CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
2,435 results Clear all
CVE-2022-26133 9.8 CRITICAL 5 PoCs Analysis EPSS 0.81
Atlassian Bitbucket Data Center <7.17.6 - Code Injection
SharedSecretClusterAuthenticator in Atlassian Bitbucket Data Center versions 5.14.0 and later before 7.6.14, 7.7.0 and later prior to 7.17.6, 7.18.0 and later prior to 7.18.4, 7.19.0 and later prior to 7.19.4, and 7.20.0 allow a remote, unauthenticated attacker to execute arbitrary code via Java deserialization.
CWE-502 Apr 20, 2022
CVE-2022-21445 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.92
Oracle Application Development Framework - Insecure Deserialization
Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Development Framework (ADF). Successful attacks of this vulnerability can result in takeover of Oracle Application Development Framework (ADF). Note: Oracle Application Development Framework (ADF) is downloaded via Oracle JDeveloper Product. Please refer to Fusion Middleware Patch Advisor for more details. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-502 Apr 19, 2022
CVE-2022-27158 9.8 CRITICAL 1 Writeup EPSS 0.01
PHP Pearweb < 1.32.0 - Insecure Deserialization
pearweb < 1.32 suffers from Deserialization of Untrusted Data.
CWE-502 Apr 15, 2022
CVE-2022-24846 9.1 CRITICAL EPSS 0.01
Geoserver Geowebcache < 1.19.3 - Insecure Deserialization
GeoWebCache is a tile caching server implemented in Java. The GeoWebCache disk quota mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. While in GeoWebCache the JNDI strings are provided via local configuration file, in GeoServer a user interface is provided to perform the same, that can be accessed remotely, and requires admin-level login to be used. These lookup are unrestricted in scope and can lead to code execution. The lookups are going to be restricted in GeoWebCache 1.21.0, 1.20.2, 1.19.3.
CWE-502 Apr 14, 2022
CVE-2021-21956 7.8 HIGH EPSS 0.00
Cloudlinux Imunify360 - Insecure Deserialization
A php unserialize vulnerability exists in the Ai-Bolit functionality of CloudLinux Inc Imunify360 5.10.2. A specially-crafted malformed file can lead to potential arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
CWE-502 Apr 14, 2022
CVE-2022-22958 7.2 HIGH EPSS 0.03
Vmware Cloud Foundation < 5.0 - Insecure Deserialization
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities (CVE-2022-22957 & CVE-2022-22958). A malicious actor with administrative access can trigger deserialization of untrusted data through malicious JDBC URI which may result in remote code execution.
CWE-502 Apr 13, 2022
CVE-2022-22957 7.2 HIGH EXPLOITED EPSS 0.40
Vmware Cloud Foundation < 5.0 - Insecure Deserialization
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities (CVE-2022-22957 & CVE-2022-22958). A malicious actor with administrative access can trigger deserialization of untrusted data through malicious JDBC URI which may result in remote code execution.
CWE-502 Apr 13, 2022
CVE-2019-6834 7.3 HIGH EPSS 0.00
Schneider Electric SESU <2.3.0 - Code Injection
A CWE-502: Deserialization of Untrusted Data vulnerability exists which could allow an attacker to execute arbitrary code on the targeted system with SYSTEM privileges when placing a malicious user to be authenticated for this vulnerability to be successfully exploited. Affected Product: Schneider Electric Software Update (SESU) SUT Service component (V2.1.1 to V2.3.0)
CWE-502 Apr 13, 2022
CVE-2022-23450 9.8 CRITICAL EPSS 0.33
Siemens Simatic Energy Manager Basic < 7.3 - Insecure Deserialization
A vulnerability has been identified in SIMATIC Energy Manager Basic (All versions < V7.3 Update 1), SIMATIC Energy Manager PRO (All versions < V7.3 Update 1). The affected system allows remote users to send maliciously crafted objects. Due to insecure deserialization of user-supplied content by the affected software, an unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted serialized object. This could allow the attacker to execute arbitrary code on the device with SYSTEM privileges.
CWE-502 Apr 12, 2022
CVE-2022-20763 5.4 MEDIUM EPSS 0.00
Cisco Webex Meetings - Code Injection
A vulnerability in the login authorization components of Cisco Webex Meetings could allow an authenticated, remote attacker to inject arbitrary Java code. This vulnerability is due to improper deserialization of Java code within login requests. An attacker could exploit this vulnerability by sending malicious login requests to the Cisco Webex Meetings service. A successful exploit could allow the attacker to inject arbitrary Java code and take arbitrary actions within the Cisco Webex Meetings application.
CWE-502 Apr 06, 2022
CVE-2020-19229 9.8 CRITICAL EPSS 0.00
Jeesite 1.2.7 - Code Injection
Jeesite 1.2.7 uses the apache shiro version 1.2.3 affected by CVE-2016-4437. Because of this version of the java deserialization vulnerability, an attacker could exploit the vulnerability to execute arbitrary commands via the rememberMe parameter.
CWE-502 Apr 05, 2022
CVE-2021-33207 9.8 CRITICAL 1 Writeup EPSS 0.03
MashZone NextGen <10.7 - Deserialization
The HTTP client in MashZone NextGen through 10.7 GA deserializes untrusted data when it gets an HTTP response with a 570 status code.
CWE-502 Apr 05, 2022
CVE-2022-1032 7.2 HIGH 1 Writeup EPSS 0.00
Crater < 6.0.6 - Insecure Deserialization
Insecure deserialization of not validated module file in GitHub repository crater-invoice/crater prior to 6.0.6.
CWE-502 Mar 29, 2022
CVE-2021-27475 8.6 HIGH EPSS 0.00
Rockwellautomation Connected Components Workbench < 12.00.00 - Insecure Deserialization
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.
CWE-502 Mar 23, 2022
CVE-2021-27470 10.0 CRITICAL EPSS 0.00
Rockwell Automation FactoryTalk AssetCentre <10.00 - Deserialization
A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
CWE-502 Mar 23, 2022
CVE-2021-27466 10.0 CRITICAL EPSS 0.00
Rockwell Automation FactoryTalk AssetCentre <10.00 - Open Redirect
A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
CWE-502 Mar 23, 2022
CVE-2021-27462 10.0 CRITICAL EPSS 0.00
Rockwell Automation FactoryTalk AssetCentre <10.00 - Open Redirect
A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
CWE-502 Mar 23, 2022
CVE-2021-27460 10.0 CRITICAL EPSS 0.00
Rockwell Automation FactoryTalk AssetCentre <10.00 - Deserialization
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines.
CWE-502 Mar 23, 2022
CVE-2022-26503 7.8 HIGH 1 PoC Analysis EPSS 0.02
Veeam Agent for Windows <5.x - Code Injection
Deserialization of untrusted data in Veeam Agent for Windows 2.0, 2.1, 2.2, 3.0.2, 4.x, and 5.x allows local users to run arbitrary code with local system privileges.
CWE-502 Mar 17, 2022
CVE-2022-0749 7.4 HIGH 1 Writeup EPSS 0.01
SinGooCMS.Utility - Code Injection
This affects all versions of package SinGooCMS.Utility. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.
CWE-502 Mar 17, 2022