CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
2,435 results Clear all
CVE-2024-39630 5.5 MEDIUM EPSS 0.00
MotoPress Timetable <2.4.13 - Object Injection
Deserialization of Untrusted Data vulnerability in MotoPress Timetable and Event Schedule allows Object Injection.This issue affects Timetable and Event Schedule: from n/a through 2.4.13.
CWE-502 Aug 01, 2024
CVE-2024-6152 8.8 HIGH EPSS 0.01
Flipbox Builder <1.5 - Code Injection
The Flipbox Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.5 via deserialization of untrusted input in the flipbox_builder_Flipbox_ShortCode function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Jul 27, 2024
CVE-2024-39673 6.8 MEDIUM EPSS 0.00
Huawei Emui - Insecure Deserialization
Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CWE-502 Jul 25, 2024
CVE-2024-7067 6.3 MEDIUM 1 Writeup EPSS 0.00
Shuttur Ecommerce-laravel-bootstrap - Insecure Deserialization
A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is a02111a674ab49f65018b31da3011b1e396f59b1. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-272348.
CWE-502 Jul 24, 2024
CVE-2024-6327 9.9 CRITICAL EPSS 0.03
Telerik Report Server <2024 Q2 - Code Injection
In Progress® Telerik® Report Server versions prior to 2024 Q2 (10.1.24.709), a remote code execution attack is possible through an insecure deserialization vulnerability.
CWE-502 Jul 24, 2024
CVE-2024-6794 9.8 CRITICAL EPSS 0.08
NI VeriStand <2024 Q2 - Deserialization
A deserialization of untrusted data vulnerability exists in NI VeriStand Waveform Streaming Server that may result in remote code execution. Successful exploitation requires an attacker to send a specially crafted message. These vulnerabilities affect NI VeriStand 2024 Q2 and prior versions.
CWE-502 Jul 22, 2024
CVE-2024-6793 9.8 CRITICAL EPSS 0.06
NI VeriStand <2024 Q2 - RCE
A deserialization of untrusted data vulnerability exists in NI VeriStand DataLogging Server that may result in remote code execution. Successful exploitation requires an attacker to send a specially crafted message. These vulnerabilities affect NI VeriStand 2024 Q2 and prior versions.
CWE-502 Jul 22, 2024
CVE-2024-6675 7.8 HIGH EPSS 0.01
NI VeriStand <2024 Q2 - Code Injection
A deserialization of untrusted data vulnerability exists in NI VeriStand that may result in remote code execution. Successful exploitation requires an attacker to get a user to open a specially crafted project file. This vulnerability affects VeriStand 2024 Q2 and prior versions.
CWE-502 Jul 22, 2024
CVE-2024-38759 5.4 MEDIUM EPSS 0.00
Wp-media Search & Replace < 3.2.2 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in WP MEDIA SAS Search & Replace search-and-replace.This issue affects Search & Replace: from n/a through 3.2.2.
CWE-502 Jul 22, 2024
CVE-2024-6960 7.5 HIGH EPSS 0.00
Ai.h2o H2o-core - Insecure Deserialization
The H2O machine learning platform uses "Iced" classes as the primary means of moving Java Objects around the cluster. The Iced format supports inclusion of serialized Java objects. When a model is deserialized, any class is allowed to be deserialized (no class whitelist). An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform.
CWE-502 Jul 21, 2024
CVE-2024-6944 6.3 MEDIUM EPSS 0.25
Crmeb < 5.4.0 - Insecure Deserialization
A vulnerability was found in ZhongBangKeJi CRMEB up to 5.4.0 and classified as critical. Affected by this issue is the function get_image_base64 of the file PublicController.php. The manipulation of the argument file leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-272066 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Jul 21, 2024
CVE-2024-6943 6.3 MEDIUM EPSS 0.00
Crmeb < 5.4.0 - Insecure Deserialization
A vulnerability has been found in ZhongBangKeJi CRMEB up to 5.4.0 and classified as critical. Affected by this vulnerability is the function downloadImage of the file app/services/product/product/CopyTaobaoServices.php. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272065 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Jul 21, 2024
CVE-2024-28074 9.6 CRITICAL EPSS 0.00
Solarwinds Access Rights Manager < 2023.2.4 - Insecure Deserialization
It was discovered that a previous vulnerability was not completely fixed with SolarWinds Access Rights Manager. While some controls were implemented the researcher was able to bypass these and use a different method to exploit the vulnerability.
CWE-502 Jul 17, 2024
CVE-2024-40624 9.8 CRITICAL 1 Writeup EPSS 0.00
TorrentPier - Code Injection
TorrentPier is an open source BitTorrent Public/Private tracker engine, written in php. In `torrentpier/library/includes/functions.php`, `get_tracks()` uses the unsafe native PHP serialization format to deserialize user-controlled cookies. One can use phpggc and the chain Guzzle/FW1 to write PHP code to an arbitrary file, and execute commands on the system. For instance, the cookie bb_t will be deserialized when browsing to viewforum.php. This issue has been addressed in commit `ed37e6e52` which is expected to be included in release version 2.4.4. Users are advised to upgrade as soon as the new release is available. There are no known workarounds for this vulnerability.
CWE-502 Jul 15, 2024
CVE-2023-49566 8.8 HIGH EPSS 0.01
Apache Linkis < 1.6.0 - Insecure Deserialization
In Apache Linkis <=1.5.0, due to the lack of effective filtering of parameters, an attacker configuring malicious db2 parameters in the DataSource Manager Module will result in jndi injection. Therefore, the parameters in the DB2 URL should be blacklisted.  This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis <=1.5.0 will be affected. We recommend users upgrade the version of Linkis to version 1.6.0.
CWE-502 Jul 15, 2024
CVE-2023-46801 8.8 HIGH EPSS 0.04
Apache Linkis <=1.5.0 - Authenticated RCE
In Apache Linkis <= 1.5.0, data source management module, when adding Mysql data source, exists remote code execution vulnerability for java version < 1.8.0_241. The deserialization vulnerability exploited through jrmp can inject malicious files into the server and execute them. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out.  We recommend that users upgrade the java version to >= 1.8.0_241. Or users upgrade Linkis to version 1.6.0.
CWE-502 Jul 15, 2024
CVE-2024-6645 6.3 MEDIUM EPSS 0.00
WuKongOpenSource Wukong_nocode - Deserialization
A vulnerability was found in WuKongOpenSource Wukong_nocode up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file ExpressionUtil.java of the component AviatorScript Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-271051.
CWE-502 Jul 10, 2024
CVE-2024-6644 6.3 MEDIUM EPSS 0.00
zmops ArgusDBM <0.1.0 - Deserialization
A vulnerability was found in zmops ArgusDBM up to 0.1.0. It has been classified as critical. Affected is the function getDefaultClassLoader of the file CalculateAlarm.java of the component AviatorScript Handler. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-271050 is the identifier assigned to this vulnerability.
CWE-502 Jul 10, 2024
CVE-2024-31317 7.8 HIGH 13 PoCs Analysis EPSS 0.07
Google Android - Insecure Deserialization
In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
CWE-502 Jul 09, 2024
CVE-2024-38094 7.2 HIGH KEV RANSOMWARE EPSS 0.64
Microsoft SharePoint - RCE
Microsoft SharePoint Remote Code Execution Vulnerability
CWE-502 Jul 09, 2024