CVE & Exploit Intelligence Database

Updated 37m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
2,435 results Clear all
CVE-2021-21868 7.8 HIGH EPSS 0.00
Codesys - Insecure Deserialization
An unsafe deserialization vulnerability exists in the ObjectManager.plugin Project.get_MissingTypes() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
CWE-502 Aug 18, 2021
CVE-2021-21867 7.8 HIGH EPSS 0.00
Codesys - Insecure Deserialization
An unsafe deserialization vulnerability exists in the ObjectManager.plugin ObjectStream.ProfileByteArray functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
CWE-502 Aug 18, 2021
CVE-2021-37678 9.3 CRITICAL 1 PoC Analysis EPSS 0.01
Google Tensorflow < 2.3.4 - Insecure Deserialization
TensorFlow is an end-to-end open source platform for machine learning. In affected versions TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/python/keras/saving/model_config.py#L66-L104) uses `yaml.unsafe_load` which can perform arbitrary code execution on the input. Given that YAML format support requires a significant amount of work, we have removed it for now. We have patched the issue in GitHub commit 23d6383eb6c14084a8fc3bdf164043b974818012. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
CWE-502 Aug 12, 2021
CVE-2021-38585 7.2 HIGH EPSS 0.02
cPanel <98.0.1 - Deserialization
The WHM Locale Upload feature in cPanel before 98.0.1 allows unserialization attacks (SEC-585).
CWE-502 Aug 11, 2021
CVE-2021-23420 7.7 HIGH EPSS 0.01
Codeception < 3.1.3 - Insecure Deserialization
This affects the package codeception/codeception from 4.0.0 and before 4.1.22, before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
CWE-502 Aug 11, 2021
CVE-2021-37544 9.8 CRITICAL EPSS 0.00
Jetbrains Teamcity < 2020.2.4 - Insecure Deserialization
In JetBrains TeamCity before 2020.2.4, there was an insecure deserialization.
CWE-502 Aug 06, 2021
CVE-2021-37632 8.1 HIGH EPSS 0.02
Config Lib < 1.0.9 - Insecure Deserialization
SuperMartijn642's Config Lib is a library used by a number of mods for the game Minecraft. The versions of SuperMartijn642's Config Lib between 1.0.4 and 1.0.8 are affected by a vulnerability and can be exploited on both servers and clients. Using SuperMartijn642's Config Lib, servers will send a packet to clients with the server's config values. In order to read `enum` values from the packet data, `ObjectInputStream#readObject` is used. `ObjectInputStream#readObject` will instantiate a class based on the input data. Since, the packet data is not validated before `ObjectInputStream#readObject` is called, an attacker can instantiate any class by sending a malicious packet. If a suitable class is found, the vulnerability can lead to a number of exploits, including remote code execution. Although the vulnerable packet is typically only send from server to client, it can theoretically also be send from client to server. This means both clients and servers running SuperMartijn642's Config Lib between 1.0.4 and 1.0.8 are vulnerable. The vulnerability has been patched in SuperMartijn642's Config lib 1.0.9. Both, players and server owners, should update to 1.0.9 or higher.
CWE-502 Aug 05, 2021
CVE-2021-34371 9.8 CRITICAL 3 PoCs Analysis EPSS 0.65
Neo4j < 3.4.18 - Insecure Deserialization
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
CWE-502 Aug 05, 2021
CVE-2021-21863 7.8 HIGH EPSS 0.00
Codesys Development System - Insecure Deserialization
A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
CWE-502 Aug 05, 2021
CVE-2021-36483 8.8 HIGH EPSS 0.04
DevExpress <v21.1 - Code Injection
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization.
CWE-502 Aug 04, 2021
CVE-2021-21866 7.8 HIGH EPSS 0.00
Codesys Development System - Insecure Deserialization
A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
CWE-502 Aug 02, 2021
CVE-2021-21865 7.8 HIGH EPSS 0.00
Codesys Development System - Insecure Deserialization
A unsafe deserialization vulnerability exists in the PackageManagement.plugin ExtensionMethods.Clone() functionality of CODESYS GmbH CODESYS Development System 3.5.16. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
CWE-502 Aug 02, 2021
CVE-2021-21864 7.8 HIGH EPSS 0.00
Codesys Development System - Insecure Deserialization
A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureSettings functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
CWE-502 Aug 02, 2021
CVE-2021-36766 7.2 HIGH EPSS 0.02
Concretecms Concrete Cms < 8.5.6 - Insecure Deserialization
Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.
CWE-502 Jul 30, 2021
CVE-2021-29781 9.8 CRITICAL EPSS 0.04
IBM Partner Engagement Manager - Insecure Deserialization
IBM Partner Engagement Manager 2.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 203091.
CWE-502 Jul 30, 2021
CVE-2021-37578 9.8 CRITICAL EPSS 0.02
Apache Juddi < 3.3.10 - Insecure Deserialization
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.
CWE-502 Jul 29, 2021
CVE-2020-5341 9.8 CRITICAL EPSS 0.13
Dell Emc Avamar Server - Insecure Deserialization
Deserialization of Untrusted Data Vulnerability Dell EMC Avamar Server versions 7.4.1, 7.5.0, 7.5.1, 18.2, 19.1 and 19.2 and Dell EMC Integrated Data Protection Appliance versions 2.0, 2.1, 2.2, 2.3, 2.4 and 2.4.1 contain a Deserialization of Untrusted Data Vulnerability. A remote unauthenticated attacker could exploit this vulnerability to send a serialized payload that would execute code on the system.
CWE-502 Jul 28, 2021
CVE-2021-35464 9.8 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
ForgeRock AM <7.0 - Code Injection
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
CWE-502 Jul 22, 2021
CVE-2021-22777 7.8 HIGH EPSS 0.00
Product <Version - Code Injection
A CWE-502: Deserialization of Untrusted Data vulnerability exists that could cause code execution by opening a malicious project file.
CWE-502 Jul 21, 2021
CVE-2021-34520 8.1 HIGH EPSS 0.05
Microsoft Sharepoint Foundation - Insecure Deserialization
Microsoft SharePoint Server Remote Code Execution Vulnerability
CWE-502 Jul 14, 2021