CVE & Exploit Intelligence Database

Updated 42m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
128 results Clear all
CVE-2026-28358 5.3 MEDIUM EPSS 0.00
NocoDB <0.301.3 - Info Disclosure
NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, the password forgot endpoint returned different responses for registered and unregistered emails, allowing user enumeration. This issue has been patched in version 0.301.3.
CWE-204 Mar 02, 2026
CVE-2026-28288 5.3 MEDIUM EPSS 0.00
Dify <1.9.0 - Info Disclosure
Dify is an open-source LLM app development platform. Prior to 1.9.0, responses from the Dify API to existing and non-existent accounts differ, allowing an attacker to enumerate email addresses registered with Dify. Version 1.9.0 fixes the issue.
CWE-204 Feb 27, 2026
CVE-2026-25138 5.3 MEDIUM EPSS 0.00
Rucio <35.8.3/<38.5.4/<39.3.1 - Info Disclosure
Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Prior to versions 35.8.3, 38.5.4, and 39.3.1, the WebUI login endpoint returns distinct error messages depending on whether a supplied username exists, allowing unauthenticated attackers to enumerate valid usernames. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue.
CWE-204 Feb 25, 2026
CVE-2025-62512 5.3 MEDIUM EPSS 0.00
Piwigo 15.5.0 - Info Disclosure
Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlier 15.x releases, the password reset functionality in Piwigo allows an unauthenticated attacker to determine whether a given username or email address exists in the system. The endpoint at password.php?action=lost returns distinct messages for valid vs. invalid accounts, enabling user enumeration. As of time of publication, no known patches are available.
CWE-204 Feb 24, 2026
CVE-2026-27480 5.3 MEDIUM 1 Writeup EPSS 0.00
Static Web Server 2.1.0-2.40.1 - Auth Bypass
Static Web Server (SWS) is a production-ready web server suitable for static web files or assets. In versions 2.1.0 through 2.40.1, a timing-based username enumeration vulnerability in Basic Authentication allows attackers to identify valid users by exploiting early responses for invalid usernames, enabling targeted brute-force or credential-stuffing attacks. SWS checks whether a username exists before verifying the password, causing valid usernames to follow a slower code path (e.g., bcrypt hashing) while invalid usernames receive an immediate 401 response. This timing discrepancy allows attackers to enumerate valid accounts by measuring response-time differences. This issue has been fixed in version 2.41.0.
CWE-204 Feb 21, 2026
CVE-2026-26744 5.3 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
FormaLMS <4.1.18 - Info Disclosure
A user enumeration vulnerability exists in FormaLMS 4.1.18 and below in the password recovery functionality accessible via the /lostpwd endpoint. The application returns different error messages for valid and invalid usernames allowing an unauthenticated attacker to determine which usernames are registered in the system through observable response discrepancy.
CWE-204 Feb 19, 2026
CVE-2019-25338 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
DokuWiki 2018-04-22b - Info Disclosure
DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functionality that allows attackers to identify valid user accounts. Attackers can submit different usernames to the password reset endpoint and distinguish between existing and non-existing accounts by analyzing the server's error response messages.
CWE-204 Feb 12, 2026
CVE-2026-25509 5.3 MEDIUM 1 Writeup EPSS 0.00
Ci4-cms-erp Ci4ms < 0.28.5.0 - Information Disclosure
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, the authentication implementation in CI4MS is vulnerable to email enumeration. An unauthenticated attacker can determine whether an email address is registered in the system by analyzing the application's response during the password reset process. This issue has been patched in version 0.28.5.0.
CWE-203 Feb 03, 2026
CVE-2026-24664 5.3 MEDIUM EPSS 0.00
Open eClass <4.2 - Info Disclosure
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a username enumeration vulnerability allows unauthenticated attackers to identify valid user accounts by analyzing differences in the login response behavior. This issue has been patched in version 4.2.
CWE-204 Feb 03, 2026
CVE-2026-24332 4.3 MEDIUM EPSS 0.00
Discord - Info Disclosure
Discord through 2026-01-16 allows gathering information about whether a user's client state is Invisible (and not actually offline) because the response to a WebSocket API request includes the user in the presences array (with "status": "offline"), whereas offline users are omitted from the presences array. This is arguably inconsistent with the UI description of Invisible as "You will appear offline."
CWE-204 Jan 22, 2026
CVE-2026-23511 5.3 MEDIUM 1 Writeup EPSS 0.00
ZITADEL <4.9.1, 3.4.6 - Info Disclosure
ZITADEL is an open source identity management platform. Prior to 4.9.1 and 3.4.6, a user enumeration vulnerability has been discovered in Zitadel's login interfaces. An unauthenticated attacker can exploit this flaw to confirm the existence of valid user accounts by iterating through usernames and userIDs. This vulnerability is fixed in 4.9.1 and 3.4.6.
CWE-204 Jan 15, 2026
CVE-2026-21484 5.3 MEDIUM 1 Writeup EPSS 0.00
AnythingLLM <e287fab56089cf8fcea9ba579a3ecdeca0daa313 - Info Disclo...
AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. Prior to commit e287fab56089cf8fcea9ba579a3ecdeca0daa313, the password recovery endpoint returns different error messages depending on whether a username exists, so enabling username enumeration. Commit e287fab56089cf8fcea9ba579a3ecdeca0daa313 fixes this issue.
CWE-204 Jan 03, 2026
CVE-2025-69413 5.3 MEDIUM EPSS 0.00
Gitea <1.25.2 - Info Disclosure
In Gitea before 1.25.2, /api/v1/user has different responses for failed authentication depending on whether a username exists.
CWE-204 Jan 01, 2026
CVE-2025-67874 6.5 MEDIUM 1 Writeup EPSS 0.00
Churchcrm < 6.5.0 - XSS
ChurchCRM is an open-source church management system. Prior to version 6.5.0, the application echoes back plaintext passwords submitted by users in subsequent HTTP responses. This information disclosure significantly increases the risk of credential compromise and may amplify the impact of other vulnerabilities (e.g., XSS, IDOR, session fixation), enabling attackers to harvest other users’ passwords. Version 6.5.0 fixes the issue.
CWE-204 Dec 16, 2025
CVE-2025-62181 5.3 MEDIUM EPSS 0.00
Pega Platform <25.1.0 - Info Disclosure
Pega Platform versions 7.1.0 through Infinity 25.1.0 are affected by a User Enumeration. This issue occurs during user authentication process, where a difference in response time could allow a remote unauthenticated user to determine if a username is valid or not. This only applies to deprecated basic-authentication feature and other more secure authentication mechanisms are recommended. A fix is being provided in the 24.1.4, 24.2.4, and 25.1.1 patch releases. Please note: Basic credentials authentication service type is deprecated started in 24.2 version: https://docs.pega.com/bundle/platform/page/platform/release-notes/security/whats-new-security-242.html.
CWE-204 Dec 10, 2025
CVE-2025-67500 3.7 LOW EPSS 0.00
Mastodon <4.2.27, <4.3.0-beta.1-4.3.14, <4.4.0-beta.1-4.4.9, <4.5.0...
Mastodon is a free, open-source social network server based on ActivityPub. Versions 4.2.27 and prior, 4.3.0-beta.1 through 4.3.14, 4.4.0-beta.1 through 4.4.9, 4.5.0-beta.1 through 4.5.2 have discrepancies in error handling which allow checking whether a given status exists by sending a request with a non-English Accept-Language header. Using this behavior, an attacker who knows the identifier of a particular status they are not allowed to see can confirm whether this status exists or not. This cannot be used to learn the contents of the status or any other property besides its existence. This issue is fixed in versions 4.2.28, 4.3.15, 4.4.10 and 4.5.3.
CWE-204 Dec 10, 2025
CVE-2021-47717 1 PoC Analysis EPSS 0.00
IntelliChoice eFORCE Software Suite 2.5.9 - Info Disclosure
IntelliChoice eFORCE Software Suite 2.5.9 contains a username enumeration vulnerability that allows attackers to enumerate valid users by exploiting the 'ctl00$MainContent$UserName' POST parameter. Attackers can send requests with valid usernames to retrieve user information.
CWE-204 Dec 09, 2025
CVE-2025-40806 5.3 MEDIUM EPSS 0.00
Gridscale X Prepay <V4.2.1 - Info Disclosure
A vulnerability has been identified in Gridscale X Prepay (All versions < V4.2.1). The affected application is vulnerable to user enumeration due to distinguishable responses. This could allow an unauthenticated remote attacker to determine if a user is valid or not, enabling a brute force attack with valid users.
CWE-204 Dec 09, 2025
CVE-2025-65899 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Kalmia CMS 0.2.0 - Info Disclosure
Kalmia CMS version 0.2.0 contains a user enumeration vulnerability in its authentication mechanism. The application returns different error messages for invalid users (user_not_found) versus valid users with incorrect passwords (invalid_password). This observable response discrepancy allows unauthenticated attackers to enumerate valid usernames on the system.
CWE-204 Dec 04, 2025
CVE-2025-12994 5.3 MEDIUM EPSS 0.00
Medtronic CareLink Network <December 4, 2025 - Info Disclosure
Medtronic CareLink Network allows an unauthenticated remote attacker to initiate a request for security questions to an API endpoint that could be used to determine a valid user account. This issue affects CareLink Network: before December 4, 2025.
CWE-204 Dec 04, 2025