CVE & Exploit Intelligence Database

Updated 23m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
197 results Clear all
CVE-2026-28787 8.2 HIGH EPSS 0.00
OneUptime <=10.0.11 - Auth Bypass
OneUptime is a solution for monitoring and managing online services. In version 10.0.11 and prior, the WebAuthn authentication implementation does not store the challenge on the server side. Instead, the challenge is returned to the client and accepted back from the client request body during verification. This violates the WebAuthn specification (W3C Web Authentication Level 2, §13.4.3) and allows an attacker who has obtained a valid WebAuthn assertion (e.g., via XSS, MitM, or log exposure) to replay it indefinitely, completely bypassing the second-factor authentication. No known patches are available.
CWE-294 Mar 06, 2026
CVE-2026-30789 EPSS 0.00
RustDesk Client <1.4.5 - Auth Bypass
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
CWE-294 Mar 05, 2026
CVE-2026-2540 EPSS 0.00
Micca KE700 - Replay Attack
The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors.
CWE-294 Feb 15, 2026
CVE-2025-67135 9.8 CRITICAL EPSS 0.00
PF-50 1.2 - Code Injection
Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to compromise access control via a code replay attack.
CWE-294 Feb 11, 2026
CVE-2026-1743 3.1 LOW 1 Writeup EPSS 0.00
DJI Mavic Mini, Air, Spark and Mini SE <01.00.0500 - Auth Bypass
A vulnerability has been found in DJI Mavic Mini, Air, Spark and Mini SE up to 01.00.0500. Affected by this vulnerability is an unknown functionality of the component Enhanced Wi-Fi Pairing. The manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-287 Feb 02, 2026
CVE-2025-69822 7.4 HIGH 1 PoC Analysis EPSS 0.00
Atomberg Erica Smart Fan Firmware - Information Disclosure
An issue in Atomberg Atomberg Erica Smart Fan Firmware Version: V1.0.36 allows an attacker to obtain sensitive information and escalate privileges via a crafted deauth frame
CWE-284 Jan 22, 2026
CVE-2025-68671 6.5 MEDIUM 1 Writeup EPSS 0.00
LakeFS <1.75.0 - Replay Attack
lakeFS is an open-source tool that transforms object storage into a Git-like repositories. LakeFS's S3 gateway does not validate timestamps in authenticated requests, allowing replay attacks. Prior to 1.75.0, an attacker who captures a valid signed request (e.g., through network interception, logs, or compromised systems) can replay that request until credentials are rotated, even after the request is intended to expire. This vulnerability is fixed in 1.75.0.
CWE-294 Jan 15, 2026
CVE-2025-65553 6.5 MEDIUM 1 Writeup EPSS 0.00
D3D Wi-Fi Home Security System ZX-G12 v2.1.17 - DoS
D3D Wi-Fi Home Security System ZX-G12 v2.1.17 is susceptible to RF jamming on the 433 MHz alarm sensor channel. An attacker within RF range can transmit continuous interference to block sensor transmissions, resulting in missed alarms and loss of security monitoring. The device lacks jamming detection or mitigations, creating a denial-of-service condition that may lead to undetected intrusions or failure to trigger safety alerts.
CWE-294 Jan 12, 2026
CVE-2025-65552 9.8 CRITICAL 1 Writeup EPSS 0.00
D3D Wi-Fi Home Security System ZX-G12 v2.1.1 - Info Disclosure
D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.
CWE-294 Jan 12, 2026
CVE-2025-69197 6.5 MEDIUM 1 Writeup EPSS 0.00
Pterodactyl <1.11.11 - Info Disclosure
Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below allow TOTP to be used multiple times during its validity window. Users with 2FA enabled are prompted to enter a token during sign-in, and afterward it is not sufficiently marked as used in the system. This allows an attacker who intercepts that token to use it in addition to a known username/password during the 60-second token validity window. The attacker must have intercepted a valid 2FA token (for example, during a screen share). This issue is fixed in version 1.12.0.
CWE-287 Jan 06, 2026
CVE-2025-40807 6.3 MEDIUM EPSS 0.00
Gridscale X Prepay <V4.2.1 - Auth Bypass
A vulnerability has been identified in Gridscale X Prepay (All versions < V4.2.1). The affected application is vulnerable to capture-replay of authentication tokens. This could allow an authenticated but already locked-out user to establish still valid user sessions.
CWE-294 Dec 09, 2025
CVE-2025-30201 7.7 HIGH 1 Writeup EPSS 0.00
Wazuh <4.13.0 - Privilege Escalation
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to version 4.13.0, a vulnerability in Wazuh Agent allows authenticated attackers to force NTLM authentication through malicious UNC paths in various agent configuration settings, potentially leading NTLM relay attacks that would result privilege escalation and remote code execution. This issue has been patched in version 4.13.0.
CWE-294 Nov 21, 2025
CVE-2025-49752 10.0 CRITICAL EPSS 0.00
Azure Bastion - Privilege Escalation
Azure Bastion Elevation of Privilege Vulnerability
CWE-294 Nov 20, 2025
CVE-2025-64131 7.5 HIGH EPSS 0.00
Jenkins SAML Plugin <4.583 - Auth Bypass
Jenkins SAML Plugin 4.583.vc68232f7018a_ and earlier does not implement a replay cache, allowing attackers able to obtain information about the SAML authentication flow between a user's web browser and Jenkins to replay those requests, authenticating to Jenkins as that user.
CWE-294 Oct 29, 2025
CVE-2011-20002 7.4 HIGH EPSS 0.00
SIMATIC S7-1200 CPU - Capture-Replay
A vulnerability has been identified in SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants) (All versions < V2.0.2), SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants) (All versions < V2.0.2). Affected controllers are vulnerable to capture-replay in the communication with the engineering software. This could allow an on-path attacker between the engineering software and the controller to execute any previously recorded commands at a later time (e.g. set the controller to STOP), regardless whether or not the controller had a password configured.
CWE-294 Oct 14, 2025
CVE-2025-35061 5.9 MEDIUM EPSS 0.00
Newforma Info Exchange - SSRF
Newforma Info Exchange (NIX) '/NPCSRemoteWeb/LegacyIntegrationServices.asmx' allows a remote, unauthenticated attacker to cause NIX to make an SMB connection to an attacker-controlled system. The attacker can capture the NTLMv2 hash of the user-configured NIX service account.
CWE-294 Oct 09, 2025
CVE-2025-35058 5.9 MEDIUM EPSS 0.00
Newforma NIX - SSRF
Newforma Info Exchange (NIX) '/UserWeb/Common/MarkupServices.ashx' allows a remote, unauthenticated attacker to cause NIX to make an SMB connection to an attacker-controlled system. The attacker can capture the NTLMv2 hash of the customer-configured NIX service account.
CWE-294 Oct 09, 2025
CVE-2025-35057 5.3 MEDIUM EPSS 0.00
Newforma Info Exchange - SSRF
Newforma Info Exchange (NIX) '/RemoteWeb/IntegrationServices.ashx' allows a remote, unauthenticated attacker to cause NIX to make an SMB connection to an attacker-controlled system. The attacker can capture the NTLMv2 hash of the NIX service account.
CWE-294 Oct 09, 2025
CVE-2025-54810 8.0 HIGH EPSS 0.00
Cognex In-Sight Explorer & Camera Firmware - Info Disclosure
Cognex In-Sight Explorer and In-Sight Camera Firmware expose a proprietary protocol on TCP port 1069 to perform management operations such as modifying system properties. The user management functionality handles sensitive data such as registered usernames and passwords over an unencrypted channel, allowing an adjacent attacker to intercept valid credentials to gain access to the device.
CWE-294 Sep 18, 2025
CVE-2025-56448 6.8 MEDIUM EPSS 0.00
Positron PX360BT SW REV 8 - Replay Attack
The Positron PX360BT SW REV 8 car alarm system is vulnerable to a replay attack due to a failure in implementing rolling code security. The alarm system does not properly rotate or invalidate used codes, allowing repeated reuse of captured transmissions. This exposes users to significant security risks, including vehicle theft and loss of trust in the alarm's anti-cloning claims.
CWE-294 Sep 15, 2025