CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
2,435 results Clear all
CVE-2025-58748 9.8 CRITICAL 1 Writeup EPSS 0.01
Dataease <2.10.12 - Code Injection
Dataease is an open source data analytics and visualization platform. In Dataease versions up to 2.10.12 the H2 data source implementation (H2.java) does not verify that a provided JDBC URL starts with jdbc:h2. This lack of validation allows a crafted JDBC configuration that substitutes the Amazon Redshift driver and leverages the socketFactory and socketFactoryArg parameters to invoke org.springframework.context.support.FileSystemXmlApplicationContext or ClassPathXmlApplicationContext with an attacker‑controlled remote XML resource, resulting in remote code execution. Versions up to and including 2.10.12 are affected. The issue is fixed in version 2.10.13. Updating to version 2.10.13 or later is the recommended remediation. No known workarounds exist.
CWE-502 Sep 15, 2025
CVE-2025-58046 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.01
Dataease < 2.10.13 - Insecure Deserialization
Dataease is an open-source data visualization and analysis platform. In versions up to and including 2.10.12, the Impala data source is vulnerable to remote code execution due to insufficient filtering in the getJdbc method of the io.dataease.datasource.type.Impala class. Attackers can construct malicious JDBC connection strings that exploit JNDI injection and trigger RMI deserialization, ultimately enabling remote command execution. The vulnerability can be exploited by editing the data source and providing a crafted JDBC connection string that references a remote configuration file, leading to RMI-based deserialization attacks. This issue has been patched in version 2.10.13. It is recommended to upgrade to the latest version. No known workarounds exist for affected versions.
CWE-502 Sep 15, 2025
CVE-2025-10433 6.3 MEDIUM EPSS 0.00
1Panel-dev MaxKB <2.0.2/2.1.0 - Deserialization
A vulnerability was determined in 1Panel-dev MaxKB up to 2.0.2/2.1.0. This issue affects some unknown processing of the file /admin/api/workspace/default/tool/debug. Executing manipulation of the argument code can lead to deserialization. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.1.1 is capable of addressing this issue. It is suggested to upgrade the affected component.
CWE-502 Sep 15, 2025
CVE-2025-10252 3.1 LOW EPSS 0.00
SEAT Queue Ticket Kiosk <20250827 - Deserialization
A flaw has been found in SEAT Queue Ticket Kiosk up to 20250827. This affects an unknown part of the component Java RMI Registry Handler. This manipulation causes deserialization. The attack can only be done within the local network. The attack is considered to have high complexity. It is indicated that the exploitability is difficult. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Sep 11, 2025
CVE-2025-10164 7.3 HIGH EPSS 0.00
Pypi Sglang < 0.5.4 - Insecure Deserialization
A security flaw has been discovered in lmsys sglang 0.4.6. Affected by this vulnerability is the function main of the file /update_weights_from_tensor. The manipulation of the argument serialized_named_tensors results in deserialization. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Sep 09, 2025
CVE-2025-55232 9.8 CRITICAL EPSS 0.01
Microsoft HPC - Code Injection
Deserialization of untrusted data in Microsoft High Performance Compute Pack (HPC) allows an unauthorized attacker to execute code over a network.
CWE-502 Sep 09, 2025
CVE-2025-54897 8.8 HIGH EPSS 0.06
Microsoft Sharepoint Server - Insecure Deserialization
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CWE-502 Sep 09, 2025
CVE-2025-53303 8.8 HIGH EPSS 0.00
ThemeMove Core <1.4.2 - Code Injection
Deserialization of Untrusted Data vulnerability in ThemeMove ThemeMove Core allows Object Injection. This issue affects ThemeMove Core: from n/a through 1.4.2.
CWE-502 Sep 09, 2025
CVE-2025-48101 8.8 HIGH EPSS 0.00
Constant Contact for WordPress <4.1.1 - Code Injection
Deserialization of Untrusted Data vulnerability in webdevstudios Constant Contact for WordPress allows Object Injection. This issue affects Constant Contact for WordPress: from n/a through 4.1.1.
CWE-502 Sep 09, 2025
CVE-2025-47579 9.0 CRITICAL EPSS 0.00
Themegoods Photography < 7.7.2 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in ThemeGoods Photography. This issue affects Photography: from n/a through 7.5.2.
CWE-502 Sep 09, 2025
CVE-2025-41701 7.8 HIGH EPSS 0.00
Engineering Tool <version> - Command Injection
An unauthenticated attacker can trick a local user into executing arbitrary commands by opening a deliberately manipulated project file with an affected engineering tool. These arbitrary commands are executed in the user context.
CWE-502 Sep 09, 2025
CVE-2025-42944 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
SAP NetWeaver - Deserialization
Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application's confidentiality, integrity, and availability.
CWE-502 Sep 09, 2025
CVE-2025-58757 8.8 HIGH EPSS 0.01
MONAI <1.5.0 - Code Injection
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.0, the `pickle_operations` function in `monai/data/utils.py` automatically handles dictionary key-value pairs ending with a specific suffix and deserializes them using `pickle.loads()` . This function also lacks any security measures. The deserialization may lead to code execution. As of time of publication, no known fixed versions are available.
CWE-502 Sep 09, 2025
CVE-2025-58756 8.8 HIGH EPSS 0.01
MONAI <1.5.0 - Info Disclosure
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.0, in `model_dict = torch.load(full_path, map_location=torch.device(device), weights_only=True)` in monai/bundle/scripts.py , `weights_only=True` is loaded securely. However, insecure loading methods still exist elsewhere in the project, such as when loading checkpoints. This is a common practice when users want to reduce training time and costs by loading pre-trained models downloaded from other platforms. Loading a checkpoint containing malicious content can trigger a deserialization vulnerability, leading to code execution. As of time of publication, no known fixed versions are available.
CWE-502 Sep 09, 2025
CVE-2025-58782 6.5 MEDIUM EPSS 0.01
Apache Jackrabbit Core/JCR Commons <2.22.1 - Deserialization
Deserialization of Untrusted Data vulnerability in Apache Jackrabbit Core and Apache Jackrabbit JCR Commons. This issue affects Apache Jackrabbit Core: from 1.0.0 through 2.22.1; Apache Jackrabbit JCR Commons: from 1.0.0 through 2.22.1. Deployments that accept JNDI URIs for JCR lookup from untrusted users allows them to inject malicious JNDI references, potentially leading to arbitrary code execution through deserialization of untrusted data. Users are recommended to upgrade to version 2.22.2. JCR lookup through JNDI has been disabled by default in 2.22.2. Users of this feature need to enable it explicitly and are adviced to review their use of JNDI URI for JCR lookup.
CWE-502 Sep 08, 2025
CVE-2025-49401 9.8 CRITICAL EPSS 0.00
Quiz And Survey Master <10.2.5 - Code Injection
Deserialization of Untrusted Data vulnerability in ExpressTech Systems Quiz And Survey Master allows Object Injection. This issue affects Quiz And Survey Master: from n/a through 10.2.5.
CWE-502 Sep 05, 2025
CVE-2025-58839 7.2 HIGH EPSS 0.00
aThemeArt Translations eDS Responsive Menu <1.2 - Object Injection
Deserialization of Untrusted Data vulnerability in aThemeArt Translations eDS Responsive Menu allows Object Injection. This issue affects eDS Responsive Menu: from n/a through 1.2.
CWE-502 Sep 05, 2025
CVE-2025-58815 7.2 HIGH EPSS 0.00
Rubel Miah Aitasi Coming Soon <2.0.2 - Object Injection
Deserialization of Untrusted Data vulnerability in Rubel Miah Aitasi Coming Soon allows Object Injection. This issue affects Aitasi Coming Soon: from n/a through 2.0.2.
CWE-502 Sep 05, 2025
CVE-2025-48535 7.8 HIGH EPSS 0.00
Android - Privilege Escalation
In assertSafeToStartCustomActivity of AppRestrictionsFragment.java , there is a possible way to exploit a parcel mismatch resulting in a launch anywhere vulnerability due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-502 Sep 04, 2025
CVE-2025-32312 7.8 HIGH EPSS 0.00
Google Android - Insecure Deserialization
In createIntentsList of PackageParser.java , there is a possible way to bypass lazy bundle hardening, allowing modified data to be passed to the next process due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-502 Sep 04, 2025