CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,281 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,573 researchers
2,435 results Clear all
CVE-2022-29063 9.8 CRITICAL 1 PoC Analysis EPSS 0.15
Apache OFBiz <18.12.06 - RCE
The Solr plugin of Apache OFBiz is configured by default to automatically make a RMI request on localhost, port 1099. In version 18.12.05 and earlier, by hosting a malicious RMI server on localhost, an attacker may exploit this behavior, at server start-up or on a server restart, in order to run arbitrary code. Upgrade to at least 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12646.
CWE-502 Sep 02, 2022
CVE-2022-37023 6.5 MEDIUM EPSS 0.00
Apache Geode < 1.15.0 - Insecure Deserialization
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance.
CWE-502 Aug 31, 2022
CVE-2022-37022 8.8 HIGH EPSS 0.00
Apache Geode < 1.12.2 - Insecure Deserialization
Apache Geode versions up to 1.12.2 and 1.13.2 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 11. Any user wishing to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15. Use of 1.15 on Java 11 will automatically protect JMX over RMI against deserialization attacks. This should have no impact on performance since it only affects JMX/RMI which Gfsh uses to communicate with the JMX Manager which is hosted on a Locator.
CWE-502 Aug 31, 2022
CVE-2022-37021 9.8 CRITICAL EPSS 0.01
Apache Geode < 1.12.5 - Insecure Deserialization
Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15 and Java 11. If upgrading to Java 11 is not possible, then upgrade to Apache Geode 1.15 and specify "--J=-Dgeode.enableGlobalSerialFilter=true" when starting any Locators or Servers. Follow the documentation for details on specifying any user classes that may be serialized/deserialized with the "serializable-object-filter" configuration option. Using a global serial filter will impact performance.
CWE-502 Aug 31, 2022
CVE-2022-34668 9.8 CRITICAL 1 PoC Analysis EPSS 0.28
Nvidia Nvflare < 2.1.4 - Insecure Deserialization
NVFLARE, versions prior to 2.1.4, contains a vulnerability that deserialization of Untrusted Data due to Pickle usage may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
CWE-502 Aug 29, 2022
CVE-2022-36119 8.8 HIGH EPSS 0.07
Blue Prism Enterprise <7.01 - Code Injection
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for a domain authenticated user to send a crafted message to the Blue Prism Server and accomplish a remote code execution attack that is possible because of insecure deserialization. Exploitation of this vulnerability allows for code to be executed in the context of the Blue Prism Server service.
CWE-502 Aug 25, 2022
CVE-2022-2465 8.6 HIGH EPSS 0.00
Rockwellautomation Isagraf Workbench - Insecure Deserialization
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserialization of Untrusted Data vulnerability. ISaGRAF Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in ISaGRAF Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.
CWE-502 Aug 25, 2022
CVE-2021-25642 8.8 HIGH 1 PoC Analysis EPSS 0.03
Apache Hadoop < 2.10.2 - Insecure Deserialization
ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used.
CWE-502 Aug 25, 2022
CVE-2021-4178 6.7 MEDIUM 1 PoC Analysis EPSS 0.00
Redhat Fabric8-kubernetes < 5.0.3 - Insecure Deserialization
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
CWE-502 Aug 24, 2022
CVE-2021-4125 8.1 HIGH EPSS 0.01
Redhat Openshift < 4.6.52 - Insecure Deserialization
It was found that the original fix for log4j CVE-2021-44228 and CVE-2021-45046 in the OpenShift metering hive containers was incomplete, as not all JndiLookup.class files were removed. This CVE only applies to the OpenShift Metering hive container images, shipped in OpenShift 4.8, 4.7 and 4.6.
CWE-502 Aug 24, 2022
CVE-2022-33900 4.1 MEDIUM EPSS 0.01
PHP Object Injection - Code Injection
PHP Object Injection vulnerability in Easy Digital Downloads plugin <= 3.0.1 at WordPress.
CWE-502 Aug 22, 2022
CVE-2022-29805 9.8 CRITICAL EPSS 0.09
Fishbowl < 2022.4.1 - Insecure Deserialization
A Java Deserialization vulnerability in the Fishbowl Server in Fishbowl Inventory before 2022.4.1 allows remote attackers to execute arbitrary code via a crafted XML payload.
CWE-502 Aug 19, 2022
CVE-2022-2886 5.0 MEDIUM EPSS 0.00
Laravel 5.1 - Deserialization
A vulnerability, which was classified as critical, was found in Laravel 5.1. Affected is an unknown function. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-206688.
CWE-502 Aug 19, 2022
CVE-2022-2870 4.1 MEDIUM EPSS 0.00
Laravel 5.1 - Deserialization
A vulnerability was found in laravel 5.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206501 was assigned to this vulnerability.
CWE-502 Aug 17, 2022
CVE-2022-36006 7.9 HIGH EPSS 0.02
Arvados <2.4.1 - Authenticated RCE
Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions up to 2.4.1 and is fixed in 2.4.2. This vulnerability is specific to the Ruby on Rails Workbench application (“Workbench 1”). We do not believe any other Arvados components, including the TypesScript browser-based Workbench application (“Workbench 2”) or API Server, are vulnerable to this attack. For versions of Arvados earlier than 2.4.2: remove the Ruby-based "Workbench 1" app ("apt-get remove arvados-workbench") from your installation as a workaround.
CWE-502 Aug 15, 2022
CVE-2022-33947 5.4 MEDIUM EPSS 0.01
BIG-IP <16.1.3,15.1.6.1,14.1.5,13.1.x - Privilege Escalation
In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, a vulnerability exists in undisclosed pages of the BIG-IP DNS Traffic Management User Interface (TMUI) that allows an authenticated attacker with at least operator role privileges to cause the Tomcat process to restart and perform unauthorized DNS requests and operations through undisclosed requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-502 Aug 04, 2022
CVE-2022-28684 8.8 HIGH EPSS 0.24
DevExpress - Deserialization
This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710.
CWE-502 Aug 03, 2022
CVE-2022-35223 9.8 CRITICAL EPSS 0.03
Easyuse Mailhunter Ultimate < 2020 - Insecure Deserialization
EasyUse MailHunter Ultimate’s cookie deserialization function has an inadequate validation vulnerability. Deserializing a cookie containing malicious payload will trigger this insecure deserialization vulnerability, allowing an unauthenticated remote attacker to execute arbitrary code, manipulate system command or interrupt service.
CWE-502 Aug 02, 2022
CVE-2022-30287 8.0 HIGH EPSS 0.16
Horde Groupware < 5.2.22 - Insecure Deserialization
Horde Groupware Webmail Edition through 5.2.22 allows a reflection injection attack through which an attacker can instantiate a driver class. This then leads to arbitrary deserialization of PHP objects.
CWE-502 Jul 28, 2022
CVE-2022-35872 7.8 HIGH EPSS 0.01
Inductive Automation Ignition 8.1.15 - Code Injection
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-17115.
CWE-502 Jul 25, 2022