CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
2,435 results Clear all
CVE-2025-10965 6.3 MEDIUM EPSS 0.00
LazyAGI LazyLLM <0.6.1 - Deserialization
A security vulnerability has been detected in LazyAGI LazyLLM up to 0.6.1. Affected by this issue is the function lazyllm_call of the file lazyllm/components/deploy/relay/server.py. Such manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
CWE-502 Sep 25, 2025
CVE-2025-10950 6.3 MEDIUM EPSS 0.00
Pypi Ml-logger - Insecure Deserialization
A vulnerability was determined in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected is the function log_handler of the file ml_logger/server.py of the component Ping Handler. This manipulation of the argument data causes deserialization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
CWE-502 Sep 25, 2025
CVE-2025-56816 8.8 HIGH 1 Writeup EPSS 0.01
Running-elephant Datart - Path Traversal
Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The configuration file handling of the application allows attackers to upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses this file using SnakeYAML's unsafe load() or loadAs() method without input sanitization. This allows deserialization of attacker-controlled YAML content, leading to arbitrary class instantiation. Under certain conditions, this can be exploited to achieve remote code execution (RCE).
CWE-22 Sep 24, 2025
CVE-2025-48459 5.3 MEDIUM EPSS 0.01
Apache IoTDB <2.0.5 - Deserialization
Deserialization of Untrusted Data vulnerability in Apache IoTDB. This issue affects Apache IoTDB: from 1.0.0 before 2.0.5. Users are recommended to upgrade to version 2.0.5, which fixes the issue.
CWE-502 Sep 24, 2025
CVE-2025-26399 9.8 CRITICAL KEV 1 PoC Analysis EPSS 0.29
Solarwinds Web Help Desk < 12.8.6 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
CWE-502 Sep 23, 2025
CVE-2025-58662 7.2 HIGH EPSS 0.00
Awesome Support <6.3.4 - Code Injection
Deserialization of Untrusted Data vulnerability in awesomesupport Awesome Support allows Object Injection. This issue affects Awesome Support: from n/a through 6.3.4.
CWE-502 Sep 22, 2025
CVE-2025-57919 7.2 HIGH EPSS 0.00
ConveyThis Language Translate Widget <264 - Code Injection
Deserialization of Untrusted Data vulnerability in ConveyThis Language Translate Widget for WordPress – ConveyThis allows Object Injection. This issue affects Language Translate Widget for WordPress – ConveyThis: from n/a through 264.
CWE-502 Sep 22, 2025
CVE-2025-53465 7.2 HIGH EPSS 0.00
raoinfotech GSheets Connector <1.1.1 - Code Injection
Deserialization of Untrusted Data vulnerability in raoinfotech GSheets Connector allows Object Injection. This issue affects GSheets Connector: from n/a through 1.1.1.
CWE-502 Sep 22, 2025
CVE-2025-10771 6.3 MEDIUM EPSS 0.00
Jeecg Jimureport < 2.1.2 - Insecure Deserialization
A vulnerability was determined in jeecgboot JimuReport up to 2.1.2. Affected is an unknown function of the file /drag/onlDragDataSource/testConnection of the component DB2 JDBC Handler. Executing manipulation of the argument clientRerouteServerListJNDIName can lead to deserialization. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
CWE-502 Sep 21, 2025
CVE-2025-10770 6.3 MEDIUM EPSS 0.00
Jeecg Jimureport < 2.1.2 - Insecure Deserialization
A vulnerability was found in jeecgboot JimuReport up to 2.1.2. This impacts an unknown function of the file /drag/onlDragDataSource/testConnection of the component MySQL JDBC Handler. Performing manipulation results in deserialization. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
CWE-502 Sep 21, 2025
CVE-2025-10769 6.3 MEDIUM EPSS 0.00
H2o < 3.46.0.8 - Insecure Deserialization
A vulnerability has been found in h2oai h2o-3 up to 3.46.08. This affects an unknown function of the file /99/ImportSQLTable of the component H2 JDBC Driver. Such manipulation of the argument connection_url leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Sep 21, 2025
CVE-2025-10768 6.3 MEDIUM EPSS 0.00
H2o < 3.46.0.8 - Insecure Deserialization
A flaw has been found in h2oai h2o-3 up to 3.46.08. The impacted element is an unknown function of the file /99/ImportSQLTable of the component IBMDB2 JDBC Driver. This manipulation of the argument connection_url causes deserialization. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Sep 21, 2025
CVE-2025-6544 9.8 CRITICAL 1 Writeup EPSS 0.00
h2o-3 <= 3.46.0.8 - Open Redirect
A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
CWE-502 Sep 21, 2025
CVE-2025-9906 7.3 HIGH EPSS 0.00
Keras < 3.11.0 - Insecure Deserialization
The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .keras model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by crafting a special config.json (a file within the .keras archive) that will invoke keras.config.enable_unsafe_deserialization() to disable safe mode. Once safe mode is disable, one can use the Lambda layer feature of keras, which allows arbitrary Python code in the form of pickled code. Both can appear in the same archive. Simply the keras.config.enable_unsafe_deserialization() needs to appear first in the archive and the Lambda with arbitrary code needs to be second.
CWE-502 Sep 19, 2025
CVE-2025-59713 6.8 MEDIUM 1 PoC Analysis EPSS 0.00
Snipeitapp Snipe-it < 8.1.18 - Insecure Deserialization
Snipe-IT before 8.1.18 allows unsafe deserialization.
CWE-502 Sep 19, 2025
CVE-2025-10035 10.0 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.52
Fortra Goanywhere Managed File Transfer < 7.6.3 - Command Injection
A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
CWE-502 Sep 18, 2025
CVE-2025-9083 9.8 CRITICAL EPSS 0.00
Ninja Forms <3.11.1 - Code Injection
The Ninja Forms WordPress plugin before 3.11.1 unserializes user input via form field, which could allow Unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.
CWE-502 Sep 18, 2025
CVE-2025-59050 8.4 HIGH 1 Writeup EPSS 0.00
Greenshot < 1.3.301 - Insecure Deserialization
Greenshot is an open source Windows screenshot utility. Greenshot 1.3.300 and earlier deserializes attacker-controlled data received in a WM_COPYDATA message using BinaryFormatter.Deserialize without prior validation or authentication, allowing a local process at the same integrity level to trigger arbitrary code execution inside the Greenshot process. The vulnerable logic resides in a WinForms WndProc handler for WM_COPYDATA (message 74) that copies the supplied bytes into a MemoryStream and invokes BinaryFormatter.Deserialize, and only afterward checks whether the specified channel is authorized. Because the authorization check occurs after deserialization, any gadget chain embedded in the serialized payload executes regardless of channel membership. A local attacker who can send WM_COPYDATA to the Greenshot main window can achieve in-process code execution, which may aid evasion of application control policies by running payloads within the trusted, signed Greenshot.exe process. This issue is fixed in version 1.3.301. No known workarounds exist.
CWE-502 Sep 16, 2025
CVE-2025-10492 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Cloud Jasperreports IO < 4.0.0 - Insecure Deserialization
A Java deserialisation vulnerability has been discovered in Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library
CWE-502 Sep 16, 2025
CVE-2025-59328 6.5 MEDIUM EPSS 0.03
Apache Fory < 0.12.2 - Insecure Deserialization
A vulnerability in Apache Fory allows a remote attacker to cause a Denial of Service (DoS). The issue stems from the insecure deserialization of untrusted data. An attacker can supply a large, specially crafted data payload that, when processed, consumes an excessive amount of CPU resources during the deserialization process. This leads to CPU exhaustion, rendering the application or system using the Apache Fory library unresponsive and unavailable to legitimate users. Users of Apache Fory are strongly advised to upgrade to version 0.12.2 or later to mitigate this vulnerability. Developers of libraries and applications that depend on Apache Fory should update their dependency requirements to Apache Fory 0.12.2 or later and release new versions of their software.
CWE-502 Sep 15, 2025