CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
2,435 results Clear all
CVE-2024-43931 9.8 CRITICAL EPSS 0.01
Eyecix Jobsearch WP Job Board < 2.5.4 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.3.
CWE-502 Aug 29, 2024
CVE-2022-2440 7.2 HIGH EPSS 0.01
Themeeditor Theme Editor < 2.9 - Insecure Deserialization
The Theme Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'images_array' parameter in versions up to, and including 2.8. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
CWE-502 Aug 29, 2024
CVE-2024-8030 9.8 CRITICAL EPSS 0.44
Ultimate Store Kit Elementor Addons <2.0.3 - Code Injection
The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin is vulnerable to PHP Object Injection via deserialization of untrusted input via the _ultimate_store_kit_wishlist cookie in versions up to , and including, 2.0.3. This makes it possible for an unauthenticated attacker to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker or above to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Aug 28, 2024
CVE-2024-7351 7.2 HIGH EPSS 0.03
Presstigers Simple Job Board < 2.12.4 - Insecure Deserialization
The Simple Job Board plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.12.3 via deserialization of untrusted input when editing job applications. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Aug 24, 2024
CVE-2024-5335 9.8 CRITICAL EPSS 0.13
Ultimate Store Kit Elementor Addons <1.6.4 - Code Injection
The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin is vulnerable to PHP Object Injection via deserialization of untrusted input via the _ultimate_store_kit_compare_products cookie in versions up to , and including, 1.6.4. This makes it possible for an unauthenticated attacker to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker or above to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Aug 21, 2024
CVE-2024-42363 8.8 HIGH 1 Writeup EPSS 0.05
Kubernetes <3385 - RCE
Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.
CWE-502 Aug 20, 2024
CVE-2024-42362 8.8 HIGH 1 Writeup EPSS 0.00
Apache Hertzbeat < 1.6.0 - Insecure Deserialization
Hertzbeat is an open source, real-time monitoring system. Hertzbeat has an authenticated (user role) RCE via unsafe deserialization in /api/monitors/import. This vulnerability is fixed in 1.6.0.
CWE-502 Aug 20, 2024
CVE-2024-8003 3.5 LOW 1 Writeup EPSS 0.00
Go-Tribe gotribe-admin <1.0 - Deserialization
A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as problematic. Affected by this issue is the function InitRoutes of the file internal/app/routes/routes.go of the component Log Handler. The manipulation leads to deserialization. The patch is identified as 45ac90d6d1f82716f77dbcdf8e7309c229080e3c. It is recommended to apply a patch to fix this issue.
CWE-502 Aug 20, 2024
CVE-2024-5932 10.0 CRITICAL EXPLOITED 8 PoCs Analysis NUCLEI EPSS 0.94
Givewp < 3.14.2 - Insecure Deserialization
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
CWE-502 Aug 20, 2024
CVE-2024-43354 9.8 CRITICAL EXPLOITED EPSS 0.01
myCred <2.7.2 - Code Injection
Deserialization of Untrusted Data vulnerability in myCred allows Object Injection.This issue affects myCred: from n/a through 2.7.2.
CWE-502 Aug 19, 2024
CVE-2024-43252 9.0 CRITICAL EXPLOITED EPSS 0.01
Crew HRM <1.1.1 - Code Injection
Deserialization of Untrusted Data vulnerability in Crew HRM allows Object Injection.This issue affects Crew HRM: from n/a through 1.1.1.
CWE-502 Aug 19, 2024
CVE-2024-43242 9.0 CRITICAL EPSS 0.01
Ultimate Membership Pro <12.6 - Code Injection
Deserialization of Untrusted Data vulnerability in azzaroco Ultimate Membership Pro allows Object Injection.This issue affects Ultimate Membership Pro: from n/a through 12.6.
CWE-502 Aug 19, 2024
CVE-2024-37099 10.0 CRITICAL EXPLOITED EPSS 0.00
Givewp < 3.14.2 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in Liquid Web GiveWP allows Object Injection.This issue affects GiveWP: from n/a through 3.14.1.
CWE-502 Aug 19, 2024
CVE-2024-28986 9.8 CRITICAL KEV NUCLEI EPSS 0.78
SolarWinds Web Help Desk < 12.8.3 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.   However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
CWE-502 Aug 13, 2024
CVE-2024-43141 9.8 CRITICAL EPSS 0.01
Roland Barker xnau webdesign Participants Database <2.5.9.2 - Code ...
Deserialization of Untrusted Data vulnerability in Roland Barker, xnau webdesign Participants Database allows Object Injection.This issue affects Participants Database: from n/a through 2.5.9.2.
CWE-502 Aug 13, 2024
CVE-2024-7561 8.8 HIGH EPSS 0.01
The Next 1.1.0 - Code Injection
The The Next theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.0 via deserialization of untrusted input from the wpeden_post_meta post meta value. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Aug 08, 2024
CVE-2024-7560 7.2 HIGH EPSS 0.01
News Flash <1.1.0 - Code Injection
The News Flash theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.0 via deserialization of untrusted input from the newsflash_post_meta meta value. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Aug 08, 2024
CVE-2024-7486 8.8 HIGH EPSS 0.01
MultiPurpose - Code Injection
The MultiPurpose theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.0 via deserialization of untrusted input through the 'wpeden_post_meta' post meta. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Aug 08, 2024
CVE-2024-36131 8.8 HIGH EPSS 0.03
EPMM <12.1.0.1 - Command Injection
An insecure deserialization vulnerability in web component of EPMM prior to 12.1.0.1 allows an authenticated remote attacker to execute arbitrary commands on the underlying operating system of the appliance.
CWE-502 Aug 07, 2024
CVE-2024-39636 8.3 HIGH EPSS 0.01
CodeSolz Better Find and Replace <1.6.1 - Deserialization
Deserialization of Untrusted Data vulnerability in CodeSolz Better Find and Replace.This issue affects Better Find and Replace: from n/a through 1.6.1.
CWE-502 Aug 01, 2024