CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
2,435 results Clear all
CVE-2022-23940 8.8 HIGH 1 PoC Analysis EPSS 0.36
SuiteCRM <8.0.1 - Authenticated RCE
SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.
CWE-502 Mar 10, 2022
CVE-2022-24282 7.2 HIGH EPSS 0.03
SINEC NMS <2.0 - Code Injection
A vulnerability has been identified in SINEC NMS (All versions >= V1.0.3 < V2.0), SINEC NMS (All versions < V1.0.3), SINEMA Server V14 (All versions). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges.
CWE-502 Mar 08, 2022
CVE-2022-21828 7.2 HIGH EPSS 0.15
Ivanti Incapptic Connect - Insecure Deserialization
A user with high privilege access to the Incapptic Connect web console can remotely execute code on the Incapptic Connect server using a unspecified attack vector in Incapptic Connect version 1.40.0, 1.39.1, 1.39.0, 1.38.1, 1.38.0, 1.37.1, 1.37.0, 1.36.0, 1.35.5, 1.35.4 and 1.35.3.
CWE-502 Mar 04, 2022
CVE-2022-0138 7.5 HIGH EPSS 0.00
Airspan Mimosa Management Platform < 1.0.3 - Insecure Deserialization
MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 has a deserialization function that does not validate or check the data, allowing arbitrary classes to be created.
CWE-502 Feb 18, 2022
CVE-2021-46364 7.8 HIGH 1 PoC Analysis EPSS 0.01
Magnolia CMS <6.2.3 - RCE
A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.
CWE-502 Feb 11, 2022
CVE-2022-24289 8.8 HIGH EPSS 0.03
Apache Cayenne <4.1 - Code Injection
Hessian serialization is a network protocol that supports object-based transmission. Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides object persistence and query functionality to 'remote' applications. In Apache Cayenne 4.1 and earlier, running on non-current patch versions of Java, an attacker with client access to Cayenne ROP can transmit a malicious payload to any vulnerable third-party dependency on the server. This can result in arbitrary code execution.
CWE-502 Feb 11, 2022
CVE-2022-22005 8.8 HIGH EXPLOITED EPSS 0.05
Microsoft SharePoint Server - RCE
Microsoft SharePoint Server Remote Code Execution Vulnerability
CWE-502 Feb 09, 2022
CVE-2022-0538 7.5 HIGH EPSS 0.01
Jenkins <2.333 - XSS
Jenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.
CWE-502 Feb 09, 2022
CVE-2021-42631 8.1 HIGH EPSS 0.21
Printerlogic Virtual Appliance < 20.0.1304 - Insecure Deserialization
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution.
CWE-502 Jan 31, 2022
CVE-2021-45899 9.8 CRITICAL EPSS 0.03
SuiteCRM <7.12.3, <8.0.2 - Code Injection
SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows PHAR deserialization that can lead to remote code execution.
CWE-502 Jan 28, 2022
CVE-2021-41766 8.1 HIGH EPSS 0.01
Apache Karaf < 4.3.6 - Insecure Deserialization
Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks, the implementation used by Apache Karaf is not protected against this kind of attack. The impact of Java deserialization vulnerabilities strongly depends on the classes that are available within the targets class path. Generally speaking, deserialization of untrusted data does always represent a high security risk and should be prevented. The risk is low as, by default, Karaf uses a limited set of classes in the JMX server class path. It depends of system scoped classes (e.g. jar in the lib folder).
CWE-502 Jan 26, 2022
CVE-2022-23307 8.8 HIGH EPSS 0.02
Apache Chainsaw < 2.1.0 - Insecure Deserialization
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
CWE-502 Jan 18, 2022
CVE-2022-23302 8.8 HIGH EPSS 0.01
Apache Log4j < 1.2.17 - Insecure Deserialization
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CWE-502 Jan 18, 2022
CVE-2021-45394 8.8 HIGH EPSS 0.00
Html2pdf < 5.2.4 - SSRF
An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
CWE-502 Jan 18, 2022
CVE-2021-43297 9.8 CRITICAL 2 PoCs Analysis EPSS 0.46
Apache Dubbo <2.6.12, <2.7.15, <3.0 - Code Injection
A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
CWE-502 Jan 10, 2022
CVE-2021-42392 9.8 CRITICAL 2 PoCs Analysis EPSS 0.91
H2 < 2.0.204 - Insecure Deserialization
The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.
CWE-502 Jan 10, 2022
CVE-2022-21663 6.6 MEDIUM EPSS 0.00
Wordpress < 5.8.3 - Insecure Deserialization
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
CWE-502 Jan 06, 2022
CVE-2022-21647 7.7 HIGH EPSS 0.11
Codeigniter < 4.1.6 - Insecure Deserialization
CodeIgniter is an open source PHP full-stack web framework. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. Users are advised to upgrade to v4.1.6 or later. Users unable to upgrade as advised to not use the `old()` function and form_helper nor `RedirectResponse::withInput()` and `redirect()->withInput()`.
CWE-502 Jan 04, 2022
CVE-2021-20318 7.2 HIGH EPSS 0.02
Redhat Jboss Enterprise Application P... - Insecure Deserialization
The HornetQ component of Artemis in EAP 7 was not updated with the fix for CVE-2016-4978. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.
CWE-502 Dec 23, 2021
CVE-2021-4118 7.8 HIGH 1 Writeup EPSS 0.00
Lightningai Pytorch Lightning < 1.6.0 - Insecure Deserialization
pytorch-lightning is vulnerable to Deserialization of Untrusted Data
CWE-502 Dec 23, 2021