CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
2,435 results Clear all
CVE-2025-3623 9.1 CRITICAL EPSS 0.01
Uncannyowl Uncanny Automator < 6.4.0.2 - Insecure Deserialization
The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for unauthenticated to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files.
CWE-502 May 14, 2025
CVE-2025-30384 7.4 HIGH EPSS 0.02
Microsoft Office SharePoint - Code Injection
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.
CWE-502 May 13, 2025
CVE-2025-30382 7.8 HIGH EPSS 0.01
Microsoft Office SharePoint - Code Injection
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.
CWE-502 May 13, 2025
CVE-2025-30378 7.0 HIGH EPSS 0.01
Microsoft Office SharePoint - Code Injection
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.
CWE-502 May 13, 2025
CVE-2025-42999 9.1 CRITICAL KEV RANSOMWARE 1 PoC Analysis EPSS 0.70
SAP NetWeaver Visual Composer Metadata Uploader - Code Injection
SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
CWE-502 May 13, 2025
CVE-2025-30012 10.0 CRITICAL EPSS 0.02
SAP SRM - Deserialization
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component, which allows an unauthenticated attacker to send malicious payload request in a specific encoding format. The servlet will then decode this malicious request which will result in deserialization of data in the application leading to execution of arbitrary OS command on target as SAP Administrator. This vulnerability has High impact on confidentiality, integrity, and availability of the application.
CWE-502 May 13, 2025
CVE-2025-46738 6.6 MEDIUM EPSS 0.00
SEL-5033 - Code Injection
An authenticated attacker can maliciously modify layout data files in the SEL-5033 installation directory to execute arbitrary code.
CWE-502 May 12, 2025
CVE-2025-47732 8.7 HIGH EPSS 0.03
Microsoft Dataverse - Insecure Deserialization
Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute code over a network.
CWE-502 May 08, 2025
CVE-2025-47683 7.2 HIGH EPSS 0.00
WP Maintenance <6.1.9.7 - Code Injection
Deserialization of Untrusted Data vulnerability in Florent Maillefaud WP Maintenance allows Object Injection. This issue affects WP Maintenance: from n/a through 6.1.9.7.
CWE-502 May 07, 2025
CVE-2025-47629 7.2 HIGH EPSS 0.00
Wp-crm System < 3.4.1 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in Mario Peshev WP-CRM System allows Object Injection. This issue affects WP-CRM System: from n/a through 3.4.1.
CWE-502 May 07, 2025
CVE-2025-0855 9.8 CRITICAL EPSS 0.03
PGS Core <5.8.0 - Code Injection
The PGS Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.8.0 via deserialization of untrusted input in the 'import_header' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 May 06, 2025
CVE-2025-30165 8.0 HIGH 1 Writeup EPSS 0.01
vLLM - Code Injection
vLLM is an inference and serving engine for large language models. In a multi-node vLLM deployment using the V0 engine, vLLM uses ZeroMQ for some multi-node communication purposes. The secondary vLLM hosts open a `SUB` ZeroMQ socket and connect to an `XPUB` socket on the primary vLLM host. When data is received on this `SUB` socket, it is deserialized with `pickle`. This is unsafe, as it can be abused to execute code on a remote machine. Since the vulnerability exists in a client that connects to the primary vLLM host, this vulnerability serves as an escalation point. If the primary vLLM host is compromised, this vulnerability could be used to compromise the rest of the hosts in the vLLM deployment. Attackers could also use other means to exploit the vulnerability without requiring access to the primary vLLM host. One example would be the use of ARP cache poisoning to redirect traffic to a malicious endpoint used to deliver a payload with arbitrary code to execute on the target machine. Note that this issue only affects the V0 engine, which has been off by default since v0.8.0. Further, the issue only applies to a deployment using tensor parallelism across multiple hosts, which we do not expect to be a common deployment pattern. Since V0 is has been off by default since v0.8.0 and the fix is fairly invasive, the maintainers of vLLM have decided not to fix this issue. Instead, the maintainers recommend that users ensure their environment is on a secure network in case this pattern is in use. The V1 engine is not affected by this issue.
CWE-502 May 06, 2025
CVE-2025-43852 9.8 CRITICAL 1 Writeup EPSS 0.06
Rvc-project Retrieval-based-voice-con... - Insecure Deserialization
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function in vr.py. In uvr , if model_name contains the string "DeEcho", a new instance of AudioPreDeEcho class is created with the model_path attribute containing the aforementioned user input. In the AudioPreDeEcho class, the user input is used to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
CWE-502 May 05, 2025
CVE-2025-43851 9.8 CRITICAL 1 Writeup EPSS 0.06
Rvc-project Retrieval-based-voice-con... - Insecure Deserialization
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function in vr.py. In uvr , a new instance of AudioPre class is created with the model_path attribute containing the aformentioned user input. In the AudioPre class, the user input, is used to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
CWE-502 May 05, 2025
CVE-2025-43850 9.8 CRITICAL 1 Writeup EPSS 0.06
Rvc-project Retrieval-based-voice-con... - Insecure Deserialization
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info function in export.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
CWE-502 May 05, 2025
CVE-2025-43849 9.8 CRITICAL 1 Writeup EPSS 0.06
Rvc-project Retrieval-based-voice-con... - Insecure Deserialization
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_a and cpkt_b variables take user input (e.g. a path to a model) and pass it to the merge function in process_ckpt.py, which uses them to load the models on those paths with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
CWE-502 May 05, 2025
CVE-2025-43848 9.8 CRITICAL 1 Writeup EPSS 0.06
Rvc-project Retrieval-based-voice-con... - Insecure Deserialization
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path0 variable takes user input (e.g. a path to a model) and passes it to the change_info function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
CWE-502 May 05, 2025
CVE-2025-43847 9.8 CRITICAL 1 Writeup EPSS 0.06
Rvc-project Retrieval-based-voice-con... - Insecure Deserialization
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to the extract_small_model function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
CWE-502 May 05, 2025
CVE-2025-43846 9.8 CRITICAL 1 Writeup EPSS 0.06
Rvc-project Retrieval-based-voice-con... - Insecure Deserialization
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path1 variable takes user input (e.g. a path to a model) and passes it to the show_info function in process_ckpt.py, which uses it to load the model on that path with torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.
CWE-502 May 05, 2025
CVE-2025-4260 4.3 MEDIUM 1 Writeup EPSS 0.00
zhangyanbo2007 youkefu <4.2.0 - Deserialization
A vulnerability was found in zhangyanbo2007 youkefu up to 4.2.0 and classified as problematic. Affected by this issue is the function impsave of the file m\web\handler\admin\system\TemplateController.java. The manipulation of the argument dataFile leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-502 May 05, 2025