CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
4,084 results Clear all
CVE-2026-25893 9.8 CRITICAL 1 Writeup EPSS 0.00
Frangoteam Fuxa < 1.2.10 - Improper Authorization
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior to 1.2.10, an authentication bypass vulnerability in FUXA allows an unauthenticated, remote attacker to gain administrative access via the heartbeat refresh API and execute arbitrary code on the server. This issue has been patched in FUXA version 1.2.10.
CWE-287 Feb 09, 2026
CVE-2025-10463 7.3 HIGH EPSS 0.00
Birtech Senseway <09022026 - Auth Bypass
Improper Authentication vulnerability in Birtech Information Technologies Industry and Trade Ltd. Co. Senseway allows Authentication Abuse.This issue affects Senseway: through 09022026.  NOTE: Because the product was developed using outdated technology, the manufacturer is unable to fix the relevant vulnerabilities. Users of the Sensaway application are advised to contact the manufacturer and review updated products developed with newer technology.
CWE-287 Feb 09, 2026
CVE-2026-2174 7.3 HIGH EPSS 0.00
Fabian Contact Management System - Authentication Bypass
A security flaw has been discovered in code-projects Contact Management System 1.0. This affects an unknown part of the component CRUD Endpoint. The manipulation of the argument ID results in improper authentication. The attack may be launched remotely.
CWE-287 Feb 08, 2026
CVE-2026-2165 7.3 HIGH 2 Writeups EPSS 0.00
detronetdip E-commerce 1.0.0 - Info Disclosure
A weakness has been identified in detronetdip E-commerce 1.0.0. Impacted is an unknown function of the file /Admin/assets/backend/seller/add_seller.php of the component Account Creation Endpoint. Executing a manipulation of the argument email can lead to missing authentication. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CWE-287 Feb 08, 2026
CVE-2026-25804 9.1 CRITICAL 1 Writeup EPSS 0.00
Antrea < 2.3.2 - Authentication Bypass
Antrea is a Kubernetes networking solution intended to be Kubernetes native. Prior to versions 2.3.2 and 2.4.3, Antrea's network policy priority assignment system has a uint16 arithmetic overflow bug that causes incorrect OpenFlow priority calculations when handling a large numbers of policies with various priority values. This results in potentially incorrect traffic enforcement. This issue has been patched in versions 2.4.3.
CWE-770 Feb 06, 2026
CVE-2026-2065 6.3 MEDIUM 1 Writeup EPSS 0.00
Flycatcher Toys smART Pixelator 2.0 - Auth Bypass
A security flaw has been discovered in Flycatcher Toys smART Pixelator 2.0. Affected by this issue is some unknown functionality of the component Bluetooth Low Energy Interface. Performing a manipulation results in missing authentication. The attack can only be performed from the local network. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-306 Feb 06, 2026
CVE-2025-64175 8.8 HIGH EPSS 0.00
Gogs < 0.13.4 - Authentication Bypass
Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, Gogs’ 2FA recovery code validation does not scope codes by user, enabling cross-account bypass. If an attacker knows a victim’s username and password, they can use any unused recovery code (e.g., from their own account) to bypass the victim’s 2FA. This enables full account takeover and renders 2FA ineffective in all environments where it's enabled.. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
CWE-287 Feb 06, 2026
CVE-2025-70841 10.0 CRITICAL 1 Writeup EPSS 0.00
Amcoders Dokans - Authentication Bypass
Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption key (APP_KEY), database credentials, SMTP/SendGrid API credentials, and internal configuration parameters, enabling complete system compromise including authentication bypass via session token forgery, direct database access to all tenant data, and email infrastructure takeover. Due to the multi-tenancy architecture, this vulnerability affects all tenants in the system.
CWE-287 Feb 03, 2026
CVE-2026-1568 9.6 CRITICAL EPSS 0.00
Rapid7 InsightVM <8.34.0 - Privilege Escalation
Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup via "Security Console" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies that granted access to the targeted user accounts. This has been fixed in version 8.34.0 of InsightVM.
CWE-287 Feb 03, 2026
CVE-2026-1743 3.1 LOW 1 Writeup EPSS 0.00
DJI Mavic Mini, Air, Spark and Mini SE <01.00.0500 - Auth Bypass
A vulnerability has been found in DJI Mavic Mini, Air, Spark and Mini SE up to 01.00.0500. Affected by this vulnerability is an unknown functionality of the component Enhanced Wi-Fi Pairing. The manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-287 Feb 02, 2026
CVE-2026-1740 7.3 HIGH EPSS 0.00
EFM ipTIME A8004T <14.18.2 - Auth Bypass
A vulnerability was found in EFM ipTIME A8004T 14.18.2. This impacts the function httpcon_check_session_url of the file /cgi/timepro.cgi of the component Hidden Hiddenloginsetup Interface. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-287 Feb 02, 2026
CVE-2025-62349 6.2 MEDIUM EPSS 0.00
Pypi Salt < 3006.17 - Authentication Bypass
Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues.
CWE-287 Jan 30, 2026
CVE-2025-6723 EPSS 0.00
Chef InSpec <5.23 - Privilege Escalation
Chef InSpec versions up to 5.23 and before 7.0.107 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption. This issue affects Chef Inspec: through 5.23 and before 7.0.107
CWE-287 Jan 30, 2026
CVE-2026-22764 4.3 MEDIUM EPSS 0.00
Dell Openmanage Network Integration < 3.9 - Authentication Bypass
Dell OpenManage Network Integration, versions prior to 3.9, contains an Improper Authentication vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
CWE-287 Jan 29, 2026
CVE-2025-12810 6.5 MEDIUM EPSS 0.00
Delinea Inc. Secret Server On-Prem - Improper Authentication
Improper Authentication vulnerability in Delinea Inc. Secret Server On-Prem (RPC Password Rotation modules).This issue affects Secret Server On-Prem: 11.8.1, 11.9.6, 11.9.25. A secret with "change password on check in" enabled automatically checks in even when the password change fails after reaching its retry limit. This leaves the secret in an inconsistent state with the wrong password. Remediation: Upgrade to 11.9.47 or later. The secret will remain checked out when the password change fails.
CWE-287 Jan 27, 2026
CVE-2026-24003 4.3 MEDIUM 1 Writeup EPSS 0.00
EVerest <2025.12.1 - Auth Bypass
EVerest is an EV charging software stack. In versions up to and including 2025.12.1, it is possible to bypass the sequence state verification including authentication, and send requests that transition to forbidden states relative to the current one, thereby updating the current context with illegitimate data.cThanks to the modular design of EVerest, authorization is handled in a separate module and EVSEManager Charger internal state machine cannot transition out of the `WaitingForAuthentication` state through ISO 15118-2 communication. From this state, it was however possible through ISO 15118-2 messages which are published to the MQTT server to trick it into preparing to charge, and even to prepare to send current. The final requirement to actually send current to the EV was the closure of the contactors, which does not appear to be possible without leaving the `WaitingForAuthentication` state and leveraging ISO 15118-2 messages. As of time of publication, no fixed versions are available.
CWE-863 Jan 26, 2026
CVE-2026-1410 6.4 MEDIUM EPSS 0.00
Beetel 777vr1 Firmware < 01.00.09_55 - Missing Authentication
A vulnerability was detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. Impacted is an unknown function of the component UART Interface. The manipulation results in missing authentication. An attack on the physical device is feasible. This attack is characterized by high complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-306 Jan 26, 2026
CVE-2026-0633 3.7 LOW EPSS 0.00
MetForm <4.1.0 - Info Disclosure
The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This makes it possible for unauthenticated attackers to access form submission entry data via MetForm shortcodes for entries created within the transient TTL (default is 15 minutes).
CWE-287 Jan 24, 2026
CVE-2022-25369 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.80
Dynamicweb <9.12.8 - Auth Bypass
An issue was discovered in Dynamicweb before 9.12.8. An attacker can add a new administrator user without authentication. This flaw exists due to a logic issue when determining if the setup phases of the product can be run again. Once an attacker is authenticated as the new admin user they have added, it is possible to upload an executable file and achieve command execution. This is fixed in 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9.8, 9.10.18, 9.12.8, and 9.13.0 (and later).
CWE-287 Jan 23, 2026
CVE-2025-69822 7.4 HIGH 1 PoC Analysis EPSS 0.00
Atomberg Erica Smart Fan Firmware - Information Disclosure
An issue in Atomberg Atomberg Erica Smart Fan Firmware Version: V1.0.36 allows an attacker to obtain sensitive information and escalate privileges via a crafted deauth frame
CWE-284 Jan 22, 2026