CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
4,436 results Clear all
CVE-2025-62166 7.5 HIGH 1 Writeup
FreshRSS <1.28.0 - Auth Bypass
FreshRSS is a free, self-hostable RSS aggregator. Prior 1.28.0, a bug in the auth logic related to master authentication tokens, this restriction is bypassed. Usually only the default user's feed should be viewable if anonymous viewing is enabled, and feeds of other users should be private. This vulnerability is fixed in 1.28.0.
CWE-639 Mar 09, 2026
CVE-2026-3800 6.3 MEDIUM 1 Writeup EPSS 0.00
janobe Resort Reservation System 1.0 - Unrestricted Upload
A vulnerability has been found in SourceCodester/janobe Resort Reservation System 1.0. Affected is the function doInsert of the file /controller.php?action=add. Such manipulation of the argument image leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
CWE-284 Mar 09, 2026
CVE-2026-3797 6.3 MEDIUM EPSS 0.00
Tiandy Video Surveillance System 7.17.0 - Unrestricted Upload
A security vulnerability has been detected in Tiandy Video Surveillance System 视频监控平台 7.17.0. The impacted element is the function uploadFile of the file /src/com/tiandy/easy7/core/rest/CLS_REST_File.java. The manipulation of the argument fileName leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-284 Mar 09, 2026
CVE-2026-3796 5.3 MEDIUM 1 Writeup EPSS 0.00
Qi-ANXIN QAX Virus Removal - Privilege Escalation
A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. The affected element is the function ZwTerminateProcess in the library QKSecureIO_Imp.sys of the component Mini Filter Driver. Executing a manipulation can lead to improper access controls. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-284 Mar 09, 2026
CVE-2026-3749 6.3 MEDIUM EPSS 0.00
Bytedesk <=1.3.9 - Unrestricted Upload
A weakness has been identified in Bytedesk up to 1.3.9. This vulnerability affects the function handleFileUpload of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestService.java of the component SVG File Handler. Executing a manipulation can lead to unrestricted upload. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 1.4.5.1 is able to resolve this issue. This patch is called 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component.
CWE-284 Mar 08, 2026
CVE-2026-3748 6.3 MEDIUM EPSS 0.00
Bytedesk <=1.3.9 - Unrestricted Upload
A security flaw has been discovered in Bytedesk up to 1.3.9. This affects the function uploadFile of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestController.java of the component SVG File Handler. Performing a manipulation results in unrestricted upload. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.4.5.1 is able to mitigate this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is recommended.
CWE-284 Mar 08, 2026
CVE-2026-30859 5.3 MEDIUM EPSS 0.00
WeKnora <0.2.12 - Privilege Escalation
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a broken access control vulnerability in the database query tool allows any authenticated tenant to read sensitive data belonging to other tenants, including API keys, model configurations, and private messages. The application fails to enforce tenant isolation on critical tables (models, messages, embeddings), enabling unauthorized cross-tenant data access with user-level authentication privileges. This issue has been patched in version 0.2.12.
CWE-284 Mar 07, 2026
CVE-2026-30855 8.8 HIGH EPSS 0.00
WeKnora <0.3.2 - Privilege Escalation
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical. This issue has been patched in version 0.3.2.
CWE-284 Mar 07, 2026
CVE-2026-3668 3.1 LOW EPSS 0.00
Freedom Factory dGEN1 <=20260221 - Auth Bypass
A weakness has been identified in Freedom Factory dGEN1 up to 20260221. This affects the function AndroidEthereum of the component org.ethosmobile.webpwaemul. This manipulation causes improper access controls. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-284 Mar 07, 2026
CVE-2026-30244 7.5 HIGH EPSS 0.00
Plane <1.2.2 - Info Disclosure
Plane is an an open-source project management tool. Prior to version 1.2.2, unauthenticated attackers can enumerate workspace members and extract sensitive information including email addresses, user roles, and internal identifiers. The vulnerability stems from Django REST Framework permission classes being incorrectly configured to allow anonymous access to protected endpoints. This issue has been patched in version 1.2.2.
CWE-200 Mar 06, 2026
CVE-2025-70363 7.5 HIGH EPSS 0.00
eZ Platform 2.x - Info Disclosure
Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ciril Platform 2.x allows unauthenticated attackers to access sensitive data via enumerating object IDs.
CWE-284 Mar 06, 2026
CVE-2026-29061 5.4 MEDIUM EPSS 0.00
Gokapi <2.2.3 - Privilege Escalation
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a privilege escalation vulnerability in the user rank demotion logic allows a demoted user's existing API keys to retain ApiPermManageFileRequests and ApiPermManageLogs permissions, enabling continued access to upload-request management and log viewing endpoints after the user has been stripped of all privileges. This issue has been patched in version 2.2.3.
CWE-284 Mar 06, 2026
CVE-2026-29060 5.0 MEDIUM EPSS 0.00
Gokapi <2.2.3 - Privilege Escalation
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a registered user without privileges to create or modify file requests is able to create a short-lived API key that has the permission to do so. The user must be registered with Gokapi. If there are no users with access to the admin/upload menu, there is no impact. This issue has been patched in version 2.2.3.
CWE-284 Mar 06, 2026
CVE-2026-28682 6.4 MEDIUM EPSS 0.00
Gokapi <2.2.3 - Info Disclosure
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the upload status SSE implementation on /uploadStatus publishes global upload state to any authenticated listener and includes file_id values that are not scoped to the requesting user. This issue has been patched in version 2.2.3.
CWE-284 Mar 06, 2026
CVE-2026-25877 6.5 MEDIUM EPSS 0.00
Chartbrew <4.8.1 - Privilege Escalation
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.1, the application performs authorization checks based solely on the project_id parameter when handling chart-related operations (update, delete, etc.). No authorization check is performed against the chart_id itself. This allows an authenticated user who has access to any project to manipulate or access charts belonging to other users/ project. This issue has been patched in version 4.8.1.
CWE-284 Mar 06, 2026
CVE-2026-29188 9.1 CRITICAL 1 Writeup EPSS 0.00
File Browser <2.61.1 - Privilege Escalation
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.1, a broken access control vulnerability in the TUS protocol DELETE endpoint allows authenticated users with only Create permission to delete arbitrary files and directories within their scope, bypassing the intended Delete permission restriction. Any multi-user deployment where administrators explicitly restrict file deletion for certain users is affected. This issue has been patched in version 2.61.1.
CWE-284 Mar 05, 2026
CVE-2026-29077 7.1 HIGH EPSS 0.00
Frappe <15.98.0/14.100.0 - Privilege Escalation
Frappe is a full-stack web application framework. Prior to versions 15.98.0 and 14.100.0, due to a lack of validation when sharing documents, a user could share a document with a permission that they themselves didn't have. This issue has been patched in versions 15.98.0 and 14.100.0.
CWE-284 Mar 05, 2026
CVE-2026-28410 1 Writeup EPSS 0.00
The Graph <3.0.0 - Auth Bypass
The Graph is an indexing protocol for querying networks like Ethereum, IPFS, Polygon, and other blockchains. Prior to version 3.0.0, a flaw in the token vesting contracts allows users to access tokens that should still be locked according to their vesting schedule. This issue has been patched in version 3.0.0.
CWE-682 Mar 05, 2026
CVE-2025-70614 8.1 HIGH EPSS 0.00
OpenCode Systems OC Messaging 6.32.2 - Privilege Escalation
OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken access control vulnerability in the web-based control panel allowing authenticated low-privileged attackers to gain to access to arbitrary SMS messages via a crafted company or tenant identifier parameter.
CWE-284 Mar 05, 2026
CVE-2026-28790 7.5 HIGH 1 Writeup EPSS 0.00
OliveTin <3000.11.0 - DoS
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.0, OliveTin allows an unauthenticated guest to terminate running actions through KillAction even when authRequireGuestsToLogin: true is enabled. Guests are correctly blocked from dashboard access, but can still call the KillAction RPC directly and successfully stop a running action. This is a broken access control issue that causes unauthorized denial of service against legitimate action executions. This issue has been patched in version 3000.11.0.
CWE-863 Mar 05, 2026