CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
2,435 results Clear all
CVE-2022-26472 7.8 HIGH EPSS 0.00
ims - Privilege Escalation
In ims, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319095; Issue ID: ALPS07319095.
CWE-502 Oct 07, 2022
CVE-2022-26471 7.8 HIGH EPSS 0.00
Telephony - Privilege Escalation
In telephony, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319121; Issue ID: ALPS07319121.
CWE-502 Oct 07, 2022
CVE-2022-41082 8.0 HIGH KEV RANSOMWARE 12 PoCs Analysis EPSS 0.92
Microsoft Exchange Server - RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-502 Oct 03, 2022
CVE-2022-42004 7.5 HIGH 1 Writeup EPSS 0.00
Fasterxml Jackson-databind < 2.12.7.1 - Insecure Deserialization
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
CWE-502 Oct 02, 2022
CVE-2022-42003 7.5 HIGH 1 Writeup EPSS 0.00
Fasterxml Jackson-databind < 2.12.7.1 - Insecure Deserialization
In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
CWE-502 Oct 02, 2022
CVE-2022-40314 9.8 CRITICAL EPSS 0.07
Moodle < 3.9.17 - Insecure Deserialization
A remote code execution risk when restoring backup files originating from Moodle 1.9 was identified.
CWE-502 Sep 30, 2022
CVE-2022-39256 9.0 CRITICAL EPSS 0.02
Orckestra C1 Cms < 6.13 - Insecure Deserialization
Orckestra C1 CMS is a .NET based Web Content Management System. A vulnerability in versions prior to 6.13 allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS. Authentication is required to exploit this vulnerability. The authenticated user may perform the actions unknowingly by visiting a specially crafted site. This issue is patched in C1 CMS v6.13. There are no known workarounds.
CWE-502 Sep 27, 2022
CVE-2022-2903 7.2 HIGH EPSS 0.01
Ninjaforms Ninja Forms < 3.6.13 - Insecure Deserialization
The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
CWE-502 Sep 26, 2022
CVE-2022-36944 9.8 CRITICAL 1 PoC Analysis EPSS 0.70
Scala < 2.13.9 - Insecure Deserialization
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
CWE-502 Sep 23, 2022
CVE-2022-41237 9.8 CRITICAL EPSS 0.01
Jenkins DotCi Plugin <2.40.00 - RCE
Jenkins DotCi Plugin 2.40.00 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CWE-502 Sep 21, 2022
CVE-2022-40955 8.8 HIGH EPSS 0.04
Apache InLong <1.3.0 - Deserialization
In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer.
CWE-502 Sep 20, 2022
CVE-2022-39008 9.1 CRITICAL EPSS 0.00
NFC Module - Deserialization
The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps.
CWE-502 Sep 16, 2022
CVE-2022-38352 9.8 CRITICAL EPSS 0.04
ThinkPHP v6.0.13 - Deserialization
ThinkPHP v6.0.13 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\Psr6Cache. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
CWE-502 Sep 15, 2022
CVE-2022-36038 8.8 HIGH 1 Writeup EPSS 0.01
CircuitVerse - RCE
CircuitVerse is an open-source platform which allows users to construct digital logic circuits online. A remote code execution (RCE) vulnerability in CircuitVerse allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This issue may lead to Remote Code Execution (RCE). A patch is available in commit number 7b3023a99499a7675f10f2c1d9effdf10c35fb6e. There are currently no known workarounds.
CWE-502 Sep 06, 2022
CVE-2022-2442 7.2 HIGH EPSS 0.03
Wpvivid Migration, Backup, Staging < 0.9.74 - Insecure Deserialization
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to deserialization of untrusted input via the 'path' parameter in versions up to, and including 0.9.74. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
CWE-502 Sep 06, 2022
CVE-2022-2438 7.2 HIGH EPSS 0.01
Managewp Broken Link Checker < 1.11.17 - Insecure Deserialization
The Broken Link Checker plugin for WordPress is vulnerable to deserialization of untrusted input via the '$log_file' value in versions up to, and including 1.11.16. This makes it possible for authenticated attackers with administrative privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
CWE-502 Sep 06, 2022
CVE-2022-2436 8.8 HIGH EPSS 0.01
W3eden Download Manager < 3.2.50 - Insecure Deserialization
The Download Manager plugin for WordPress is vulnerable to deserialization of untrusted input via the 'file[package_dir]' parameter in versions up to, and including 3.2.49. This makes it possible for authenticated attackers with contributor privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
CWE-502 Sep 06, 2022
CVE-2022-2434 8.8 HIGH EPSS 0.04
Instawp String Locator < 2.5.0 - Insecure Deserialization
The String Locator plugin for WordPress is vulnerable to deserialization of untrusted input via the 'string-locator-path' parameter in versions up to, and including 2.5.0. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
CWE-502 Sep 06, 2022
CVE-2022-2433 7.5 HIGH 1 Writeup EPSS 0.04
Connekthq Ajax Load More < 5.5.4 - Insecure Deserialization
The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to deserialization of untrusted input via the 'alm_repeaters_export' parameter in versions up to, and including 5.5.3. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
CWE-502 Sep 06, 2022
CVE-2022-2830 8.8 HIGH EPSS 0.02
Bitdefender GravityZone <6.29.2-1, <6.27.2-2 - Deserialization
Deserialization of Untrusted Data vulnerability in the message processing component of Bitdefender GravityZone Console allows an attacker to pass unsafe commands to the environment. This issue affects: Bitdefender GravityZone Console On-Premise versions prior to 6.29.2-1. Bitdefender GravityZone Cloud Console versions prior to 6.27.2-2.
CWE-502 Sep 05, 2022