CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
124 results Clear all
CVE-2026-3047 8.8 HIGH EPSS 0.00
Keycloak - Auth Bypass
A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.
CWE-305 Mar 05, 2026
CVE-2026-28536 9.6 CRITICAL EPSS 0.00
Device Authentication Module - Auth Bypass
Authentication bypass vulnerability in the device authentication module. Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
CWE-305 Mar 05, 2026
CVE-2026-1713 5.0 MEDIUM EPSS 0.00
IBM MQ 9.1.0.0-9.4.4.1 - Privilege Escalation
IBM MQ 9.1.0.0 through 9.1.0.33 LTS, 9.2.0.0 through 9.2.0.40 LTS, 9.3.0.0 through 9.3.0.36 LTS, 9.30.0 through 9.3.5.1 CD, 9.4.0.0 through 9.4.0.17 LTS, and 9.4.0.0 through 9.4.4.1 CD
CWE-305 Mar 03, 2026
CVE-2026-0869 8.8 HIGH EPSS 0.00
Brocade ASCG 3.4.0 - Auth Bypass
Authentication bypass in Brocade ASCG 3.4.0 Could allow an unauthorized user to perform ASCG operations related to Brocade Support Link(BSL) and streaming configuration. and could even disable the ASCG application or disable use of BSL data collection on Brocade switches within the fabric.
CWE-305 Mar 03, 2026
CVE-2026-22153 8.1 HIGH 3 PoCs Analysis EPSS 0.00
Fortinet Fortios < 7.6.5 - Authentication Bypass
An Authentication Bypass by Primary Weakness vulnerability [CWE-305] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4 may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, when the remote LDAP server is configured in a specific way.
CWE-305 Feb 10, 2026
CVE-2025-58382 7.2 HIGH EPSS 0.00
Brocade Fabric OS <9.2.1c2 - Command Injection
A vulnerability in the secure configuration of authentication and management services in Brocade Fabric OS before Fabric OS 9.2.1c2 could allow an authenticated, remote attacker with administrative credentials to execute arbitrary commands as root using “supportsave”, “seccertmgmt”, “configupload” command.
CWE-305 Feb 03, 2026
CVE-2025-4320 10.0 CRITICAL EPSS 0.00
Birebirsoft Sufirmam <23012026 - Auth Bypass
Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Jan 23, 2026
CVE-2025-68609 6.6 MEDIUM EPSS 0.00
Palantir's Aries - Info Disclosure
A vulnerability in Palantir's Aries service allowed unauthenticated access to log viewing and management functionality on Apollo instances using default configuration. The defect resulted in both authentication and authorization checks being bypassed, potentially allowing any network-accessible client to view system logs and perform operations without valid credentials. No evidence of exploitation was identified during the vulnerability window.
CWE-305 Jan 22, 2026
CVE-2026-1290 EPSS 0.00
Jamf Jamf Pro <11.24 - Auth Bypass
Authentication Bypass by Primary Weakness vulnerability in Jamf Jamf Pro allows unspecified impact.This issue affects Jamf Pro: from 11.20 through 11.24.
CWE-305 Jan 21, 2026
CVE-2025-13915 9.8 CRITICAL EPSS 0.00
IBM API Connect <10.0.8.5, 10.0.11.0 - Auth Bypass
IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.
CWE-305 Dec 26, 2025
CVE-2024-49587 9.1 CRITICAL EPSS 0.00
Glutton V1 - Info Disclosure
Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances
CWE-305 Dec 19, 2025
CVE-2025-68435 9.1 CRITICAL 1 Writeup EPSS 0.00
Zerobyte <0.18.5-0.19.0 - Auth Bypass
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
CWE-305 Dec 17, 2025
CVE-2025-51663 7.5 HIGH EPSS 0.00
Lanol Filecodebox < 2.2 - Denial of Service
A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.
CWE-305 Nov 19, 2025
CVE-2025-41733 9.8 CRITICAL EPSS 0.00
Commissioning Wizard - Privilege Escalation
The commissioning wizard on the affected devices does not validate if the device is already initialized. An unauthenticated remote attacker can construct POST requests to set root credentials.
CWE-305 Nov 18, 2025
CVE-2025-47776 9.1 CRITICAL 1 Writeup EPSS 0.00
MantisBT <2.27.1 - Auth Bypass
Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in versions 2.27.1 and below.PHP type juggling will cause certain MD5 hashes matching scientific notation to be interpreted as numbers. Instances using the MD5 login method allow an attacker who knows the victim's username and has access to an account with a password hash that evaluates to zero to log in without knowing the victim's actual password, by using any other password with a hash that also evaluates to zero This issue is fixed in version 2.27.2.
CWE-305 Nov 04, 2025
CVE-2025-36386 9.8 CRITICAL EPSS 0.00
IBM Maximo Application Suite - Auth Bypass
IBM Maximo Application Suite 9.0.0 through 9.0.15 and 9.1.0 through 9.1.4 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.
CWE-305 Oct 28, 2025
CVE-2025-62772 3.1 LOW EPSS 0.00
Mercku M6a <2.1.0 - Info Disclosure
On Mercku M6a devices through 2.1.0, session tokens remain valid for at least months in some cases.
CWE-305 Oct 22, 2025
CVE-2025-59980 6.5 MEDIUM EPSS 0.00
Juniper Junos < 22.4 - Authentication Bypass
An Authentication Bypass by Primary Weakness in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get limited read-write access to files on the device. When the FTP server is enabled and a user named "ftp" or "anonymous" is configured, that user can login without providing the configured password and then has read-write access to their home directory. This issue affects Junos OS:  * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2.
CWE-305 Oct 09, 2025
CVE-2025-56132 7.3 HIGH 1 PoC Analysis NUCLEI EPSS 0.02
LiquidFiles <4.2 - Info Disclosure
LiquidFiles filetransfer server is vulnerable to a user enumeration issue in its password reset functionality. The application returns distinguishable responses for valid and invalid email addresses, allowing unauthenticated attackers to determine the existence of user accounts. Version 4.2 introduces user-based lockout mechanisms to mitigate brute-force attacks, user enumeration remains possible by default. In versions prior to 4.2, no such user-level protection is in place, only basic IP-based rate limiting is enforced. This IP-based protection can be bypassed by distributing requests across multiple IPs (e.g., rotating IP or proxies). Effectively bypassing both login and password reset security controls. Successful exploitation allows an attacker to enumerate valid email addresses registered for the application, increasing the risk of follow-up attacks such as password spraying.
CWE-305 Sep 30, 2025
CVE-2025-59941 5.9 MEDIUM 1 Writeup EPSS 0.00
go-f3 <0.8.8 - Code Injection
go-f3 is a Golang implementation of Fast Finality for Filecoin (F3). In versions 0.8.8 and below, go-f3's justification verification caching mechanism has a vulnerability where verification results are cached without properly considering the context of the message. An attacker can bypass justification verification by submitting a valid message with a correct justification and then reusing the same cached justification in contexts where it would normally be invalid. This occurs because the cached verification does not properly validate the relationship between the justification and the specific message context it's being used with. This issue is fixed in version 0.8.9.
CWE-305 Sep 29, 2025