CVE & Exploit Intelligence Database

Updated 37m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
2,435 results Clear all
CVE-2021-32742 7.5 HIGH EPSS 0.00
Vapor <4.47.2 - Memory Corruption
Vapor is a web framework for Swift. In versions 4.47.1 and prior, bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies. The vulnerability is patched in version 4.47.2. As a workaround, one may use an alternative to Vapor's built-in `Data.init(base32Encoded:)`.
CWE-502 Jul 09, 2021
CVE-2021-29150 7.2 HIGH EPSS 0.01
Arubanetworks Clearpass Policy Manager - Insecure Deserialization
A remote insecure deserialization vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.
CWE-502 Jul 08, 2021
CVE-2021-24384 9.8 CRITICAL EPSS 0.04
Beardev Joomsport < 5.1.8 - Insecure Deserialization
The joomsport_md_load AJAX action of the JoomSport WordPress plugin before 5.1.8, registered for both unauthenticated and unauthenticated users, unserialised user input from the shattr POST parameter, leading to a PHP Object Injection issue. Even though the plugin does not have a suitable gadget chain to exploit this, other installed plugins could, which might lead to more severe issues such as RCE
CWE-502 Jul 06, 2021
CVE-2021-35971 9.8 CRITICAL EPSS 0.01
Veeam Backup and Replication <10.0.1.4854-11.0.0.837 - Deserialization
Veeam Backup and Replication 10 before 10.0.1.4854 P20210609 and 11 before 11.0.0.837 P20210507 mishandles deserialization during Microsoft .NET remoting.
CWE-502 Jun 30, 2021
CVE-2021-29485 9.9 CRITICAL EPSS 0.02
Ratpack < 1.9.0 - Insecure Deserialization
Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, a malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store. If one's application does not use Ratpack's session mechanism, it is not vulnerable. Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used. Two possible workarounds exist. The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store. Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list.
CWE-502 Jun 29, 2021
CVE-2021-22439 8.1 HIGH EPSS 0.00
Huawei AnyOffice V200R006C10 - Deserialization
There is a deserialization vulnerability in Huawei AnyOffice V200R006C10. An attacker can construct a specific request to exploit this vulnerability. Successfully exploiting this vulnerability, the attacker can execute remote malicious code injection and to control the device.
CWE-502 Jun 29, 2021
CVE-2021-31649 9.8 CRITICAL EPSS 0.00
Jfinal < 4.9.08 - Insecure Deserialization
In applications using jfinal 4.9.08 and below, there is a deserialization vulnerability when using redis,may be vulnerable to remote code execute
CWE-502 Jun 24, 2021
CVE-2021-34394 4.2 MEDIUM EPSS 0.00
Nvidia Jetson Linux < 32.5.1 - Insecure Deserialization
Trusty contains a vulnerability in the NVIDIA OTE protocol that is present in all TAs. An incorrect message stream deserialization allows an attacker to use the malicious CA that is run by the user to cause the buffer overflow, which may lead to information disclosure and data modification.
CWE-502 Jun 22, 2021
CVE-2021-34393 4.2 MEDIUM EPSS 0.00
Nvidia Jetson Linux < 32.5.1 - Insecure Deserialization
Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.
CWE-502 Jun 22, 2021
CVE-2021-35196 7.8 HIGH EPSS 0.01
Manuskript <0.12.0 - Code Injection
Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file
CWE-502 Jun 21, 2021
CVE-2020-9493 9.8 CRITICAL EPSS 0.00
Apache Chainsaw < 2.1.0 - Insecure Deserialization
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
CWE-502 Jun 16, 2021
CVE-2021-3040 6.7 MEDIUM EPSS 0.03
Bridgecrew Checkov <2.0.139 - Code Injection
An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.139. Checkov 1.0 versions are not impacted.
CWE-502 Jun 10, 2021
CVE-2021-33176 7.5 HIGH EPSS 0.00
VerneMQ MQTT Broker <1.12.0 - DoS
VerneMQ MQTT Broker versions prior to 1.12.0 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.
CWE-502 Jun 08, 2021
CVE-2021-33175 7.5 HIGH EPSS 0.00
EMQ X Broker <4.2.8 - DoS
EMQ X Broker versions prior to 4.2.8 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.
CWE-502 Jun 08, 2021
CVE-2021-33898 8.1 HIGH EPSS 0.02
Invoiceninja Invoice Ninja < 4.4.0 - Insecure Deserialization
In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.
CWE-502 Jun 06, 2021
CVE-2021-33806 9.8 CRITICAL 1 Writeup EPSS 0.07
Bdew Bdlib < 1.16.1.7 - Insecure Deserialization
The BDew BdLib library before 1.16.1.7 for Minecraft allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of its use of Java serialization.
CWE-502 Jun 03, 2021
CVE-2021-23895 9.0 CRITICAL EPSS 0.01
Mcafee Database Security < 4.8.2 - Insecure Deserialization
Deserialization of untrusted data vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote authenticated attacker to create a reverse shell with administrator privileges on the DBSec server via carefully constructed Java serialized object sent to the DBSec server.
CWE-502 Jun 02, 2021
CVE-2021-23894 9.6 CRITICAL EPSS 0.04
Mcafee Database Security < 4.8.2 - Insecure Deserialization
Deserialization of untrusted data vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote unauthenticated attacker to create a reverse shell with administrator privileges on the DBSec server via carefully constructed Java serialized object sent to the DBSec server.
CWE-502 Jun 02, 2021
CVE-2021-30179 9.8 CRITICAL EPSS 0.04
Apache Dubbo <2.6.9-2.7.9 - RCE
Apache Dubbo prior to 2.6.9 and 2.7.9 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final call. The signature for the $invoke or $invokeAsync methods is Ljava/lang/String;[Ljava/lang/String;[Ljava/lang/Object; where the first argument is the name of the method to invoke, the second one is an array with the parameter types for the method being invoked and the third one is an array with the actual call arguments. In addition, the caller also needs to set an RPC attachment specifying that the call is a generic call and how to decode the arguments. The possible values are: - true - raw.return - nativejava - bean - protobuf-json An attacker can control this RPC attachment and set it to nativejava to force the java deserialization of the byte array located in the third argument.
CWE-502 Jun 01, 2021
CVE-2021-25641 9.8 CRITICAL 2 PoCs Analysis EPSS 0.75
Apache Dubbo < 2.6.9 - Insecure Deserialization
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
CWE-502 Jun 01, 2021