CVE & Exploit Intelligence Database

Updated 53m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,283 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,930 Nuclei templates 37,826 vendors 42,577 researchers
2,435 results Clear all
CVE-2023-1967 9.8 CRITICAL EPSS 0.00
Keysight N8844A - Deserialization
Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid.
CWE-502 Apr 27, 2023
CVE-2023-20853 9.8 CRITICAL EPSS 0.01
Aenrich A+hrd - Insecure Deserialization
aEnrich Technology a+HRD has a vulnerability of Deserialization of Untrusted Data within its MSMQ asynchronized message process. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands to perform arbitrary system operation or disrupt service.
CWE-502 Apr 27, 2023
CVE-2023-20852 9.8 CRITICAL EPSS 0.01
Aenrich A+hrd - Insecure Deserialization
aEnrich Technology a+HRD has a vulnerability of Deserialization of Untrusted Data within its MSMQ interpreter. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands to perform arbitrary system operation or disrupt service.
CWE-502 Apr 27, 2023
CVE-2023-2141 8.5 HIGH EPSS 0.05
DELMIA Apriso <2022 - Code Injection
An unsafe .NET object deserialization in DELMIA Apriso Release 2017 through Release 2022 could lead to post-authentication remote code execution.
CWE-502 Apr 21, 2023
CVE-2023-20864 9.8 CRITICAL NUCLEI EPSS 0.93
Vmware Aria Operations For Logs < 8.12.0 - Insecure Deserialization
VMware Aria Operations for Logs contains a deserialization vulnerability. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root.
CWE-502 Apr 20, 2023
CVE-2021-28254 9.8 CRITICAL EPSS 0.00
Laravel <8.5.9 - Code Injection
A deserialization vulnerability in the destruct() function of Laravel v8.5.9 allows attackers to execute arbitrary commands.
CWE-502 Apr 19, 2023
CVE-2023-2042 6.3 MEDIUM EPSS 0.00
Datagear < 4.5.1 - Insecure Deserialization
A vulnerability, which was classified as problematic, has been found in DataGear up to 4.7.0/5.1.0. Affected by this issue is some unknown functionality of the component JDBC Server Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Apr 14, 2023
CVE-2023-1552 6.4 MEDIUM EPSS 0.00
ToolboxST <7.10 - Deserialization
ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors.  Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user. 
CWE-502 Apr 11, 2023
CVE-2023-1381 8.8 HIGH EPSS 0.06
Joomunited WP Meta Seo < 4.5.5 - Insecure Deserialization
The WP Meta SEO WordPress plugin before 4.5.5 does not validate image file paths before attempting to manipulate the image files, leading to a PHAR deserialization vulnerability. Furthermore, the plugin contains a gadget chain which may be used in certain configurations to achieve remote code execution.
CWE-502 Apr 10, 2023
CVE-2023-29216 9.8 CRITICAL EPSS 0.05
Apache Linkis <=1.3.1 - Deserialization
In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker uses the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.
CWE-502 Apr 10, 2023
CVE-2023-29215 9.8 CRITICAL EPSS 0.05
Apache Linkis <=1.3.1 - Code Injection
In Apache Linkis <=1.3.1, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in JDBC EengineConn Module will trigger a deserialization vulnerability and eventually lead to remote code execution. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.
CWE-502 Apr 10, 2023
CVE-2023-28500 9.8 CRITICAL EPSS 0.12
Adobe LiveCycle ES4 <11.0 - Code Injection
A Java insecure deserialization vulnerability in Adobe LiveCycle ES4 version 11.0 and earlier allows unauthenticated remote attackers to gain operating system code execution by submitting specially crafted Java serialized objects to a specific URL. Adobe LiveCycle ES4 version 11.0.1 and later may be vulnerable if the application is installed with Java environment 7u21 and earlier. Exploitation of the vulnerability depends on two factors: insecure deserialization methods used in the Adobe LiveCycle application, and the use of Java environments 7u21 and earlier. The code execution is performed in the context of the account that is running the Adobe LiveCycle application. If the account is privileged, exploitation provides privileged access to the operating system. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-502 Apr 06, 2023
CVE-2023-20102 8.8 HIGH EPSS 0.02
Cisco Secure Network Analytics - RCE
A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to insufficient sanitization of user-provided data that is parsed into system memory. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the administrator user.
CWE-502 Apr 05, 2023
CVE-2023-29006 8.8 HIGH 1 Writeup EPSS 0.01
GLPI Order GLPI <2.7.7-2.10.1 - Command Injection
The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the `ajax/dropdownContact.php` file from the plugin.
CWE-502 Apr 05, 2023
CVE-2020-29312 9.8 CRITICAL EPSS 0.02
Zend Framework <3.1.3 - RCE
An issue found in Zend Framework v.3.1.3 and before allow a remote attacker to execute arbitrary code via the unserialize function. Note: This has been disputed by third parties as incomplete and incorrect. The framework does not have a version that surpasses 2.x.x and was deprecated in early 2020.
CWE-502 Apr 04, 2023
CVE-2023-28462 9.8 CRITICAL EPSS 0.02
Payara Server <5.20.0 - RCE
A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
CWE-502 Mar 30, 2023
CVE-2022-36978 9.8 CRITICAL EPSS 0.13
Ivanti Avalanche < 6.3.4 - Insecure Deserialization
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Notification Server service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15448.
CWE-502 Mar 29, 2023
CVE-2022-36977 9.8 CRITICAL EPSS 0.04
Ivanti Avalanche < 6.3.4 - Insecure Deserialization
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Certificate Management Server service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15449.
CWE-502 Mar 29, 2023
CVE-2022-36974 9.8 CRITICAL EPSS 0.08
Ivanti Avalanche < 6.3.4 - Insecure Deserialization
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Web File Server service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15330.
CWE-502 Mar 29, 2023
CVE-2022-36971 8.8 HIGH EPSS 0.20
Ivanti Avalanche < 6.3.4 - Insecure Deserialization
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the JwtTokenUtility class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15301.
CWE-502 Mar 29, 2023