CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
2,435 results Clear all
CVE-2022-38652 9.9 CRITICAL EPSS 0.01
VMWare Hyperic Agent 5.8.6 - Deserialization
A remote insecure deserialization vulnerability exixsts in VMWare Hyperic Agent 5.8.6. Exploitation of this vulnerability enables a malicious authenticated user to run arbitrary code or malware within a Hyperic Agent instance and its host operating system with the privileges of the Hyperic Agent process (often SYSTEM on Windows platforms). NOTE: prior exploitation of CVE-2022-38650 results in the disclosure of the authentication material required to exploit this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-502 Nov 12, 2022
CVE-2022-38650 10.0 CRITICAL EPSS 0.01
VMware Hyperic Server <5.8.6 - Open Redirect
A remote unauthenticated insecure deserialization vulnerability exists in VMware Hyperic Server 5.8.6. Exploitation of this vulnerability enables a malicious party to run arbitrary code or malware within Hyperic Server and the host operating system with the privileges of the Hyperic server process. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-502 Nov 12, 2022
CVE-2022-44562 9.8 CRITICAL EPSS 0.01
Huawei Emui - Insecure Deserialization
The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation.
CWE-502 Nov 09, 2022
CVE-2022-44559 9.8 CRITICAL EPSS 0.01
Huawei Harmonyos - Insecure Deserialization
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation.
CWE-502 Nov 09, 2022
CVE-2022-44558 9.8 CRITICAL EPSS 0.01
Huawei Harmonyos - Insecure Deserialization
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation.
CWE-502 Nov 09, 2022
CVE-2022-41203 8.8 HIGH EPSS 0.01
SAP BusinessObjects BI Platform - Deserialization
In some workflow of SAP BusinessObjects BI Platform (Central Management Console and BI LaunchPad), an authenticated attacker with low privileges can intercept a serialized object in the parameters and substitute with another malicious serialized object, which leads to deserialization of untrusted data vulnerability. This could highly compromise the Confidentiality, Integrity, and Availability of the system.
CWE-502 Nov 08, 2022
CVE-2022-32601 7.8 HIGH EPSS 0.00
Google Android - Insecure Deserialization
In telephony, there is a possible permission bypass due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319132; Issue ID: ALPS07319132.
CWE-502 Nov 08, 2022
CVE-2022-31199 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis EPSS 0.06
Netwrix Auditor - RCE
Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
CWE-502 Nov 08, 2022
CVE-2022-3536 8.8 HIGH EPSS 0.00
WooCommerce WordPress <1.6.3 - Code Injection
The Role Based Pricing for WooCommerce WordPress plugin before 1.6.3 does not have authorisation and proper CSRF checks, as well as does not validate path given via user input, allowing any authenticated users like subscriber to perform PHAR deserialization attacks when they can upload a file, and a suitable gadget chain is present on the blog
CWE-502 Nov 07, 2022
CVE-2022-42919 7.8 HIGH EPSS 0.00
Python < 3.7.15 - Insecure Deserialization
Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.
CWE-502 Nov 07, 2022
CVE-2022-43567 8.8 HIGH EPSS 0.01
Splunk Enterprise <8.2.9-9.0.2 - Command Injection
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.
CWE-502 Nov 04, 2022
CVE-2022-39379 3.1 LOW 1 Writeup EPSS 0.05
Fluentd < 1.15.3 - Insecure Deserialization
Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.
CWE-502 Nov 02, 2022
CVE-2022-44542 9.8 CRITICAL EPSS 0.01
Lesspipe < 2.06 - Insecure Deserialization
lesspipe before 2.06 allows attackers to execute code via Perl Storable (pst) files, because of deserialized object destructor execution via a key/value pair in a hash.
CWE-502 Nov 01, 2022
CVE-2022-41779 8.8 HIGH EPSS 0.00
Delta Electronics InfraSuite Device Master <00.00.01a - Deserializa...
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize network packets without proper verification. If the device connects to an attacker-controlled server, the attacker could send maliciously crafted packets that would be deserialized and executed, leading to remote code execution.
CWE-502 Oct 31, 2022
CVE-2022-38142 9.8 CRITICAL EPSS 0.01
Delta Electronics InfraSuite Device Master <0.00.01a - Deserialization
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-Gateway service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon deserialization.
CWE-502 Oct 31, 2022
CVE-2022-3380 7.2 HIGH EPSS 0.01
WordPress Customizer Export/Import <0.9.5 - Code Injection
The Customizer Export/Import WordPress plugin before 0.9.5 unserializes the content of an imported file, which could lead to PHP object injection issues when an admin imports (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
CWE-502 Oct 31, 2022
CVE-2022-3374 7.2 HIGH EPSS 0.01
Ocean Extra WordPress <2.0.5 - Code Injection
The Ocean Extra WordPress plugin before 2.0.5 unserialises the content of an imported file, which could lead to PHP object injections issues when a high privilege user import (intentionally or not) a malicious Customizer Styling file and a suitable gadget chain is present on the blog.
CWE-502 Oct 31, 2022
CVE-2022-3366 7.2 HIGH EPSS 0.01
PublishPress Capabilities <2.5.2 - Code Injection
The PublishPress Capabilities WordPress plugin before 2.5.2, PublishPress Capabilities Pro WordPress plugin before 2.5.2 unserializes the content of imported files, which could lead to PHP object injection attacks by administrators, on multisite WordPress configurations. Successful exploitation in this case requires other plugins with a suitable gadget chain to be present on the site.
CWE-502 Oct 31, 2022
CVE-2022-3360 8.1 HIGH EPSS 0.15
LearnPress WordPress <4.1.7.2 - RCE
The LearnPress WordPress plugin before 4.1.7.2 unserialises user input in a REST API endpoint available to unauthenticated users, which could lead to PHP Object Injection when a suitable gadget is present, leadint to remote code execution (RCE). To successfully exploit this vulnerability attackers must have knowledge of the site secrets, allowing them to generate a valid hash via the wp_hash() function.
CWE-502 Oct 31, 2022
CVE-2022-3357 8.8 HIGH 1 PoC Analysis EPSS 0.27
Smart Slider 3 WordPress <3.5.1.11 - Code Injection
The Smart Slider 3 WordPress plugin before 3.5.1.11 unserialises the content of an imported file, which could lead to PHP object injection issues when a user import (intentionally or not) a malicious file, and a suitable gadget chain is present on the site.
CWE-502 Oct 31, 2022