CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
2,435 results Clear all
CVE-2021-43853 8.7 HIGH EPSS 0.00
AjaxPro <21.12.22.1 - XSS
Ajax.NET Professional (AjaxPro) is an AJAX framework available for Microsoft ASP.NET. Affected versions of this package are vulnerable to JavaScript object injection which may result in cross site scripting when leveraged by a malicious user. The affected core relates to JavaScript object creation when parsing json input. Releases before version 21.12.22.1 are affected. A workaround exists that replaces one of the core JavaScript files embedded in the library. See the GHSA-5q7q-qqw2-hjq7 for workaround details.
CWE-502 Dec 22, 2021
CVE-2021-44029 9.8 CRITICAL EPSS 0.01
Quest Kace Desktop Authority < 11.2 - Insecure Deserialization
An issue was discovered in Quest KACE Desktop Authority before 11.2. This vulnerability allows attackers to execute remote code through a deserialization exploitation in the RadAsyncUpload function of ASP.NET AJAX. An attacker can leverage this vulnerability when the encryption keys are known (due to the presence of CVE-2017-11317, CVE-2017-11357, or other means). A default setting for the type whitelisting feature in more current versions of ASP.NET AJAX prevents exploitation.
CWE-502 Dec 22, 2021
CVE-2021-36336 9.8 CRITICAL EPSS 0.03
Wyse Management Suite <3.3.1 - Code Injection
Wyse Management Suite 3.3.1 and below versions contain a deserialization vulnerability that could allow an unauthenticated attacker to execute code on the affected system.
CWE-502 Dec 21, 2021
CVE-2021-42550 6.6 MEDIUM 1 Writeup EPSS 0.03
QOS Logback < 1.2.7 - Insecure Deserialization
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
CWE-502 Dec 16, 2021
CVE-2021-0970 7.8 HIGH EPSS 0.00
Android - Privilege Escalation
In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196970023
CWE-502 Dec 15, 2021
CVE-2021-4104 7.5 HIGH EXPLOITED 3 PoCs Analysis EPSS 0.69
Apache Log4j < 12.0.0.4.0 - Insecure Deserialization
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CWE-502 Dec 14, 2021
CVE-2021-24857 9.8 CRITICAL EPSS 0.01
ToTop Link WP <1.7.1 - Code Injection
The ToTop Link WordPress plugin through 1.7.1 passes base64 encoded user input to the unserialize() PHP function, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain.
CWE-502 Dec 13, 2021
CVE-2021-44228 10.0 CRITICAL KEV RANSOMWARE 439 PoCs Analysis NUCLEI EPSS 0.94
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
CWE-502 Dec 10, 2021
CVE-2021-42130 8.8 HIGH EPSS 0.77
Ivanti Avalanche < 6.3.3 - Insecure Deserialization
A deserialization of untrusted data vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform arbitrary code execution.
CWE-502 Dec 07, 2021
CVE-2021-42127 9.8 CRITICAL EPSS 0.54
Ivanti Avalanche < 6.3.3 - Insecure Deserialization
A deserialization of untrusted data vulnerability exists in Ivanti Avalanche before 6.3.3 using Inforail Service allows arbitrary code execution via Data Repository Service.
CWE-502 Dec 07, 2021
CVE-2021-42125 8.8 HIGH EPSS 0.65
Ivanti Avalanche < 6.3.3 - Insecure Deserialization
An unrestricted file upload vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to write dangerous files.
CWE-502 Dec 07, 2021
CVE-2021-44682 9.8 CRITICAL EPSS 0.00
Veritas Enterprise Vault < 14.1.2 - Insecure Deserialization
An issue (6 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14079).
CWE-502 Dec 06, 2021
CVE-2021-44681 9.8 CRITICAL EPSS 0.00
Veritas Enterprise Vault < 14.1.2 - Insecure Deserialization
An issue (5 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14080).
CWE-502 Dec 06, 2021
CVE-2021-44680 9.8 CRITICAL EPSS 0.00
Veritas Enterprise Vault < 14.1.2 - Insecure Deserialization
An issue (4 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14075).
CWE-502 Dec 06, 2021
CVE-2021-44679 9.8 CRITICAL EPSS 0.00
Veritas Enterprise Vault < 14.1.2 - Insecure Deserialization
An issue (3 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14074).
CWE-502 Dec 06, 2021
CVE-2021-44678 9.8 CRITICAL EPSS 0.00
Veritas Enterprise Vault < 14.1.2 - Insecure Deserialization
An issue (2 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14076).
CWE-502 Dec 06, 2021
CVE-2021-44677 9.8 CRITICAL EPSS 0.00
Veritas Enterprise Vault < 14.1.2 - Insecure Deserialization
An issue (1 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14078).
CWE-502 Dec 06, 2021
CVE-2021-36567 9.8 CRITICAL EPSS 0.03
ThinkPHP 6.0.8 - Deserialization
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache.
CWE-502 Dec 06, 2021
CVE-2021-36564 9.8 CRITICAL EPSS 0.01
ThinkPHP 6.0.8 - Deserialization
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.
CWE-502 Dec 06, 2021
CVE-2021-23758 8.1 HIGH 2 PoCs Analysis EPSS 0.88
Ajaxpro.2 < 21.10.30.1 - Insecure Deserialization
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
CWE-502 Dec 03, 2021