CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,283 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,930 Nuclei templates 37,826 vendors 42,577 researchers
2,435 results Clear all
CVE-2024-30223 9.0 CRITICAL EPSS 0.01
Repute Infosystems ARMember <4.0.26 - Deserialization
Deserialization of Untrusted Data vulnerability in Repute Infosystems ARMember.This issue affects ARMember: from n/a through 4.0.26.
CWE-502 Mar 28, 2024
CVE-2024-30222 8.5 HIGH EPSS 0.01
Repute Infosystems ARMember <4.0.26 - Deserialization
Deserialization of Untrusted Data vulnerability in Repute Infosystems ARMember.This issue affects ARMember: from n/a through 4.0.26.
CWE-502 Mar 28, 2024
CVE-2024-24842 8.7 HIGH EPSS 0.00
Echo Plugins KB - Deserialization
Deserialization of Untrusted Data vulnerability in Echo Plugins Knowledge Base for Documentation, FAQs with AI Assistance.This issue affects Knowledge Base for Documentation, FAQs with AI Assistance: from n/a through 11.30.2.
CWE-502 Mar 27, 2024
CVE-2023-27459 7.4 HIGH EPSS 0.00
Wpeverest User Registration & Membership - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in WPEverest User Registration.This issue affects User Registration: from n/a through 2.3.2.1.
CWE-502 Mar 26, 2024
CVE-2024-24725 8.8 HIGH 3 PoCs Analysis EPSS 0.79
Gibbon <26.0.00 - Code Injection
Gibbon through 26.0.00 allows remote authenticated users to conduct PHP deserialization attacks via columnOrder in a POST request to the modules/System%20Admin/import_run.php&type=externalAssessment&step=4 URI.
CWE-502 Mar 23, 2024
CVE-2024-28861 9.8 CRITICAL 1 Writeup EPSS 0.07
Symfony1 < 1.5.9 - Insecure Deserialization
Symfony 1 is a community-driven fork of the 1.x branch of Symfony, a PHP framework for web projects. Starting in version 1.1.0 and prior to version 1.5.19, Symfony 1 has a gadget chain due to dangerous deserialization in `sfNamespacedParameterHolder` class that would enable an attacker to get remote code execution if a developer deserializes user input in their project. Version 1.5.19 contains a patch for the issue.
CWE-502 Mar 22, 2024
CVE-2024-2054 9.8 CRITICAL 3 PoCs Analysis EPSS 0.85
Articatech Artica Proxy - Insecure Deserialization
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
CWE-502 Mar 21, 2024
CVE-2024-29032 5.3 MEDIUM 1 Writeup EPSS 0.00
Qiskit Ibm Runtime < 0.21.2 - Insecure Deserialization
Qiskit IBM Runtime is an environment that streamlines quantum computations and provides optimal implementations of the Qiskit quantum computing SDK. Starting in version 0.1.0 and prior to version 0.21.2, deserializing json data using `qiskit_ibm_runtime.RuntimeDecoder` can lead to arbitrary code execution given a correctly formatted input string. Version 0.21.2 contains a fix for this issue.
CWE-502 Mar 20, 2024
CVE-2024-1856 8.5 HIGH EPSS 0.00
Progress Telerik Reporting < 18.0.24.130 - Insecure Deserialization
In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a remote threat actor through an insecure deserialization vulnerability.
CWE-502 Mar 20, 2024
CVE-2024-1801 7.7 HIGH EPSS 0.00
Progress Telerik Reporting < 18.0.24.130 - Insecure Deserialization
In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
CWE-502 Mar 20, 2024
CVE-2024-1800 9.9 CRITICAL 3 PoCs Analysis EPSS 0.76
Progress Telerik Report Server - Insecure Deserialization
In Progress® Telerik® Report Server versions prior to 2024 Q1 (10.0.24.130), a remote code execution attack is possible through an insecure deserialization vulnerability.
CWE-502 Mar 20, 2024
CVE-2024-2721 8.2 HIGH EPSS 0.00
Sygnoos Social Media Share Buttons < 2.1.0 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in Social Media Share Buttons By Sygnoos Social Media Share Buttons.This issue affects Social Media Share Buttons: from n/a through 2.1.0.
CWE-502 Mar 20, 2024
CVE-2024-29136 8.5 HIGH EXPLOITED EPSS 0.00
Themefic Tourfic < 2.11.19 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in Themefic Tourfic.This issue affects Tourfic: from n/a through 2.11.17.
CWE-502 Mar 19, 2024
CVE-2024-2229 7.8 HIGH EPSS 0.00
Product - Code Injection
CWE-502: Deserialization of Untrusted Data vulnerability exists that could cause remote code execution when a malicious project file is loaded into the application by a valid user.
CWE-502 Mar 18, 2024
CVE-2024-1685 8.8 HIGH EPSS 0.01
Sygnoos Social Media Share Buttons < 2.1.0 - Insecure Deserialization
The Social Media Share Buttons plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.1.0 via deserialization of untrusted input through the attachmentUrl parameter. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Mar 16, 2024
CVE-2024-28859 5.0 MEDIUM 1 Writeup EPSS 0.04
Symfony1 < 1.5.18 - Insecure Deserialization
Symfony1 is a community fork of symfony 1.4 with DIC, form enhancements, latest Swiftmailer, better performance, composer compatible and PHP 8 support. Symfony 1 has a gadget chain due to vulnerable Swift Mailer dependency that would enable an attacker to get remote code execution if a developer unserialize user input in his project. This vulnerability present no direct threat but is a vector that will enable remote code execution if a developper deserialize user untrusted data. Symfony 1 depends on Swift Mailer which is bundled by default in vendor directory in the default installation since 1.3.0. Swift Mailer classes implement some `__destruct()` methods. These methods are called when php destroys the object in memory. However, it is possible to include any object type in `$this->_keys` to make PHP access to another array/object properties than intended by the developer. In particular, it is possible to abuse the array access which is triggered on foreach($this->_keys ...) for any class implementing ArrayAccess interface. This may allow an attacker to execute any PHP command which leads to remote code execution. This issue has been addressed in version 1.5.18. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-502 Mar 15, 2024
CVE-2024-2006 8.8 HIGH EPSS 0.02
Wpwax Post Grid, Slider & Carousel Ultimate - Insecure Deserialization
The Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.6.7 via deserialization of untrusted input in the outpost_shortcode_metabox_markup function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Mar 13, 2024
CVE-2024-1950 7.5 HIGH EPSS 0.01
Product Carousel Slider & Grid Ultimate - Code Injection
The Product Carousel Slider & Grid Ultimate for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.9.7 via deserialization of untrusted input via shortcode. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Mar 13, 2024
CVE-2024-1772 8.8 HIGH EPSS 0.01
Hammadh Play.ht < 3.6.4 - Insecure Deserialization
The Play.ht – Make Your Blog Posts Accessible With Text to Speech Audio plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.6.4 via deserialization of untrusted input from the play_podcast_data post meta. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Mar 13, 2024
CVE-2024-0047 5.5 MEDIUM EPSS 0.00
Google Android - Insecure Deserialization
In writeUserLP of UserManagerService.java, device policies are serialized with an incorrect tag due to a logic error in the code. This could lead to local denial of service when policies are deserialized on reboot with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-502 Mar 11, 2024