CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
104 results Clear all
CVE-2026-28475 4.8 MEDIUM 1 Writeup EPSS 0.00
OpenClaw <2026.2.13 - Info Disclosure
OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually recover the authentication token.
CWE-208 Mar 05, 2026
CVE-2026-28464 5.9 MEDIUM 1 Writeup EPSS 0.00
OpenClaw <2026.2.12 - Info Disclosure
OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually determine the authentication token.
CWE-208 Mar 05, 2026
CVE-2025-70949 7.5 HIGH 1 Writeup EPSS 0.00
@perfood/couch-auth 0.26.0 - Info Disclosure
An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers to access sensitive information via a timing side-channel.
CWE-208 Mar 05, 2026
CVE-2026-3337 5.9 MEDIUM EPSS 0.00
AWS-LC <1.69.0 - Info Disclosure
Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis. The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
CWE-208 Mar 02, 2026
CVE-2025-48630 7.4 HIGH EPSS 0.00
SkiaRenderEngine - Info Disclosure
In drawLayersInternal of SkiaRenderEngine.cpp, there is a possible way to access the GPU cache due to side channel information disclosure. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-208 Mar 02, 2026
CVE-2026-26717 4.8 MEDIUM 1 PoC 2 Writeups Analysis EPSS 0.00
OpenFUN Richie - Auth Bypass
An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies
CWE-208 Feb 25, 2026
CVE-2026-23901 2.5 LOW EPSS 0.00
Apache Shiro <2.0.7 - Info Disclosure
Observable Timing Discrepancy vulnerability in Apache Shiro. This issue affects Apache Shiro: from 1.*, 2.* before 2.0.7. Users are recommended to upgrade to version 2.0.7 or later, which fixes the issue. Prior to Shiro 2.0.7, code paths for non-existent vs. existing users are different enough, that a brute-force attack may be able to tell, by timing the requests only, determine if the request failed because of a non-existent user vs. wrong password. The most likely attack vector is a local attack only. Shiro security model  https://shiro.apache.org/security-model.html#username_enumeration  discusses this as well. Typically, brute force attack can be mitigated at the infrastructure level.
CWE-208 Feb 10, 2026
CVE-2025-68621 7.4 HIGH EPSS 0.00
Trilium Notes <0.101.0 - Auth Bypass
Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. Prior to 0.101.0, a critical timing attack vulnerability in Trilium's sync authentication endpoint allows unauthenticated remote attackers to recover HMAC authentication hashes byte-by-byte through statistical timing analysis. This enables complete authentication bypass without password knowledge, granting full read/write access to victim's knowledge base. This vulnerability is fixed in 0.101.0.
CWE-208 Feb 06, 2026
CVE-2026-25597 5.3 MEDIUM EPSS 0.00
PrestaShop <8.2.4, <9.0.3 - Info Disclosure
PrestaShop is an open source e-commerce web application. Prior to 8.2.4 and 9.0.3, there is a time-based user enumeration vulnerability in the user authentication functionality of PrestaShop. This vulnerability allows an attacker to determine whether a customer account exists in the system by measuring response times. This vulnerability is fixed in 8.2.4 and 9.0.3.
CWE-208 Feb 06, 2026
CVE-2025-13473 5.3 MEDIUM EPSS 0.00
Django <6.0.2-4.2.28 - Info Disclosure
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
CWE-208 Feb 03, 2026
CVE-2026-23892 5.9 MEDIUM 1 Writeup EPSS 0.00
OctoPrint <1.11.5 - Info Disclosure
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up to and including 1.11.5 are affected by a (theoretical) timing attack vulnerability that allows API key extraction over the network. Due to using character based comparison that short-circuits on the first mismatched character during API key validation, rather than a cryptographical method with static runtime regardless of the point of mismatch, an attacker with network based access to an affected OctoPrint could extract API keys valid on the instance by measuring the response times of the denied access responses and guess an API key character by character. The vulnerability is patched in version 1.11.6. The likelihood of this attack actually working is highly dependent on the network's latency, noise and similar parameters. An actual proof of concept was not achieved so far. Still, as always administrators are advised to not expose their OctoPrint instance on hostile networks, especially not on the public Internet.
CWE-208 Jan 27, 2026
CVE-2025-22234 5.3 MEDIUM EPSS 0.00
Timing Attack Mitigation - Info Disclosure
The fix applied in CVE-2025-22228 inadvertently broke the timing attack mitigation implemented in DaoAuthenticationProvider. This can allow attackers to infer valid usernames or other authentication behavior via response-time differences under certain configurations.
CWE-208 Jan 22, 2026
CVE-2026-23996 3.7 LOW 1 Writeup EPSS 0.00
FastAPI Api Key <1.1.0 - Info Disclosure
FastAPI Api Key provides a backend-agnostic library that provides an API key system. Version 1.1.0 has a timing side-channel vulnerability in verify_key(). The method applied a random delay only on verification failures, allowing an attacker to statistically distinguish valid from invalid API keys by measuring response latencies. With enough repeated requests, an adversary could infer whether a key_id corresponds to a valid key, potentially accelerating brute-force or enumeration attacks. All users relying on verify_key() for API key authentication prior to the fix are affected. Users should upgrade to version 1.1.0 to receive a patch. The patch applies a uniform random delay (min_delay to max_delay) to all responses regardless of outcome, eliminating the timing correlation. Some workarounds are available. Add an application-level fixed delay or random jitter to all authentication responses (success and failure) before the fix is applied and/or use rate limiting to reduce the feasibility of statistical timing attacks.
CWE-208 Jan 21, 2026
CVE-2026-23849 5.3 MEDIUM EPSS 0.00
File Browser <2.55.0 - Info Disclosure
File Browser provides a file managing interface within a specified directory and can be used to upload, delete, preview, rename, and edit files. Prior to version 2.55.0, the JSONAuth. Auth function contains a logic flaw that allows unauthenticated attackers to enumerate valid usernames by measuring the response time of the /api/login endpoint. The vulnerability exists due to a "short-circuit" evaluation in the authentication logic. When a username is not found in the database, the function returns immediately. However, if the username does exist, the code proceeds to verify the password using bcrypt (users.CheckPwd), which is a computationally expensive operation designed to be slow. This difference in execution path creates a measurable timing discrepancy. Version 2.55.0 contains a patch for the issue.
CWE-208 Jan 19, 2026
CVE-2026-23519 9.8 CRITICAL 1 Writeup EPSS 0.00
RustCrypto CMOV <0.4.4 - Info Disclosure
RustCrypto CMOV provides conditional move CPU intrinsics which are guaranteed on major platforms to execute in constant-time and not be rewritten as branches by the compiler. Prior to 0.4.4, the thumbv6m-none-eabi (Cortex M0, M0+ and M1) compiler emits non-constant time assembly when using cmovnz (portable version). This vulnerability is fixed in 0.4.4.
CWE-208 Jan 15, 2026
CVE-2025-52457 5.7 MEDIUM EPSS 0.00
Command Centre Server <9.30.251028a - Info Disclosure
Observable Timing Discrepancy (CWE-208) in HBUS devices may allow an attacker with physical access to the device to extract device-specific keys, potentially compromising further site security. This issue affects Command Centre Server: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)), all versions of 9.00 and prior.
CWE-208 Nov 18, 2025
CVE-2025-59438 5.3 MEDIUM EPSS 0.00
Mbed TLS <3.6.4 - Info Disclosure
Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.
CWE-208 Oct 21, 2025
CVE-2025-54764 6.2 MEDIUM EPSS 0.00
Mbed TLS <3.6.5 - Info Disclosure
Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.
CWE-208 Oct 20, 2025
CVE-2025-54499 3.1 LOW EPSS 0.00
Mattermost <10.5.10, <10.11.2 - Info Disclosure
Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to use constant-time comparison for sensitive string comparisons which allows attackers to exploit timing oracles to perform byte-by-byte brute force attacks via response time analysis on Cloud API keys and OAuth client secrets
CWE-208 Oct 16, 2025
CVE-2025-9031 4.3 MEDIUM EPSS 0.00
DivvyDrive Web <4.8.2.15 - XSS
Observable Timing Discrepancy vulnerability in DivvyDrive Information Technologies Inc. DivvyDrive Web allows Cross-Domain Search Timing.This issue affects DivvyDrive Web: from 4.8.2.2 before 4.8.2.15.
CWE-208 Sep 24, 2025