CVE & Exploit Intelligence Database

Updated 37m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
2,435 results Clear all
CVE-2025-29807 8.7 HIGH EPSS 0.01
Microsoft Dataverse - Insecure Deserialization
Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute code over a network.
CWE-502 Mar 21, 2025
CVE-2025-30160 7.5 HIGH 1 Writeup EPSS 0.00
Redlib <0.36.0 - DoS
Redlib is an alternative private front-end to Reddit. A vulnerability has been identified in Redlib where an attacker can cause a denial-of-service (DOS) condition by submitting a specially crafted base2048-encoded DEFLATE decompression bomb to the restore_preferences form. This leads to excessive memory consumption and potential system instability, which can be exploited to disrupt Redlib instances. This vulnerability is fixed in 0.36.0.
CWE-502 Mar 20, 2025
CVE-2025-23120 8.8 HIGH EPSS 0.26
Veeam Backup & Replication < 12.3.1.1139 - Insecure Deserialization
A vulnerability allowing remote code execution (RCE) for domain users.
CWE-502 Mar 20, 2025
CVE-2024-13921 7.2 HIGH EPSS 0.01
Webtoffee Order Export & Order Import... - Insecure Deserialization
The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.0 via deserialization of untrusted input from the 'form_data' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE-502 Mar 20, 2025
CVE-2024-9701 9.8 CRITICAL 1 Writeup EPSS 0.01
Pypi Kedro < 0.19.9 - Insecure Deserialization
A Remote Code Execution (RCE) vulnerability has been identified in the Kedro ShelveStore class (version 0.19.8). This vulnerability allows an attacker to execute arbitrary Python code via deserialization of malicious payloads, potentially leading to a full system compromise. The ShelveStore class uses Python's shelve module to manage session data, which relies on pickle for serialization. Crafting a malicious payload and storing it in the shelve file can lead to RCE when the payload is deserialized.
CWE-502 Mar 20, 2025
CVE-2024-9070 9.8 CRITICAL EPSS 0.00
Pypi Bentoml - Insecure Deserialization
A deserialization vulnerability exists in BentoML's runner server in bentoml/bentoml versions <=1.3.4.post1. By setting specific parameters, an attacker can execute unauthorized arbitrary code on the server, causing severe harm. The vulnerability is triggered when the args-number parameter is greater than 1, leading to automatic deserialization and arbitrary code execution.
CWE-502 Mar 20, 2025
CVE-2024-9053 9.8 CRITICAL EPSS 0.02
Vllm - Insecure Deserialization
vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.
CWE-502 Mar 20, 2025
CVE-2024-8502 9.8 CRITICAL EPSS 0.00
modelscope/agentscope <0.0.6a3 - RCE
A vulnerability in the RpcAgentServerLauncher class of modelscope/agentscope v0.0.6a3 allows for remote code execution (RCE) via deserialization of untrusted data using the dill library. The issue occurs in the AgentServerServicer.create_agent method, where serialized input is deserialized using dill.loads, enabling an attacker to execute arbitrary commands on the server.
CWE-502 Mar 20, 2025
CVE-2024-12433 9.8 CRITICAL 1 Writeup EPSS 0.02
Infiniflow Ragflow < 0.14.0 - Insecure Deserialization
A vulnerability in infiniflow/ragflow versions v0.12.0 allows for remote code execution. The RPC server in RagFlow uses a hard-coded AuthKey 'authkey=b'infiniflow-token4kevinhu'' which can be easily fetched by attackers to join the group communication without restrictions. Additionally, the server processes incoming data using pickle deserialization via `pickle.loads()` on `connection.recv()`, making it vulnerable to remote code execution. This issue is fixed in version 0.14.0.
CWE-502 Mar 20, 2025
CVE-2024-12044 9.8 CRITICAL EPSS 0.02
open-mmlab/mmdetection <3.3.0 - RCE
A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the `pickle.loads()` function in the `all_reduce_dict()` distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network.
CWE-502 Mar 20, 2025
CVE-2024-12029 9.8 CRITICAL 1 PoC Analysis EPSS 0.49
Pypi Invokeai < 5.4.3rc2 - Insecure Deserialization
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.
CWE-502 Mar 20, 2025
CVE-2024-11041 9.8 CRITICAL EPSS 0.01
Vllm - Insecure Deserialization
vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.
CWE-502 Mar 20, 2025
CVE-2024-11039 8.8 HIGH 1 Writeup EPSS 0.01
Binary-husky Gpt Academic < 3.91 - Insecure Deserialization
A pickle deserialization vulnerability exists in the Latex English error correction plug-in function of binary-husky/gpt_academic versions up to and including 3.83. This vulnerability allows attackers to achieve remote command execution by deserializing untrusted data. The issue arises from the inclusion of numpy in the deserialization whitelist, which can be exploited by constructing a malicious compressed package containing a merge_result.pkl file and a merge_proofread_en.tex file. The vulnerability is fixed in commit 91f5e6b.
CWE-502 Mar 20, 2025
CVE-2024-10553 9.8 CRITICAL 1 Writeup EPSS 0.04
H2o < 3.46.0.6 - Insecure Deserialization
A vulnerability in the h2oai/h2o-3 REST API versions 3.46.0.4 allows unauthenticated remote attackers to execute arbitrary code via deserialization of untrusted data. The vulnerability exists in the endpoints POST /99/ImportSQLTable and POST /3/SaveToHiveTable, where user-controlled JDBC URLs are passed to DriverManager.getConnection, leading to deserialization if a MySQL or PostgreSQL driver is available in the classpath. This issue is fixed in version 3.47.0.
CWE-502 Mar 20, 2025
CVE-2024-10190 9.8 CRITICAL EPSS 0.01
Horovod <0.28.1 - RCE
Horovod versions up to and including v0.28.1 are vulnerable to unauthenticated remote code execution. The vulnerability is due to improper handling of base64-encoded data in the `ElasticRendezvousHandler`, a subclass of `KVStoreHandler`. Specifically, the `_put_value` method in `ElasticRendezvousHandler` calls `codec.loads_base64(value)`, which eventually invokes `cloudpickle.loads(decoded)`. This allows an attacker to send a malicious pickle object via a PUT request, leading to arbitrary code execution on the server.
CWE-502 Mar 20, 2025
CVE-2024-47552 9.8 CRITICAL EPSS 0.00
Apache Seata <2.2.0 - Deserialization
Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): from 2.0.0 before 2.2.0. Users are recommended to upgrade to version 2.2.0, which fixes the issue.
CWE-502 Mar 20, 2025
CVE-2025-27781 9.8 CRITICAL 1 Writeup EPSS 0.05
Applio < 3.2.8-bugfix - Insecure Deserialization
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in inference.py. `model_file` in inference.py as well as `model_file` in tts.py take user-supplied input (e.g. a path to a model) and pass that value to the `change_choices` and later to `get_speakers_id` function, which loads that model with `torch.load` in inference.py (line 326 in 3.2.8-bugfix), which is vulnerable to unsafe deserialization. The issue can lead to remote code execution. A patch is available on the `main` branch of the repository.
CWE-502 Mar 19, 2025
CVE-2025-27780 9.8 CRITICAL 1 Writeup EPSS 0.05
Applio < 3.2.8-bugfix - Insecure Deserialization
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. `model_name` in model_information.py takes user-supplied input (e.g. a path to a model) and pass that value to the `run_model_information_script` and later to `model_information` function, which loads that model with `torch.load` in rvc/train/process/model_information.py (on line 16 in 3.2.8-bugfix), which is vulnerable to unsafe deserialization. The issue can lead to remote code execution. A patch is available in the `main` branch of the repository.
CWE-502 Mar 19, 2025
CVE-2025-27779 9.8 CRITICAL 1 Writeup EPSS 0.05
Applio < 3.2.8-bugfix - Insecure Deserialization
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `model_blender.py` lines 20 and 21. `model_fusion_a` and `model_fusion_b` from voice_blender.py take user-supplied input (e.g. a path to a model) and pass that value to the `run_model_blender_script` and later to `model_blender` function, which loads these two models with `torch.load` in `model_blender.py (on lines 20-21 in 3.2.8-bugfix), which is vulnerable to unsafe deserialization. The issue can lead to remote code execution. A patch is available on the `main` branch of the Applio repository.
CWE-502 Mar 19, 2025
CVE-2025-27778 9.8 CRITICAL 1 Writeup EPSS 0.03
Applio < 3.2.8-bugfix - Insecure Deserialization
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `infer.py`. The issue can lead to remote code execution. As of time of publication, a fix is available on the `main` branch of the Applio repository but not attached to a numbered release.
CWE-502 Mar 19, 2025