CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
2,435 results Clear all
CVE-2022-3334 7.2 HIGH EPSS 0.01
Easy WP SMTP <1.5.0 - Code Injection
The Easy WP SMTP WordPress plugin before 1.5.0 unserialises the content of an imported file, which could lead to PHP object injection issue when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
CWE-502 Oct 31, 2022
CVE-2022-40238 8.8 HIGH EPSS 0.02
Cert Vince < 1.50.5 - Insecure Deserialization
A Remote Code Injection vulnerability exists in CERT software prior to version 1.50.5. An authenticated attacker can inject arbitrary pickle object as part of a user's profile. This can lead to code execution on the server when the user's profile is accessed.
CWE-502 Oct 26, 2022
CVE-2022-39944 8.8 HIGH EPSS 0.02
Apache Linkis < 1.2.0 - Insecure Deserialization
In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.2.0 will be affected, We recommend users to update to 1.3.0.
CWE-502 Oct 26, 2022
CVE-2022-3335 7.2 HIGH EPSS 0.01
Kadence WooCommerce Email Designer <1.5.7 - Code Injection
The Kadence WooCommerce Email Designer WordPress plugin before 1.5.7 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
CWE-502 Oct 25, 2022
CVE-2022-39312 9.8 CRITICAL 1 Writeup EPSS 0.01
Dataease < 1.15.2 - Insecure Deserialization
Dataease is an open source data visualization analysis tool. Dataease prior to 1.15.2 has a deserialization vulnerability. In Dataease, the Mysql data source in the data source function can customize the JDBC connection parameters and the Mysql server target to be connected. In `backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java`, the `MysqlConfiguration` class does not filter any parameters. If an attacker adds some parameters to a JDBC url and connects to a malicious mysql server, the attacker can trigger the mysql jdbc deserialization vulnerability. Through the deserialization vulnerability, the attacker can execute system commands and obtain server privileges. Version 1.15.2 contains a patch for this issue.
CWE-502 Oct 25, 2022
CVE-2022-38108 7.2 HIGH 1 PoC Analysis EPSS 0.87
SolarWinds Platform - Code Injection
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
CWE-502 Oct 20, 2022
CVE-2022-36958 8.8 HIGH EPSS 0.15
Solarwinds Orion Platform < 2020.2.6 - Insecure Deserialization
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands.
CWE-502 Oct 20, 2022
CVE-2022-36957 7.2 HIGH EPSS 0.02
Solarwinds Orion Platform < 2020.2.6 - Insecure Deserialization
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
CWE-502 Oct 20, 2022
CVE-2022-43019 9.8 CRITICAL 1 Writeup EPSS 0.16
Opencats - Insecure Deserialization
OpenCATS v0.9.6 was discovered to contain a remote code execution (RCE) vulnerability via the getDataGridPager's ajax functionality.
CWE-502 Oct 19, 2022
CVE-2022-23734 8.8 HIGH EPSS 0.05
Github Enterprise Server < 3.2.16 - Insecure Deserialization
A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side request forgery (SSRF) that would let an attacker control the data being deserialized. This vulnerability affected all versions of GitHub Enterprise Server prior to v3.6 and was fixed in versions 3.5.3, 3.4.6, 3.3.11, and 3.2.16. This vulnerability was reported via the GitHub Bug Bounty program.
CWE-502 Oct 19, 2022
CVE-2022-39198 9.8 CRITICAL EPSS 0.10
Apache Dubbo < 2.7.17 - Insecure Deserialization
A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 and prior versions; Apache Dubbo 3.1.x version 3.1.0 and prior versions.
CWE-502 Oct 18, 2022
CVE-2022-40889 9.8 CRITICAL EPSS 0.00
Phpok 6.1 - Deserialization
Phpok 6.1 has a deserialization vulnerability via framework/phpok_call.php.
CWE-502 Oct 18, 2022
CVE-2022-22241 8.1 HIGH EPSS 0.04
Juniper Junos < 19.1 - Insecure Deserialization
An Improper Input Validation vulnerability in the J-Web component of Juniper Networks Junos OS may allow an unauthenticated attacker to access data without proper authorization. Utilizing a crafted POST request, deserialization may occur which could lead to unauthorized local file access or the ability to execute arbitrary commands. This issue affects Juniper Networks Junos OS: all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S7, 19.4R3-S9; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2.
CWE-502 Oct 18, 2022
CVE-2022-3291 6.5 MEDIUM EPSS 0.00
GitLab EE <15.2.5-15.4.1 - Info Disclosure
Serialization of sensitive data in GitLab EE affecting all versions from 14.9 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 can leak sensitive information via cache
CWE-502 Oct 17, 2022
CVE-2022-39311 9.1 CRITICAL 1 Writeup EPSS 0.09
Thoughtworks Gocd < 21.1.0 - Insecure Deserialization
GoCD is a continuous delivery server. GoCD helps you automate and streamline the build-test-release cycle for continuous delivery of your product. GoCD versions prior to 21.1.0 are vulnerable to remote code execution on the server from a malicious or compromised agent. The Spring RemoteInvocation endpoint exposed agent communication and allowed deserialization of arbitrary java objects, as well as subsequent remote code execution. Exploitation requires agent-level authentication, thus an attacker would need to either compromise an existing agent, its network communication or register a new agent to practically exploit this vulnerability. This issue is fixed in GoCD version 21.1.0. There are currently no known workarounds.
CWE-502 Oct 14, 2022
CVE-2022-39298 7.7 HIGH 1 Writeup EPSS 0.01
Melistechnology Meliscms < 5.0.1 - Insecure Deserialization
MelisFront is the engine that displays website hosted on Melis Platform. It deals with showing pages, plugins, URL rewritting, search optimization and SEO, etc. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-front`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-front` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data.
CWE-502 Oct 12, 2022
CVE-2022-39297 7.7 HIGH 1 Writeup EPSS 0.01
Melistechnology Meliscms < 5.0.1 - Insecure Deserialization
MelisCms provides a full CMS for Melis Platform, including templating system, drag'n'drop of plugins, SEO and many administration tools. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-cms`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-cms` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data.
CWE-502 Oct 12, 2022
CVE-2018-18447 9.8 CRITICAL EPSS 0.02
Dotpdn Paint.net < 4.1.2 - Insecure Deserialization
dotPDN Paint.NET before 4.1.2 allows Deserialization of Untrusted Data (issue 2 of 2).
CWE-502 Oct 12, 2022
CVE-2018-18446 9.8 CRITICAL EPSS 0.01
Dotpdn Paint.net < 4.1.2 - Insecure Deserialization
dotPDN Paint.NET before 4.1.2 allows Deserialization of Untrusted Data (issue 1 of 2).
CWE-502 Oct 12, 2022
CVE-2022-31680 9.1 CRITICAL EPSS 0.05
Vmware Vcenter Server < 6.5 - Insecure Deserialization
The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.
CWE-502 Oct 07, 2022