CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
2,435 results Clear all
CVE-2021-41110 9.1 CRITICAL EPSS 0.01
cwlviewer <1.3.1 - Deserialization of Untrusted Data
cwlviewer is a web application to view and share Common Workflow Language workflows. Versions prior to 1.3.1 contain a Deserialization of Untrusted Data vulnerability. Commit number f6066f09edb70033a2ce80200e9fa9e70a5c29de (dated 2021-09-30) contains a patch. There are no available workarounds aside from installing the patch. The SnakeYaml constructor, by default, allows any data to be parsed. To fix the issue the object needs to be created with a `SafeConstructor` object, as seen in the patch.
CWE-502 Oct 01, 2021
CVE-2021-41616 9.8 CRITICAL EPSS 0.01
Apache Ddlutils - Insecure Deserialization
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.
CWE-502 Sep 30, 2021
CVE-2021-41588 8.1 HIGH EPSS 0.00
Gradle < 2021.1.3 - Insecure Deserialization
In Gradle Enterprise before 2021.1.3, a crafted request can trigger deserialization of arbitrary unsafe Java objects. The attacker must have the encryption and signing keys.
CWE-502 Sep 24, 2021
CVE-2021-40102 9.1 CRITICAL EPSS 0.01
Concretecms Concrete Cms < 8.5.5 - Insecure Deserialization
An issue was discovered in Concrete CMS through 8.5.5. Arbitrary File deletion can occur via PHAR deserialization in is_dir (PHP Object Injection associated with the __wakeup magic method).
CWE-502 Sep 24, 2021
CVE-2021-31819 9.8 CRITICAL EPSS 0.02
Octopus Halibut < 4.4.7 - Insecure Deserialization
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.
CWE-502 Sep 22, 2021
CVE-2021-39392 9.8 CRITICAL EPSS 0.04
Mylittletools Mylittlebackup < 1.7 - Insecure Deserialization
The management tool in MyLittleBackup up to and including 1.7 allows remote attackers to execute arbitrary code because machineKey is hardcoded (the same for all customers' installations) in web.config, and can be used to send serialized ASP code.
CWE-502 Sep 15, 2021
CVE-2021-37181 10.0 CRITICAL EPSS 0.01
Siemens Cerberus Dms - Insecure Deserialization
A vulnerability has been identified in Cerberus DMS V4.0 (All versions), Cerberus DMS V4.1 (All versions), Cerberus DMS V4.2 (All versions), Cerberus DMS V5.0 (All versions < v5.0 QU1), Desigo CC Compact V4.0 (All versions), Desigo CC Compact V4.1 (All versions), Desigo CC Compact V4.2 (All versions), Desigo CC Compact V5.0 (All versions < V5.0 QU1), Desigo CC V4.0 (All versions), Desigo CC V4.1 (All versions), Desigo CC V4.2 (All versions), Desigo CC V5.0 (All versions < V5.0 QU1). The application deserialises untrusted data without sufficient validations, that could result in an arbitrary deserialization. This could allow an unauthenticated attacker to execute code in the affected system. The CCOM communication component used for Windows App / Click-Once and IE Web / XBAP client connectivity are affected by the vulnerability.
CWE-502 Sep 14, 2021
CVE-2021-39207 8.4 HIGH 1 Writeup EPSS 0.01
Facebook Parlai < 1.1.0 - Insecure Deserialization
parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.
CWE-502 Sep 10, 2021
CVE-2021-24040 9.8 CRITICAL 1 PoC Analysis EPSS 0.36
Facebook Parlai < 1.1.0 - Insecure Deserialization
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
CWE-502 Sep 10, 2021
CVE-2021-37579 9.8 CRITICAL EPSS 0.03
Apache Dubbo < 2.7.13 - Insecure Deserialization
The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
CWE-502 Sep 09, 2021
CVE-2021-32836 7.5 HIGH EPSS 0.01
ZStack <3.10.12-4.1.6 - Open Redirect
ZStack is open source IaaS(infrastructure as a service) software. In ZStack before versions 3.10.12 and 4.1.6 there is a pre-auth unsafe deserialization vulnerability in the REST API. An attacker in control of the request body will be able to provide both the class name and the data to be deserialized and therefore will be able to instantiate an arbitrary type and assign arbitrary values to its fields. This issue may lead to a Denial Of Service. If a suitable gadget is available, then an attacker may also be able to exploit this vulnerability to gain pre-auth remote code execution. For additional details see the referenced GHSL-2021-087.
CWE-502 Sep 09, 2021
CVE-2021-35217 8.9 HIGH EPSS 0.60
Patch Manager Orion Platform - Code Injection
Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data.
CWE-502 Sep 08, 2021
CVE-2021-36163 9.8 CRITICAL EPSS 0.01
Apache Dubbo - RCE
In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
CWE-502 Sep 07, 2021
CVE-2021-32568 7.8 HIGH 1 Writeup EPSS 0.00
Mrdoc < 0.7.0 - Insecure Deserialization
mrdoc is vulnerable to Deserialization of Untrusted Data
CWE-502 Sep 06, 2021
CVE-2021-35218 8.9 HIGH EPSS 0.17
Orion Patch Manager - RCE
Deserialization of Untrusted Data in the Web Console Chart Endpoint can lead to remote code execution. An unauthorized attacker who has network access to the Orion Patch Manager Web Console could potentially exploit this and compromise the server
CWE-502 Sep 01, 2021
CVE-2021-35216 8.9 HIGH EPSS 0.52
Patch Manager Orion - RCE
Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution.
CWE-502 Sep 01, 2021
CVE-2021-35215 8.9 HIGH 1 PoC Analysis EPSS 0.83
Orion Platform <2020.2.5 - RCE
Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability.
CWE-502 Sep 01, 2021
CVE-2021-36231 8.8 HIGH EPSS 0.01
MIK.starlight <7.9.5.24363 - Code Injection
Deserialization of untrusted data in multiple functions in MIK.starlight 7.9.5.24363 allows authenticated remote attackers to execute operating system commands by crafting serialized objects.
CWE-502 Aug 31, 2021
CVE-2021-21677 8.8 HIGH EPSS 0.01
Jenkins Code Coverage API < 1.4.0 - Insecure Deserialization
Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability.
CWE-502 Aug 31, 2021
CVE-2021-36981 8.8 HIGH 1 PoC Analysis EPSS 0.17
Sernet Verinice < 1.22.2 - Insecure Deserialization
In the server in SerNet verinice before 1.22.2, insecure Java deserialization allows remote authenticated attackers to execute arbitrary code.
CWE-502 Aug 31, 2021