CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
2,435 results Clear all
CVE-2025-46567 6.1 MEDIUM 1 Writeup EPSS 0.00
LLaMA-Factory <1.0.0 - Deserialization
LLama Factory enables fine-tuning of large language models. Prior to version 1.0.0, a critical vulnerability exists in the `llamafy_baichuan2.py` script of the LLaMA-Factory project. The script performs insecure deserialization using `torch.load()` on user-supplied `.bin` files from an input directory. An attacker can exploit this behavior by crafting a malicious `.bin` file that executes arbitrary commands during deserialization. This issue has been patched in version 1.0.0.
CWE-502 May 01, 2025
CVE-2025-23254 8.8 HIGH EPSS 0.01
NVIDIA TensorRT-LLM - Code Execution
NVIDIA TensorRT-LLM for any platform contains a vulnerability in python executor where an attacker may cause a data validation issue by local access to the TRTLLM server. A successful exploit of this vulnerability may lead to code execution, information disclosure and data tampering.
CWE-502 May 01, 2025
CVE-2025-32444 10.0 CRITICAL 1 Writeup EPSS 0.02
Vllm < 0.8.5 - Insecure Deserialization
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5.
CWE-502 Apr 30, 2025
CVE-2025-34491 8.8 HIGH EPSS 0.01
GFI Mailessentials < 21.8 - Insecure Deserialization
GFI MailEssentials prior to version 21.8 is vulnerable to a .NET deserialization issue. A remote and authenticated attacker can execute arbitrary code by sending crafted serialized .NET when joining to a Multi-Server setup.
CWE-502 Apr 28, 2025
CVE-2025-34489 7.8 HIGH EPSS 0.00
GFI Mailessentials < 21.8 - Insecure Deserialization
GFI MailEssentials prior to version 21.8 is vulnerable to a local privilege escalation issue. A local attacker can escalate to NT Authority/SYSTEM by sending a crafted serialized payload to a .NET Remoting Service.
CWE-502 Apr 28, 2025
CVE-2023-35815 3.5 LOW EPSS 0.00
Devexpress < 21.2.12 - Insecure Deserialization
DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data.
CWE-502 Apr 28, 2025
CVE-2023-35814 3.5 LOW EPSS 0.01
Devexpress < 21.2.12 - Insecure Deserialization
DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms.
CWE-502 Apr 28, 2025
CVE-2025-2105 8.1 HIGH EPSS 0.03
Jupiter X Core <4.8.11 - Code Injection
The Jupiter X Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.8.11 via deserialization of untrusted input from the 'file' parameter of the 'raven_download_file' function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with the file download action, and the ability to upload files is also present. Otherwise, this would be considered exploitable by Contributor-level users and above, because they could create the form needed to successfully exploit this.
CWE-502 Apr 26, 2025
CVE-2025-3935 8.1 HIGH KEV EPSS 0.16
ScreenConnect <25.2.3 - Code Injection
ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.  It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.  The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.
CWE-502 Apr 25, 2025
CVE-2025-46481 7.2 HIGH EPSS 0.00
Flickr Shortcode Importer <2.2.3 - Code Injection
Deserialization of Untrusted Data vulnerability in Michael Cannon Flickr Shortcode Importer allows Object Injection. This issue affects Flickr Shortcode Importer: from n/a through 2.2.3.
CWE-502 Apr 24, 2025
CVE-2025-46473 7.2 HIGH EPSS 0.00
djjmz Social Counter <2.0.5 - Code Injection
Deserialization of Untrusted Data vulnerability in djjmz Social Counter allows Object Injection. This issue affects Social Counter: from n/a through 2.0.5.
CWE-502 Apr 24, 2025
CVE-2025-23249 7.6 HIGH EPSS 0.01
Nvidia Nemo < 25.02 - Insecure Deserialization
NVIDIA NeMo Framework contains a vulnerability where a user could cause a deserialization of untrusted data by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering.
CWE-502 Apr 22, 2025
CVE-2025-3857 7.5 HIGH EPSS 0.00
Nuget Amazon.iondotnet < 1.3.1 - Insecure Deserialization
When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. Users should upgrade to Amazon.IonDotnet version 1.3.1 and ensure any forked or derivative code is patched to incorporate the new fixes.
CWE-502 Apr 21, 2025
CVE-2025-32434 9.8 CRITICAL 4 PoCs Analysis EPSS 0.01
Linuxfoundation Pytorch < 2.6.0 - Insecure Deserialization
PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0.
CWE-502 Apr 18, 2025
CVE-2025-29953 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Apache ActiveMQ NMS OpenWire Client <2.1.1 - Deserialization
Deserialization of Untrusted Data vulnerability in Apache ActiveMQ NMS OpenWire Client. This issue affects Apache ActiveMQ NMS OpenWire Client before 2.1.1 when performing connections to untrusted servers. Such servers could abuse the unbounded deserialization in the client to provide malicious responses that may eventually cause arbitrary code execution on the client. Version 2.1.0 introduced a allow/denylist feature to restrict deserialization, but this feature could be bypassed. The .NET team has deprecated the built-in .NET binary serialization feature starting with .NET 9 and suggests migrating away from binary serialization. The project is considering to follow suit and drop this part of the NMS API altogether. Users are recommended to upgrade to version 2.1.1, which fixes the issue. We also recommend to migrate away from relying on .NET binary serialization as a hardening method for the future.
CWE-502 Apr 18, 2025
CVE-2025-39588 9.8 CRITICAL EPSS 0.00
Ultimate Store Kit Elementor Addons <2.4.0 - Code Injection
Deserialization of Untrusted Data vulnerability in bdthemes Ultimate Store Kit Elementor Addons allows Object Injection. This issue affects Ultimate Store Kit Elementor Addons: from n/a through 2.4.0.
CWE-502 Apr 17, 2025
CVE-2025-39551 9.8 CRITICAL EPSS 0.00
FluentBoards <1.48 - Code Injection
Deserialization of Untrusted Data vulnerability in Mahmudul Hasan Arif FluentBoards allows Object Injection. This issue affects FluentBoards: from n/a through 1.47.
CWE-502 Apr 17, 2025
CVE-2025-39550 9.8 CRITICAL EPSS 0.00
Shahjahan Jewel FluentCommunity <1.2.15 - Code Injection
Deserialization of Untrusted Data vulnerability in Shahjahan Jewel FluentCommunity allows Object Injection. This issue affects FluentCommunity: from n/a through 1.2.15.
CWE-502 Apr 17, 2025
CVE-2025-39527 8.8 HIGH EPSS 0.00
Rating by BestWebSoft <1.7 - Object Injection
Deserialization of Untrusted Data vulnerability in bestwebsoft Rating by BestWebSoft allows Object Injection. This issue affects Rating by BestWebSoft: from n/a through 1.7.
CWE-502 Apr 17, 2025
CVE-2025-32686 8.8 HIGH EPSS 0.00
WP Speedo Team Members <3.4.0 - Object Injection
Deserialization of Untrusted Data vulnerability in WP Speedo Team Members allows Object Injection. This issue affects Team Members: from n/a through 3.4.0.
CWE-502 Apr 17, 2025