CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
2,430 results Clear all
CVE-2025-67996 9.8 CRITICAL EPSS 0.00
BoldThemes Nestin <1.2.6 - Deserialization
Deserialization of Untrusted Data vulnerability in BoldThemes Nestin nestin allows Object Injection.This issue affects Nestin: from n/a through < 1.2.6.
CWE-502 Feb 20, 2026
CVE-2025-67995 9.8 CRITICAL EPSS 0.00
LoftOcean PatioTime <2.1 - Deserialization
Deserialization of Untrusted Data vulnerability in LoftOcean PatioTime patiotime allows Object Injection.This issue affects PatioTime: from n/a through < 2.1.
CWE-502 Feb 20, 2026
CVE-2026-27475 8.1 HIGH EPSS 0.00
SPIP <4.4.9 - Deserialization
SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior access or another vulnerability) can trigger arbitrary object instantiation and potentially achieve code execution. The use of serialized data in these components has been deprecated and will be removed in SPIP 5. This vulnerability is not mitigated by the SPIP security screen.
CWE-502 Feb 19, 2026
CVE-2026-25316 7.2 HIGH EPSS 0.00
CartFlows <=2.1.19 - Deserialization
Deserialization of Untrusted Data vulnerability in Brainstorm Force CartFlows cartflows allows Object Injection.This issue affects CartFlows: from n/a through <= 2.1.19.
CWE-502 Feb 19, 2026
CVE-2026-23549 9.8 CRITICAL EPSS 0.00
WpEvently <=5.1.1 - Deserialization
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.1.1.
CWE-502 Feb 19, 2026
CVE-2026-23544 8.8 HIGH EPSS 0.00
Valenti <=5.6.3.5 - Deserialization
Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection.This issue affects Valenti: from n/a through <= 5.6.3.5.
CWE-502 Feb 19, 2026
CVE-2026-23542 9.8 CRITICAL EPSS 0.00
ThemeGoods Grand Restaurant <=7.0.10 - Deserialization
Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through <= 7.0.10.
CWE-502 Feb 19, 2026
CVE-2026-22333 7.2 HIGH EPSS 0.00
YITH WooCommerce Compare <=3.6.0 - Deserialization
Deserialization of Untrusted Data vulnerability in YITHEMES YITH WooCommerce Compare yith-woocommerce-compare allows Object Injection.This issue affects YITH WooCommerce Compare: from n/a through <= 3.6.0.
CWE-502 Feb 19, 2026
CVE-2025-15579 EPSS 0.00
OpenText Directory Services 10.5-26.1 - Deserialization
Deserialization of Untrusted Data vulnerability in OpenText™ Directory Services allows Object Injection.  The vulnerability could lead to remote code execution, denial of service, or privilege escalation. This issue affects Directory Services: before 24.4.16, from 25.1 before 25.1.9, from 25.2 before 25.2.9, from 25.3 before 25.3.8, from 25.4 before 25.4.5, from 26.1 before 26.1.2.
CWE-502 Feb 18, 2026
CVE-2026-1426 8.8 HIGH EPSS 0.00
Advanced AJAX Product Filters <=3.1.9.6 - Deserialization
The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibility layer. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. Note: This vulnerability requires the Live Composer plugin to also be installed and active.
CWE-502 Feb 18, 2026
CVE-2025-60038 7.8 HIGH EPSS 0.00
Rexroth IndraWorks - Deserialization RCE
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks.
CWE-502 Feb 18, 2026
CVE-2025-60037 7.8 HIGH EPSS 0.00
Rexroth IndraWorks - Deserialization RCE
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks.
CWE-502 Feb 18, 2026
CVE-2025-60036 7.8 HIGH EPSS 0.00
Rexroth IndraWorks <15V24 - Deserialization
A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running the UA.Testclient.
CWE-502 Feb 18, 2026
CVE-2025-60035 7.8 HIGH EPSS 0.00
Rexroth IndraWorks <15V24 - Deserialization
A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running the OPC.Testclient.
CWE-502 Feb 18, 2026
CVE-2025-33253 7.8 HIGH EPSS 0.00
NVIDIA NeMo Framework - RCE
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
CWE-502 Feb 18, 2026
CVE-2025-33252 7.8 HIGH EPSS 0.00
NVIDIA NeMo Framework - RCE
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
CWE-502 Feb 18, 2026
CVE-2025-33245 8.0 HIGH EPSS 0.00
NVIDIA NeMo Framework - RCE
NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
CWE-502 Feb 18, 2026
CVE-2025-33243 7.8 HIGH EPSS 0.00
NVIDIA NeMo Framework - RCE
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
CWE-502 Feb 18, 2026
CVE-2025-33241 7.8 HIGH EPSS 0.00
NVIDIA NeMo Framework - RCE
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
CWE-502 Feb 18, 2026
CVE-2026-26220 1 Writeup EPSS 0.01
LightLLM <=1.1.0 - Unauthenticated RCE
LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.
CWE-502 Feb 17, 2026