Deserialization of Untrusted Data vulnerability exists that could allow code to be remotely executed on the server when unsafely deserialized data is posted to the web server.
CWE-502 Oct 08, 2024