CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
2,435 results Clear all
CVE-2021-26912 8.1 HIGH EPSS 0.35
Netmotionsoftware Netmotion Mobility - Insecure Deserialization
NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in SupportRpcServlet.
CWE-502 Feb 08, 2021
CVE-2021-25274 9.8 CRITICAL EPSS 0.44
SolarWinds Orion Platform <2020.2.4 - RCE
The Collector Service in SolarWinds Orion Platform before 2020.2.4 uses MSMQ (Microsoft Message Queue) and doesn't set permissions on its private queues. As a result, remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process. Additionally, upon processing of such messages, the service deserializes them in insecure manner, allowing remote arbitrary code execution as LocalSystem.
CWE-502 Feb 03, 2021
CVE-2021-25758 7.8 HIGH EPSS 0.00
Jetbrains Intellij Idea < 2020.3 - Insecure Deserialization
In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution.
CWE-502 Feb 03, 2021
CVE-2021-3160 9.8 CRITICAL EPSS 0.14
ACA Assuweb - Insecure Deserialization
Deserialization of untrusted data in the login page of ASSUWEB 359.3 build 1 subcomponent of ACA ASSUREX RENTES product allows a remote attacker to inject unsecure serialized Java object using a specially crafted HTTP request, resulting in an unauthenticated remote code execution on the server.
CWE-502 Jan 28, 2021
CVE-2020-4888 8.8 HIGH EPSS 0.41
IBM Qradar Security Information And E... - Insecure Deserialization
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 190912.
CWE-502 Jan 28, 2021
CVE-2020-4682 9.8 CRITICAL EPSS 0.03
IBM MQ - Insecure Deserialization
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CWE-502 Jan 28, 2021
CVE-2020-27583 9.8 CRITICAL EPSS 0.04
IBM InfoSphere Information Server 8.5.0.0 - Code Injection
IBM InfoSphere Information Server 8.5.0.0 is affected by deserialization of untrusted data which could allow remote unauthenticated attackers to execute arbitrary code. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CWE-502 Jan 26, 2021
CVE-2020-17532 8.8 HIGH EPSS 0.03
Apache ServiceComb-Java-Chassis <2.1.4 - Authenticated RCE
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
CWE-502 Jan 25, 2021
CVE-2020-12525 7.3 HIGH EPSS 0.00
M&M Software fdtCONTAINER <3.5.20304.x, 3.6-3.6.20304.x - Deseriali...
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CWE-502 Jan 22, 2021
CVE-2021-20190 8.1 HIGH 2 PoCs Analysis EPSS 0.01
Fasterxml Jackson-databind < 2.6.7.5 - Insecure Deserialization
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CWE-502 Jan 19, 2021
CVE-2021-25294 9.8 CRITICAL EPSS 0.28
OpenCATS <0.9.5-3 - Code Injection
OpenCATS through 0.9.5-3 unsafely deserializes index.php?m=activity requests, leading to remote code execution. This occurs because lib/DataGrid.php calls unserialize for the parametersactivity:ActivityDataGrid parameter. The PHP object injection exploit chain can leverage an __destruct magic method in guzzlehttp.
CWE-502 Jan 18, 2021
CVE-2021-21249 9.6 CRITICAL 1 Writeup EPSS 0.01
OneDev <4.0.3 - RCE
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is an issue involving YAML parsing which can lead to post-auth remote code execution. In order to parse and process YAML files, OneDev uses SnakeYaml which by default (when not using `SafeConstructor`) allows the instantiation of arbitrary classes. We can leverage that to run arbitrary code by instantiating classes such as `javax.script.ScriptEngineManager` and using `URLClassLoader` to load the script engine provider, resulting in the instantiation of a user controlled class. For a full example refer to the referenced GHSA. This issue was addressed in 4.0.3 by only allowing certain known classes to be deserialized
CWE-502 Jan 15, 2021
CVE-2021-21247 9.6 CRITICAL EPSS 0.00
OneDev <4.0.3 - Post-Auth RCE
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the application's BasePage registers an AJAX event listener (`AbstractPostAjaxBehavior`) in all pages other than the login page. This listener decodes and deserializes the `data` query parameter. We can access this listener by submitting a POST request to any page. This issue may lead to `post-auth RCE` This endpoint is subject to authentication and, therefore, requires a valid user to carry on the attack. This issue was addressed in 4.0.3 by encrypting serialization payload with secrets only known to server.
CWE-502 Jan 15, 2021
CVE-2021-21242 10.0 CRITICAL 1 Writeup EPSS 0.40
OneDev <4.0.3 - RCE
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or authorization checks. This issue may lead to pre-auth remote code execution. This issue was fixed in 4.0.3 by removing AttachmentUploadServlet and not using deserialization
CWE-502 Jan 15, 2021
CVE-2021-21243 10.0 CRITICAL 1 Writeup EPSS 0.03
OneDev <4.0.3 - Pre-Auth Code Injection
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, a Kubernetes REST endpoint exposes two methods that deserialize untrusted data from the request body. These endpoints do not enforce any authentication or authorization checks. This issue may lead to pre-auth RCE. This issue was fixed in 4.0.3 by not using deserialization at KubernetesResource side.
CWE-502 Jan 15, 2021
CVE-2020-24639 9.8 CRITICAL EPSS 0.01
Airwave Glass <1.3.3 - Code Injection
There is a vulnerability caused by unsafe Java deserialization that allows for arbitrary command execution in a containerized environment within Airwave Glass before 1.3.3. Successful exploitation can lead to complete compromise of the underlying host operating system.
CWE-502 Jan 15, 2021
CVE-2020-23653 9.8 CRITICAL EPSS 0.11
ThinkAdmin <6.x - Code Injection
An insecure unserialize vulnerability was discovered in ThinkAdmin versions 4.x through 6.x in app/admin/controller/api/Update.php and app/wechat/controller/api/Push.php, which may lead to arbitrary remote code execution.
CWE-502 Jan 13, 2021
CVE-2021-21604 8.0 HIGH EPSS 0.01
Jenkins < 2.263.1 - Insecure Deserialization
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator.
CWE-502 Jan 13, 2021
CVE-2020-26118 8.8 HIGH EPSS 0.02
Smartbear Collaborator < 13.3.13302 - Insecure Deserialization
In SmartBear Collaborator Server through 13.3.13302, use of the Google Web Toolkit (GWT) API introduces a post-authentication Java deserialization vulnerability. The application's UpdateMemento class accepts a serialized Java object directly from the user without properly sanitizing it. A malicious object can be submitted to the server via an authenticated attacker to execute commands on the underlying system.
CWE-502 Jan 11, 2021
CVE-2020-11995 9.8 CRITICAL EPSS 0.01
Apache Dubbo < 2.5.10 - Insecure Deserialization
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HasMap will be executed after a series of program calls, however, those special functions may cause remote command execution. For example, the hashCode() function of the EqualsBean class in rome-1.7.0.jar will cause the remotely load malicious classes and execute malicious code by constructing a malicious request. This issue was fixed in Apache Dubbo 2.6.9 and 2.7.8.
CWE-502 Jan 11, 2021