CVE & Exploit Intelligence Database

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
2,435 results Clear all
CVE-2025-60178 9.8 CRITICAL EPSS 0.00
Crmperks WP Gravity Forms Hubspot < 1.2.7 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms HubSpot gf-hubspot allows Object Injection.This issue affects WP Gravity Forms HubSpot: from n/a through <= 1.2.6.
CWE-502 Dec 18, 2025
CVE-2025-60174 9.8 CRITICAL EPSS 0.00
Crmperks WP Gravity Forms Constant Co... - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Constant Contact Plugin gf-constant-contact allows Object Injection.This issue affects WP Gravity Forms Constant Contact Plugin: from n/a through <= 1.1.2.
CWE-502 Dec 18, 2025
CVE-2025-60091 9.8 CRITICAL EPSS 0.00
Crmperks WP Gravity Forms Zoho Crm An... - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Zoho CRM and Bigin gf-zoho allows Object Injection.This issue affects WP Gravity Forms Zoho CRM and Bigin: from n/a through <= 1.2.9.
CWE-502 Dec 18, 2025
CVE-2025-60090 9.8 CRITICAL EPSS 0.00
Crmperks WP Gravity Forms Insightly < 1.1.7 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Insightly gf-insightly allows Object Injection.This issue affects WP Gravity Forms Insightly: from n/a through <= 1.1.6.
CWE-502 Dec 18, 2025
CVE-2025-60089 9.8 CRITICAL EPSS 0.00
Crmperks WP Gravity Forms Freshdesk Plugin - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms FreshDesk Plugin gf-freshdesk allows Object Injection.This issue affects WP Gravity Forms FreshDesk Plugin: from n/a through <= 1.3.5.
CWE-502 Dec 18, 2025
CVE-2025-60084 8.6 HIGH EPSS 0.00
PDF for Elementor Forms + Drag And Drop Template Builder <6.3.1 - C...
Deserialization of Untrusted Data vulnerability in add-ons.org PDF for Elementor Forms + Drag And Drop Template Builder pdf-for-elementor-forms allows Object Injection.This issue affects PDF for Elementor Forms + Drag And Drop Template Builder: from n/a through <= 6.3.1.
CWE-502 Dec 18, 2025
CVE-2025-60083 8.8 HIGH EPSS 0.00
PDF Invoice Builder for WooCommerce <6.3.2 - Code Injection
Deserialization of Untrusted Data vulnerability in add-ons.org PDF Invoice Builder for WooCommerce pdf-for-woocommerce allows Object Injection.This issue affects PDF Invoice Builder for WooCommerce: from n/a through <= 6.3.2.
CWE-502 Dec 18, 2025
CVE-2025-60082 8.8 HIGH EPSS 0.00
PDF for WPForms <6.3.1 - Code Injection
Deserialization of Untrusted Data vulnerability in add-ons.org PDF for WPForms pdf-for-wpforms allows Object Injection.This issue affects PDF for WPForms: from n/a through <= 6.3.1.
CWE-502 Dec 18, 2025
CVE-2025-60081 8.8 HIGH EPSS 0.00
PDF for Contact Form 7 <6.3.4 - Code Injection
Deserialization of Untrusted Data vulnerability in add-ons.org PDF for Contact Form 7 pdf-for-contact-form-7 allows Object Injection.This issue affects PDF for Contact Form 7: from n/a through <= 6.3.4.
CWE-502 Dec 18, 2025
CVE-2025-60080 7.5 HIGH EPSS 0.00
PDF for Gravity Forms + Drag And Drop Template Builder <6.3.0 - Cod...
Deserialization of Untrusted Data vulnerability in add-ons.org PDF for Gravity Forms + Drag And Drop Template Builder pdf-for-gravity-forms allows Object Injection.This issue affects PDF for Gravity Forms + Drag And Drop Template Builder: from n/a through <= 6.3.0.
CWE-502 Dec 18, 2025
CVE-2025-54723 9.8 CRITICAL EPSS 0.00
BoldThemes DentiCare <1.4.3 - Code Injection
Deserialization of Untrusted Data vulnerability in BoldThemes DentiCare denticare allows Object Injection.This issue affects DentiCare: from n/a through < 1.4.3.
CWE-502 Dec 18, 2025
CVE-2025-33226 7.8 HIGH EPSS 0.00
NVIDIA NeMo Framework - Code Injection
NVIDIA NeMo Framework for all platforms contains a vulnerability where malicious data created by an attacker may cause a code injection. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.
CWE-502 Dec 16, 2025
CVE-2025-33212 7.3 HIGH EPSS 0.00
NVIDIA NeMo Framework - RCE
NVIDIA NeMo Framework contains a vulnerability in model loading that could allow an attacker to exploit improper control mechanisms if a user loads a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, and data tampering.
CWE-502 Dec 16, 2025
CVE-2025-33210 9.0 CRITICAL EPSS 0.00
NVIDIA Isaac Lab - Code Injection
NVIDIA Isaac Lab contains a deserialization vulnerability. A successful exploit of this vulnerability might lead to code execution.
CWE-502 Dec 16, 2025
CVE-2025-67748 7.8 HIGH EPSS 0.00
Trailofbits Fickling < 0.1.6 - Insecure Deserialization
Fickling is a Python pickling decompiler and static analyzer. Versions prior to 0.1.6 had a bypass caused by `pty` missing from the block list of unsafe module imports. This led to unsafe pickles based on `pty.spawn()` being incorrectly flagged as `LIKELY_SAFE`, and was fixed in version 0.1.6. This impacted any user or system that used Fickling to vet pickle files for security issues.
CWE-184 Dec 16, 2025
CVE-2025-67747 7.8 HIGH 1 Writeup EPSS 0.00
Fickling <0.1.6 - Code Injection
Fickling is a Python pickling decompiler and static analyzer. Versions prior to 0.1.6 are missing `marshal` and `types` from the block list of unsafe module imports. Fickling started blocking both modules to address this issue. This allows an attacker to craft a malicious pickle file that can bypass fickling since it misses detections for `types.FunctionType` and `marshal.loads`. A user who deserializes such a file, believing it to be safe, would inadvertently execute arbitrary code on their system. This impacts any user or system that uses Fickling to vet pickle files for security issues. The issue was fixed in version 0.1.6.
CWE-184 Dec 16, 2025
CVE-2025-9121 8.8 HIGH EPSS 0.00
Pentaho Data Integration & Analytics Community Dashboard Editor <10...
Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.
CWE-502 Dec 15, 2025
CVE-2025-65213 9.8 CRITICAL EPSS 0.01
Mthreads Torch Musa - Insecure Deserialization
MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process.
CWE-502 Dec 15, 2025
CVE-2025-14606 5.0 MEDIUM EPSS 0.00
Tiny RDM <1.2.5 - Deserialization
A security vulnerability has been detected in tiny-rdm Tiny RDM up to 1.2.5. Affected by this vulnerability is the function pickle.loads of the file pickle_convert.go of the component Pickle Decoding. The manipulation leads to deserialization. The attack can be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CWE-502 Dec 13, 2025
CVE-2025-14476 8.8 HIGH EPSS 0.00
WordPress Doubly - Cross Domain Copy Paste <1.0.46 - Code Injection
The Doubly – Cross Domain Copy Paste for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.46 via deserialization of untrusted input from the content.txt file within uploaded ZIP archives. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary code, delete files, retrieve sensitive data, or perform other actions depending on the available gadgets. This is only exploitable by subscribers, when administrators have explicitly enabled that access.
CWE-502 Dec 13, 2025