CVE & Exploit Intelligence Database

Updated 50m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
38 results Clear all
CVE-2020-37056 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Crystal Shard http-protection 0.2.0 - SSRF
Crystal Shard http-protection 0.2.0 contains an IP spoofing vulnerability that allows attackers to bypass protection middleware by manipulating request headers. Attackers can hardcode consistent IP values across X-Forwarded-For, X-Client-IP, and X-Real-IP headers to circumvent security checks and gain unauthorized access.
CWE-290 Jan 30, 2026
CVE-2026-0834 8.8 HIGH 1 PoC Analysis EPSS 0.00
Tp-link Archer Ax53 Firmware - Authentication Bypass by Spoofing
Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031. Archer AX53 v1.0 < V1_251215
CWE-290 Jan 21, 2026
CVE-2025-59501 4.8 MEDIUM 2 PoCs Analysis EPSS 0.00
Microsoft Configuration Manager 2403 < 5.00.9128.1037 - Authentication Bypass by Spoofing
Authentication bypass by spoofing in Microsoft Configuration Manager allows an authorized attacker to perform spoofing over an adjacent network.
CWE-290 Oct 31, 2025
CVE-2025-56800 5.1 MEDIUM 1 PoC 1 Writeup Analysis EPSS 0.00
Reolink - Authentication Bypass by Spoofing
Reolink desktop application 8.18.12 contains a vulnerability in its local authentication mechanism. The application implements lock screen password logic entirely on the client side using JavaScript within an Electron resource file. Because the password is stored and returned via a modifiable JavaScript property(a.settingsManager.lockScreenPassword), an attacker can patch the return value to bypass authentication. NOTE: this is disputed by the Supplier because the lock-screen bypass would only occur if the local user modified his own instance of the application.
CWE-290 Oct 21, 2025
CVE-2025-56608 4.2 MEDIUM 1 PoC Analysis EPSS 0.00
Donbermoy Android Corona Virus Tracke... - Authentication Bypass by Spoofing
The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.
CWE-290 Sep 03, 2025
CVE-2025-46018 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Cscsw Pay Mobile - Authentication Bypass by Spoofing
CSC Pay Mobile App 2.19.4 (fixed in version 2.20.0) contains a vulnerability allowing users to bypass payment authorization by disabling Bluetooth at a specific point during a transaction. This could result in unauthorized use of laundry services and potential financial loss.
CWE-290 Aug 01, 2025
CVE-2025-34065 1 PoC Analysis EPSS 0.00
AVTECH - Auth Bypass
An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function allows unauthenticated access to any request containing "/nobody" in the URL, bypassing login controls.
CWE-290 Jul 01, 2025
CVE-2025-34053 1 PoC Analysis EPSS 0.00
AVTECH - Auth Bypass
An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function is used to identify ".cab" requests, allowing any URL containing ".cab" to bypass authentication and access protected endpoints.
CWE-290 Jul 01, 2025
CVE-2025-49002 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
Dataease < 2.10.10 - Authentication Bypass by Spoofing
DataEase is an open source business intelligence and data visualization tool. Versions prior to version 2.10.10 have a flaw in the patch for CVE-2025-32966 that allow the patch to be bypassed through case insensitivity because INIT and RUNSCRIPT are prohibited. The vulnerability has been fixed in v2.10.10. No known workarounds are available.
CWE-290 Jun 03, 2025
CVE-2025-24091 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
Apple Ipados < 17.7.3 - Authentication Bypass by Spoofing
An app could impersonate system notifications. Sensitive notifications now require restricted entitlements. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.3. An app may be able to cause a denial-of-service.
CWE-290 Apr 30, 2025
CVE-2025-22223 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Spring Security 6.4.0-6.4.3 - Auth Bypass
Spring Security 6.4.0 - 6.4.3 may not correctly locate method security annotations on parameterized types or methods. This may cause an authorization bypass.  You are not affected if you are not using @EnableMethodSecurity, or you do not have method security annotations on parameterized types or methods, or all method security annotations are attached to target methods
CWE-290 Mar 24, 2025
CVE-2025-30144 6.5 MEDIUM 1 PoC Analysis EPSS 0.02
fast-jwt <5.0.6 - Info Disclosure
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly validate the iss claim based on the RFC 7519. The iss (issuer) claim validation within the fast-jwt library permits an array of strings as a valid iss value. This design flaw enables a potential attack where a malicious actor crafts a JWT with an iss claim structured as ['https://attacker-domain/', 'https://valid-iss']. Due to the permissive validation, the JWT will be deemed valid. Furthermore, if the application relies on external libraries like get-jwks that do not independently validate the iss claim, the attacker can leverage this vulnerability to forge a JWT that will be accepted by the victim application. Essentially, the attacker can insert their own domain into the iss array, alongside the legitimate issuer, and bypass the intended security checks. This issue is fixed in 5.0.6.
CWE-290 Mar 19, 2025
CVE-2024-54085 9.8 CRITICAL KEV 2 PoCs Analysis EPSS 0.08
AMI's SPx - Auth Bypass
AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
CWE-290 Mar 11, 2025
CVE-2024-42364 6.5 MEDIUM 2 PoCs Analysis EPSS 0.00
Homepage 0.9.1 - SSRF
Homepage is a highly customizable homepage with Docker and service API integrations. The default setup of homepage 0.9.1 is vulnerable to DNS rebinding. Homepage is setup without certificate and authentication by default, leaving it to vulnerable to DNS rebinding. In this attack, an attacker will ask a user to visit his/her website. The attacker website will then change the DNS records of their domain from their IP address to the internal IP address of the homepage instance. To tell which IP addresses are valid, we can rebind a subdomain to each IP address we want to check, and see if there is a response. Once potential candidates have been found, the attacker can launch the attack by reading the response of the webserver after the IP address has changed. When the attacker domain is fetched, the response will be from the homepage instance, not the attacker website, because the IP address has been changed. Due to a lack of authentication, a user’s private information such as API keys (fixed after first report) and other private information can then be extracted by the attacker website.
CWE-290 Aug 23, 2024
CVE-2024-35539 6.5 MEDIUM 2 PoCs Analysis EPSS 0.03
Typecho - Authentication Bypass by Spoofing
Typecho v1.3.0 was discovered to contain a race condition vulnerability in the post commenting function. This vulnerability allows attackers to post several comments before the spam protection checks if the comments are posted too frequently.
CWE-290 Aug 19, 2024
CVE-2024-35538 5.3 MEDIUM 1 PoC Analysis EPSS 0.01
Typecho - HTTP Request Smuggling
Typecho v1.3.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
CWE-290 Aug 19, 2024
CVE-2024-41107 8.1 HIGH 1 PoC Analysis NUCLEI EPSS 0.92
Apache Cloudstack < 4.18.2.2 - Authentication Bypass by Spoofing
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account. Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.
CWE-290 Jul 19, 2024
CVE-2024-4358 9.8 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
Telerik Report Server Auth Bypass and Deserialization RCE
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
CWE-290 May 29, 2024
CVE-2024-20674 8.8 HIGH 1 PoC Analysis EPSS 0.16
Windows Kerberos - Privilege Escalation
Windows Kerberos Security Feature Bypass Vulnerability
CWE-290 Jan 09, 2024
CVE-2023-3128 9.4 CRITICAL 1 PoC Analysis EPSS 0.02
Grafana - Auth Bypass
Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
CWE-290 Jun 22, 2023