CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,283 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,930 Nuclei templates 37,826 vendors 42,577 researchers
2,435 results Clear all
CVE-2023-35669 7.8 HIGH EPSS 0.00
Google Android - Insecure Deserialization
In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to control other running activities due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-502 Sep 11, 2023
CVE-2022-1415 8.1 HIGH EPSS 0.01
Redhat Decision Manager < 7.69.0.Final - Insecure Deserialization
A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
CWE-502 Sep 11, 2023
CVE-2020-19559 9.8 CRITICAL EPSS 0.01
Dieboldnixdorf Agilis Xfs For Opteva - Insecure Deserialization
An issue in Diebold Aglis XFS for Opteva v.4.1.61.1 allows a remote attacker to execute arbitrary code via a crafted payload to the ResolveMethod() parameter.
CWE-502 Sep 11, 2023
CVE-2023-4528 7.2 HIGH EPSS 0.26
JSCAPE MFT Server <2023.1.9 - Code Injection
Unsafe deserialization in JSCAPE MFT Server versions prior to 2023.1.9 (Windows, Linux, and MacOS) permits an attacker to run arbitrary Java code (including OS commands) via its management interface
CWE-502 Sep 07, 2023
CVE-2023-41330 9.8 CRITICAL 1 Writeup EPSS 0.02
knplabs/knp-snappy - RCE
knplabs/knp-snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. ## Issue On March 17th the vulnerability CVE-2023-28115 was disclosed, allowing an attacker to gain remote code execution through PHAR deserialization. Version 1.4.2 added a check `if (\strpos($filename, 'phar://') === 0)` in the `prepareOutput` function to resolve this CVE, however if the user is able to control the second parameter of the `generateFromHtml()` function of Snappy, it will then be passed as the `$filename` parameter in the `prepareOutput()` function. In the original vulnerability, a file name with a `phar://` wrapper could be sent to the `fileExists()` function, equivalent to the `file_exists()` PHP function. This allowed users to trigger a deserialization on arbitrary PHAR files. To fix this issue, the string is now passed to the `strpos()` function and if it starts with `phar://`, an exception is raised. However, PHP wrappers being case insensitive, this patch can be bypassed using `PHAR://` instead of `phar://`. A successful exploitation of this vulnerability allows executing arbitrary code and accessing the underlying filesystem. The attacker must be able to upload a file and the server must be running a PHP version prior to 8. This issue has been addressed in commit `d3b742d61a` which has been included in version 1.4.3. Users are advised to upgrade. Users unable to upgrade should ensure that only trusted users may submit data to the `AbstractGenerator->generate(...)` function.
CWE-502 Sep 06, 2023
CVE-2023-0925 9.8 CRITICAL EPSS 0.00
Softwareag Webmethods - Insecure Deserialization
Version 10.11 of webMethods OneData runs an embedded instance of Azul Zulu Java 11.0.15 which hosts a Java RMI registry (listening on TCP port 2099 by default) and two RMI interfaces (listening on a single, dynamically assigned TCP high port). Port 2099 serves as a Java Remote Method Invocation (RMI) registry which allows for remotely loading and processing data via RMI interfaces. An unauthenticated attacker with network connectivity to the RMI registry and RMI interface ports can abuse this functionality to instruct the webMethods OneData application to load a malicious serialized Java object as a parameter to one of the available Java methods presented by the RMI interface. Once deserialized on the vulnerable server, the malicious code runs as whichever operating system account is used to run the software, which in most cases is the local System account on Windows.
CWE-502 Sep 06, 2023
CVE-2023-37941 6.6 MEDIUM EXPLOITED 1 PoC Analysis EPSS 0.84
Apache Superset < 2.1.0 - Insecure Deserialization
If an attacker gains write access to the Apache Superset metadata database, they could persist a specifically crafted Python object that may lead to remote code execution on Superset's web backend. The Superset metadata db is an 'internal' component that is typically only accessible directly by the system administrator and the superset process itself. Gaining access to that database should be difficult and require significant privileges. This vulnerability impacts Apache Superset versions 1.5.0 up to and including 2.1.0. Users are recommended to upgrade to version 2.1.1 or later.
CWE-502 Sep 06, 2023
CVE-2023-30534 4.3 MEDIUM NUCLEI EPSS 0.49
Cacti < 1.2.25 - Insecure Deserialization
Cacti is an open source operational monitoring and fault management framework. There are two instances of insecure deserialization in Cacti version 1.2.24. While a viable gadget chain exists in Cacti’s vendor directory (phpseclib), the necessary gadgets are not included, making them inaccessible and the insecure deserializations not exploitable. Each instance of insecure deserialization is due to using the unserialize function without sanitizing the user input. Cacti has a “safe” deserialization that attempts to sanitize the content and check for specific values before calling unserialize, but it isn’t used in these instances. The vulnerable code lies in graphs_new.php, specifically within the host_new_graphs_save function. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-502 Sep 05, 2023
CVE-2023-28072 7.8 HIGH EPSS 0.00
Dell Alienware Command Center < 5.5.51.0 - Insecure Deserialization
Dell Alienware Command Center, versions prior to 5.5.51.0, contain a deserialization of untrusted data vulnerability. A local malicious user could potentially send specially crafted requests to the .NET Remoting server to run arbitrary code on the system.
CWE-502 Sep 04, 2023
CVE-2023-40595 8.8 HIGH EPSS 0.01
Splunk Enterprise <8.2.12, 9.0.6, 9.1.1 - Code Injection
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can execute a specially crafted query that they can then use to serialize untrusted data. The attacker can use the query to execute arbitrary code.
CWE-502 Aug 30, 2023
CVE-2023-40195 8.8 HIGH EPSS 0.02
Apache Airflow Spark Provider < 4.1.3 - Insecure Deserialization
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider. When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users. To view the warning in the docs please visit  https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html
CWE-502 Aug 28, 2023
CVE-2023-40571 9.8 CRITICAL EPSS 0.02
weblogic- framework <0.2.3 - Deserialization
weblogic-framework is a tool for detecting weblogic vulnerabilities. Versions 0.2.3 and prior do not verify the returned data packets, and there is a deserialization vulnerability which may lead to remote code execution. When weblogic-framework gets the command echo, it directly deserializes the data returned by the server without verifying it. At the same time, the classloader loads a lot of deserialization calls. In this case, the malicious serialized data returned by the server will cause remote code execution. Version 0.2.4 contains a patch for this issue.
CWE-502 Aug 25, 2023
CVE-2023-24621 7.8 HIGH 1 Writeup EPSS 0.00
Esoteric YamlBeans <1.15 - Deserialization
An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
CWE-502 Aug 25, 2023
CVE-2023-34040 5.3 MEDIUM 5 PoCs Analysis EPSS 0.27
Spring for Apache Kafka <3.0.9 & <2.9.10 - Deserialization
In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers. Specifically, an application is vulnerable when all of the following are true: * The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true. * The user allows untrusted sources to publish to a Kafka topic By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.
CWE-502 Aug 24, 2023
CVE-2023-39106 8.8 HIGH EPSS 0.02
Nacos Group Nacos Spring Project <1.1.1 - RCE
An issue in Nacos Group Nacos Spring Project v.1.1.1 and before allows a remote attacker to execute arbitrary code via the SnakeYamls Constructor() component.
CWE-502 Aug 21, 2023
CVE-2023-3259 9.8 CRITICAL EPSS 0.00
Dataprobe Iboot-pdu4a-c10 Firmware - Insecure Deserialization
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information
CWE-502 Aug 14, 2023
CVE-2023-39396 7.5 HIGH EPSS 0.00
Huawei Emui - Insecure Deserialization
Deserialization vulnerability in the input module. Successful exploitation of this vulnerability may affect availability.
CWE-502 Aug 13, 2023
CVE-2023-38182 8.0 HIGH EPSS 0.01
Microsoft Exchange Server - RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502 Aug 08, 2023
CVE-2023-38181 8.8 HIGH EPSS 0.23
Microsoft Exchange Server - SSRF
Microsoft Exchange Server Spoofing Vulnerability
CWE-502 Aug 08, 2023
CVE-2023-35388 8.0 HIGH EPSS 0.00
Microsoft Exchange Server - Insecure Deserialization
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502 Aug 08, 2023