CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
197 results Clear all
CVE-2022-31277 8.8 HIGH EPSS 0.00
Xiaomi Lamp 1 <v2.0.4_0066 - Open Redirect
Xiaomi Lamp 1 v2.0.4_0066 was discovered to be vulnerable to replay attacks. This allows attackers to to bypass the expected access restrictions and gain control of the switch and other functions via a crafted POST request.
CWE-294 Jun 16, 2022
CVE-2022-30466 6.5 MEDIUM 1 Writeup EPSS 0.00
Joybike Wolf Firmware - Authentication Bypass
joyebike Joy ebike Wolf Manufacturing year 2022 is vulnerable to Authentication Bypass by Capture-replay.
CWE-294 Jun 07, 2022
CVE-2022-31265 8.8 HIGH EPSS 0.01
Wargaming World of Warships <0.11.4 - RCE
The replay feature in the client in Wargaming World of Warships 0.11.4 allows remote attackers to execute code when a user launches a replay from an untrusted source.
CWE-294 May 26, 2022
CVE-2022-29334 9.8 CRITICAL EPSS 0.00
H v1.0 - Auth Bypass
An issue in H v1.0 allows attackers to bypass authentication via a session replay attack.
CWE-294 May 24, 2022
CVE-2022-29878 7.5 HIGH EPSS 0.01
SICAM T < V3.0 - Info Disclosure
A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device.
CWE-294 May 20, 2022
CVE-2020-27374 7.5 HIGH EPSS 0.00
Dr Trust USA iCheck Connect BP Monitor <1.2.1 - Info Disclosure
Dr Trust USA iCheck Connect BP Monitor BP Testing 118 1.2.1 is vulnerable to a Replay Attack to BP Monitoring.
CWE-294 Apr 07, 2022
CVE-2022-25159 8.1 HIGH EPSS 0.01
Mitsubishielectric Fx5uc Firmware - Authentication Bypass
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions and Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions allows a remote unauthenticated attacker to login to the product by replay attack.
CWE-294 Apr 01, 2022
CVE-2022-22936 8.8 HIGH EPSS 0.00
SaltStack Salt <3002.8-3004.1 - Privilege Escalation
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios.
CWE-294 Mar 29, 2022
CVE-2022-27254 5.3 MEDIUM 1 PoC Analysis EPSS 0.04
Honda Civic 2018 - Replay Attack
The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal for each door-open request, which allows for a replay attack, a related issue to CVE-2019-20626.
CWE-294 Mar 23, 2022
CVE-2021-38296 7.5 HIGH EPSS 0.01
Apache Spark <3.1.2 - Info Disclosure
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later
CWE-294 Mar 10, 2022
CVE-2022-22806 9.8 CRITICAL EPSS 0.00
Schneider-electric Smt Series 1015 Up... - Authentication Bypass
A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause an unauthenticated connection to the UPS when a malformed connection is sent. Affected Product: SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)
CWE-294 Mar 09, 2022
CVE-2021-39364 7.5 HIGH EPSS 0.00
Honeywell HDZP252DI <1.00.HW02.4 & HBW2PER1 <1.000.HW01.3 - Command...
Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow command spoofing (for camera control) after ARP cache poisoning has been achieved.
CWE-294 Feb 24, 2022
CVE-2022-25838 8.1 HIGH EPSS 0.00
Laravel Fortify <1.11.1 - Info Disclosure
Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept.
CWE-294 Feb 24, 2022
CVE-2021-46145 5.3 MEDIUM EPSS 0.02
Honda Civic 2012 - Info Disclosure
The keyfob subsystem in Honda Civic 2012 vehicles allows a replay attack for unlocking. This is related to a non-expiring rolling code and counter resynchronization.
CWE-294 Jan 06, 2022
CVE-2021-40170 6.8 MEDIUM EPSS 0.00
SecuritasHome HPGW-G 0.0.2.23F - RCE
An RF replay attack vulnerability in the SecuritasHome home alarm system, version HPGW-G 0.0.2.23F BG_U-ITR-F1-BD_BL.A30.20181117, allows an attacker to trigger arbitrary system functionality by replaying previously recorded signals. This lets an adversary, among other things, disarm an armed system.
CWE-294 Dec 15, 2021
CVE-2021-41030 5.4 MEDIUM EPSS 0.00
FortiClient EMS <7.0.1, <6.4.4 - Auth Bypass
An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages.
CWE-294 Dec 08, 2021
CVE-2021-38459 8.1 HIGH EPSS 0.00
SYSDBA - Privilege Escalation
The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.
CWE-294 Oct 22, 2021
CVE-2021-35067 8.1 HIGH EPSS 0.00
Meross MSG100 <3.2.3 - Replay Attack
Meross MSG100 devices before 3.2.3 allow an attacker to replay the same data or similar data (e.g., an attacker who sniffs a Close message can transmit an acceptable Open message).
CWE-294 Oct 07, 2021
CVE-2021-25480 4.4 MEDIUM EPSS 0.00
Qualcomm Modem <SMR Oct-2021 Release 1 - DoS
A lack of replay attack protection in GUTI REALLOCATION COMMAND message process in Qualcomm modem prior to SMR Oct-2021 Release 1 can lead to remote denial of service on mobile network connection.
CWE-294 Oct 06, 2021
CVE-2021-27662 8.6 HIGH EPSS 0.00
Johnson Controls KT-1 <3.01 - SSRF
The KT-1 door controller is susceptible to replay or man-in-the-middle attacks where an attacker can record and replay TCP packets. This issue affects Johnson Controls KT-1 all versions up to and including 3.01
CWE-294 Sep 15, 2021