CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
76 results Clear all
CVE-2025-3230 5.4 MEDIUM EPSS 0.00
Mattermost <10.7.0-10.6.2-10.5.3-9.11.12 - Info Disclosure
Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly invalidate personal access tokens upon user deactivation, allowing deactivated users to maintain full system access by exploiting access token validation flaws via continued usage of previously issued tokens.
CWE-303 May 30, 2025
CVE-2025-2571 4.2 MEDIUM EPSS 0.00
Mattermost <10.7.0-10.5.3-9.11.12 - Auth Bypass
Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to clear Google OAuth credentials when converting user accounts to bot accounts, allowing attackers to gain unauthorized access to bot accounts via the Google OAuth signup flow.
CWE-303 May 30, 2025
CVE-2025-2475 5.4 MEDIUM EPSS 0.00
Mattermost <10.5.1-10.4.3-9.11.9 - Info Disclosure
Mattermost versions 10.5.x <= 10.5.1, 10.4.x <= 10.4.3, 9.11.x <= 9.11.9 fail to invalidate the cache when a user account is converted to a bot which allows an attacker to login to the bot exactly one time via normal credentials.
CWE-303 Apr 14, 2025
CVE-2024-8314 EPSS 0.00
B&R APROL <4.4-00P5 - Privilege Escalation
An Incorrect Implementation of Authentication Algorithm and Exposure of Data Element to Wrong Ses-sion vulnerability in the session handling used in B&R APROL <4.4-00P5 may allow an authenticated network attacker to take over a currently active user session without login credentials.
CWE-488 Mar 25, 2025
CVE-2025-23046 7.5 HIGH EPSS 0.00
GLPI <10.0.18 - Auth Bypass
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.18, if a "Mail servers" authentication provider is configured to use an Oauth connection provided by the OauthIMAP plugin, anyone can connect to GLPI using a user name on which an Oauth authorization has already been established. Version 10.0.18 contains a patch. As a workaround, one may disable any "Mail servers" authentication provider configured to use an Oauth connection provided by the OauthIMAP plugin.
CWE-303 Feb 25, 2025
CVE-2025-21311 9.8 CRITICAL EPSS 0.03
Windows NTLM < - Privilege Escalation
Windows NTLM V1 Elevation of Privilege Vulnerability
CWE-303 Jan 14, 2025
CVE-2024-56128 5.3 MEDIUM EPSS 0.00
Apache Kafka - Auth Bypass
Incorrect Implementation of Authentication Algorithm in Apache Kafka's SCRAM implementation. Issue Summary: Apache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM) did not fully adhere to the requirements of RFC 5802 [1]. Specifically, as per RFC 5802, the server must verify that the nonce sent by the client in the second message matches the nonce sent by the server in its first message. However, Kafka's SCRAM implementation did not perform this validation. Impact: This vulnerability is exploitable only when an attacker has plaintext access to the SCRAM authentication exchange. However, the usage of SCRAM over plaintext is strongly discouraged as it is considered an insecure practice [2]. Apache Kafka recommends deploying SCRAM exclusively with TLS encryption to protect SCRAM exchanges from interception [3]. Deployments using SCRAM with TLS are not affected by this issue. How to Detect If You Are Impacted: If your deployment uses SCRAM authentication over plaintext communication channels (without TLS encryption), you are likely impacted. To check if TLS is enabled, review your server.properties configuration file for listeners property. If you have SASL_PLAINTEXT in the listeners, then you are likely impacted. Fix Details: The issue has been addressed by introducing nonce verification in the final message of the SCRAM authentication exchange to ensure compliance with RFC 5802. Affected Versions: Apache Kafka versions 0.10.2.0 through 3.9.0, excluding the fixed versions below. Fixed Versions: 3.9.0 3.8.1 3.7.2 Users are advised to upgrade to 3.7.2 or later to mitigate this issue. Recommendations for Mitigation: Users unable to upgrade to the fixed versions can mitigate the issue by: - Using TLS with SCRAM Authentication: Always deploy SCRAM over TLS to encrypt authentication exchanges and protect against interception. - Considering Alternative Authentication Mechanisms: Evaluate alternative authentication mechanisms, such as PLAIN, Kerberos or OAuth with TLS, which provide additional layers of security.
CWE-303 Dec 18, 2024
CVE-2024-52586 5.4 MEDIUM EPSS 0.00
eLabFTW <5.1.0 - Auth Bypass
eLabFTW is an open source electronic lab notebook for research labs. A vulnerability has been found starting in version 4.6.0 and prior to version 5.1.0 that allows an attacker to bypass eLabFTW's built-in multifactor authentication mechanism. An attacker who can authenticate locally (by knowing or guessing the password of a user) can thus log in regardless of MFA requirements. This does not affect MFA that are performed by single sign-on services. Users are advised to upgrade to at least version 5.1.9 to receive a fix.
CWE-288 Dec 09, 2024
CVE-2024-10127 9.8 CRITICAL EPSS 0.00
M-Files <24.11 - Auth Bypass
Authentication bypass condition in LDAP authentication in M-Files server versions before 24.11 supported usage of OpenLDAP configurations that allowed user authentication without a password when the LDAP server itself had the vulnerable configuration.
CWE-303 Nov 20, 2024
CVE-2024-9999 6.5 MEDIUM EPSS 0.00
WS_FTP Server <8.8.9 - Auth Bypass
In WS_FTP Server versions before 8.8.9 (2022.0.9), an Incorrect Implementation of Authentication Algorithm in the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.
CWE-303 Nov 12, 2024
CVE-2024-36250 3.1 LOW EPSS 0.00
Mattermost <9.11.3-9.5.11 - Info Disclosure
Mattermost versions 9.11.x <= 9.11.2, and 9.5.x <= 9.5.10 fail to protect the mfa code against replay attacks, which allows an attacker to reuse the MFA code within ~30 seconds
CWE-294 Nov 09, 2024
CVE-2024-10214 3.5 LOW EPSS 0.00
Mattermost <9.11.2-9.5.10 - Info Disclosure
Mattermost versions 9.11.X <= 9.11.1, 9.5.x <= 9.5.9 icorrectly issues two sessions when using desktop SSO - one in the browser and one in desktop with incorrect settings.
CWE-303 Oct 28, 2024
CVE-2024-8642 8.1 HIGH 1 Writeup EPSS 0.00
Eclipse Dataspace Components <0.9.0 - Auth Bypass
In Eclipse Dataspace Components, from version 0.5.0 and before version 0.9.0, the ConsumerPullTransferTokenValidationApiController does not check for token validity (expiry, not-before, issuance date), which can allow an attacker to bypass the check for token expiration. The issue requires to have a dataplane configured to support http proxy consumer pull AND include the module "transfer-data-plane". The affected code was marked deprecated from the version 0.6.0 in favour of Dataplane Signaling. In 0.9.0 the vulnerable code has been removed.
CWE-305 Sep 11, 2024
CVE-2024-25157 6.5 MEDIUM EPSS 0.00
GoAnywhere MFT <7.6.0 - Auth Bypass
An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.
CWE-287 Aug 14, 2024
CVE-2024-7593 9.8 CRITICAL KEV 5 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Virtual Traffic Manager Authentication Bypass (CVE-2024-7593)
Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.
CWE-287 Aug 13, 2024
CVE-2024-41829 3.5 LOW EPSS 0.00
Jetbrains Teamcity < 2024.07 - Authentication Bypass
In JetBrains TeamCity before 2024.07 an OAuth code for JetBrains Space could be stolen via Space Application connection
CWE-287 Jul 22, 2024
CVE-2023-4860 9.6 CRITICAL EPSS 0.00
Google Chrome <115.0.5790.98 - Sandbox Escape
Inappropriate implementation in Skia in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-303 Jul 16, 2024
CVE-2024-34722 8.8 HIGH EPSS 0.00
Google Android - Authentication Bypass
In smp_proc_rand of smp_act.cc, there is a possible authentication bypass during legacy BLE pairing due to incorrect implementation of a protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-303 Jul 09, 2024
CVE-2024-5658 4.8 MEDIUM 1 Writeup EPSS 0.00
CraftCMS - Info Disclosure
The CraftCMS plugin Two-Factor Authentication through 3.3.3 allows reuse of TOTP tokens multiple times within the validity period.
CWE-287 Jun 06, 2024
CVE-2024-4332 EPSS 0.01
Tripwire Enterprise 9.1.0 - Auth Bypass
An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
CWE-306 Jun 03, 2024