CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,283 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,930 Nuclei templates 37,826 vendors 42,577 researchers
2,435 results Clear all
CVE-2024-28213 9.8 CRITICAL EPSS 0.07
Naver Ngrinder < 3.5.9 - Insecure Deserialization
nGrinder before 3.5.9 allows to accept serialized Java objects from unauthenticated users, which could allow remote attacker to execute arbitrary code via unsafe Java objects deserialization.
CWE-502 Mar 07, 2024
CVE-2024-28212 9.8 CRITICAL EPSS 0.07
Naver Ngrinder < 3.5.9 - Insecure Deserialization
nGrinder before 3.5.9 uses old version of SnakeYAML, which could allow remote attacker to execute arbitrary code via unsafe deserialization.
CWE-502 Mar 07, 2024
CVE-2024-28211 9.8 CRITICAL EPSS 0.02
Naver Ngrinder < 3.5.9 - Insecure Deserialization
nGrinder before 3.5.9 allows connection to malicious JMX/RMI server by default, which could be the cause of executing arbitrary code via RMI registry by remote attacker.
CWE-502 Mar 07, 2024
CVE-2024-26580 9.1 CRITICAL EPSS 0.00
Apache Inlong < 1.11.0 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.8.0 through 1.10.0, the attackers can use the specific payload to read from an arbitrary file. Users are advised to upgrade to Apache InLong's 1.11.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/9673
CWE-502 Mar 06, 2024
CVE-2024-1731 8.8 HIGH EPSS 0.01
Rymera Auto Refresh Single Page < 1.1 - Insecure Deserialization
The Auto Refresh Single Page plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1 via deserialization of untrusted input from the arsp_options post meta option. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Mar 05, 2024
CVE-2024-0825 8.8 HIGH EPSS 0.01
Davekiss Vimeography < 2.3.3 - Insecure Deserialization
The Vimeography: Vimeo Video Gallery WordPress Plugin plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.3.2 via deserialization of untrusted input via the vimeography_duplicate_gallery_serialized in the duplicate_gallery function. This makes it possible for authenticated attackers attackers, with contributor access or higher, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Mar 05, 2024
CVE-2024-24302 9.8 CRITICAL 1 Writeup EPSS 0.02
Prestalife Product Designer < 1.178.36 - Insecure Deserialization
An issue was discovered in Tunis Soft "Product Designer" (productdesigner) module for PrestaShop before version 1.178.36, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the postProcess() method.
CWE-502 Mar 03, 2024
CVE-2024-0692 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.78
SolarWinds Security Event Manager - RCE
The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
CWE-502 Mar 01, 2024
CVE-2024-1859 8.8 HIGH EPSS 0.01
Awplife Slider Responsive Slideshow < 1.4.0 - Insecure Deserialization
The Slider Responsive Slideshow – Image slider, Gallery slideshow plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.8 via deserialization of untrusted input to the awl_slider_responsive_shortcode function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Mar 01, 2024
CVE-2024-22871 7.5 HIGH EPSS 0.01
Clojure <1.13 - DoS
An issue in Clojure versions 1.20 to 1.12.0-alpha5 allows an attacker to cause a denial of service (DoS) via the clojure.core$partial$fn__5920 function.
CWE-502 Feb 29, 2024
CVE-2024-23328 9.1 CRITICAL 1 Writeup EPSS 0.01
Dataease < 1.18.15 - Insecure Deserialization
Dataease is an open source data visualization analysis tool. A deserialization vulnerability exists in the DataEase datasource, which can be exploited to execute arbitrary code. The location of the vulnerability code is `core/core-backend/src/main/java/io/dataease/datasource/type/Mysql.java.` The blacklist of mysql jdbc attacks can be bypassed and attackers can further exploit it for deserialized execution or reading arbitrary files. This vulnerability is patched in 1.18.15 and 2.3.0.
CWE-502 Feb 29, 2024
CVE-2024-23052 9.8 CRITICAL 1 Writeup EPSS 0.78
WuKongOpenSource WukongCRM <9.0.1 - RCE
An issue in WuKongOpenSource WukongCRM v.72crm_9.0.1_20191202 allows a remote attacker to execute arbitrary code via the parseObject() function in the fastjson component.
CWE-502 Feb 29, 2024
CVE-2023-51518 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Apache James <3.7.5, 3.8.0 - Privilege Escalation
Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation. Note that by default JMX endpoint is only bound locally. We recommend users to:  - Upgrade to a non-vulnerable Apache James version  - Run Apache James isolated from other processes (docker - dedicated virtual machine)  - If possible turn off JMX
CWE-502 Feb 27, 2024
CVE-2024-1750 5.6 MEDIUM EPSS 0.00
Temmokumvc < 2.3 - Insecure Deserialization
A vulnerability, which was classified as critical, was found in TemmokuMVC up to 2.3. Affected is the function get_img_url/img_replace in the library lib/images_get_down.php of the component Image Download Handler. The manipulation leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254532. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Feb 22, 2024
CVE-2024-1748 5.0 MEDIUM EPSS 0.00
Vanderschaar-lab Autoprognosis - Insecure Deserialization
A vulnerability classified as critical was found in van_der_Schaar LAB AutoPrognosis 0.1.21. This vulnerability affects the function load_model_from_file of the component Release Note Handler. The manipulation leads to deserialization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-254530 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Feb 22, 2024
CVE-2023-51389 9.8 CRITICAL 1 Writeup EPSS 0.01
Hertzbeat <1.4.1 - Deserialization
Hertzbeat is a real-time monitoring system. At the interface of `/define/yml`, SnakeYAML is used as a parser to parse yml content, but no security configuration is used, resulting in a YAML deserialization vulnerability. Version 1.4.1 fixes this vulnerability.
CWE-502 Feb 22, 2024
CVE-2024-25117 6.8 MEDIUM 1 Writeup EPSS 0.00
php-svg-lib <0.5.2 - RCE
php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.
CWE-502 Feb 21, 2024
CVE-2024-23114 9.8 CRITICAL EPSS 0.01
Apache Camel < 3.21.4 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in Apache Camel CassandraQL Component AggregationRepository which is vulnerable to unsafe deserialization. Under specific conditions it is possible to deserialize malicious payload.This issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0. Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1
CWE-502 Feb 20, 2024
CVE-2024-22369 7.8 HIGH 1 PoC Analysis EPSS 0.05
Apache Camel <4.4.0 - Deserialization
Deserialization of Untrusted Data vulnerability in Apache Camel SQL ComponentThis issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0. Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1
CWE-502 Feb 20, 2024
CVE-2024-1651 10.0 CRITICAL 4 PoCs Analysis EPSS 0.81
Torrentpier - Insecure Deserialization
Torrentpier version 2.4.1 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to insecure deserialization.
CWE-502 Feb 20, 2024