CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
2,026 results Clear all
CVE-2025-8350 9.8 CRITICAL EPSS 0.00
BiEticaret CMS 2.1.13-19022026 - Auth Bypass
Execution After Redirect (EAR), Missing Authentication for Critical Function vulnerability in Inrove Software and Internet Services BiEticaret CMS allows Authentication Bypass, HTTP Response Splitting.This issue affects BiEticaret CMS: from 2.1.13 through 19022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-698 Feb 19, 2026
CVE-2025-14294 5.3 MEDIUM EPSS 0.00
Razorpay for WooCommerce <=4.7.8 - Auth Bypass
The Razorpay for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the getCouponList() function in all versions up to, and including, 4.7.8. This is due to the checkAuthCredentials() permission callback always returning true, providing no actual authentication. This makes it possible for unauthenticated attackers to modify the billing and shipping contact information (email and phone) of any WooCommerce order by knowing or guessing the order ID.
CWE-306 Feb 19, 2026
CVE-2026-27182 8.4 HIGH EPSS 0.00
Saturn Remote Mouse Server - Command Injection
Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed packets with unsanitized command data that the service forwards directly to OS execution functions, enabling remote code execution under the service account.
CWE-306 Feb 18, 2026
CVE-2025-1272 7.7 HIGH EPSS 0.00
Linux Kernel 6.12+ Fedora - Info Disclosure
The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.
CWE-306 Feb 18, 2026
CVE-2025-70147 7.5 HIGH EPSS 0.00
ProjectWorlds Online Time Table Generator 1.0 - Auth Bypass
Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests to these endpoints without a valid session.
CWE-862 Feb 18, 2026
CVE-2025-70146 9.1 CRITICAL EPSS 0.00
ProjectWorlds Online Time Table Generator 1.0 - Auth Bypass
Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.
CWE-862 Feb 18, 2026
CVE-2025-70141 9.4 CRITICAL EPSS 0.00
SourceCodester Customer Support System 1.0 - Auth Bypass
SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php. The AJAX dispatcher does not enforce authentication or authorization before invoking administrative methods in admin_class.php based on the action parameter. An unauthenticated remote attacker can perform sensitive operations such as creating customers and deleting users (including the admin account), as well as modifying or deleting other application records (tickets, departments, comments), resulting in unauthorized data modification.
CWE-306 Feb 18, 2026
CVE-2026-1670 9.8 CRITICAL 1 Writeup EPSS 0.00
Affected Products - Info Disclosure
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
CWE-306 Feb 17, 2026
CVE-2025-7706 6.1 MEDIUM EPSS 0.00
Liderahenk 3.0.0-3.3.1 - Auth Bypass
Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion.This issue affects Liderahenk: from 3.0.0 to 3.3.1 before 3.5.0.
CWE-306 Feb 17, 2026
CVE-2026-2577 10.0 CRITICAL EPSS 0.00
Nanobot WhatsApp Bridge - Auth Bypass
The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercept all incoming messages and media in real-time, and capture authentication QR codes.
CWE-306 Feb 16, 2026
CVE-2025-32063 6.8 MEDIUM EPSS 0.00
BOSCH Infotainment ECU - Info Disclosure
There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vulnerability happens during the startup phase of a specific systemd service, and as a result, the following developer features will be activated: the disabled firewall and the launched SSH server. First identified on Nissan Leaf ZE1 manufactured in 2020.
CWE-306 Feb 15, 2026
CVE-2025-6792 5.3 MEDIUM EPSS 0.00
WPGuppy plugin <1.1.4 - Info Disclosure
The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the /wp-json/guppylite/v2/channel-authorize rest endpoint in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to intercept and view private chat messages between users.
CWE-306 Feb 14, 2026
CVE-2026-26333 9.8 CRITICAL EPSS 0.00
Calero VeraSMART <2022 R1 - Unauthenticated Code Injection
Calero VeraSMART versions prior to 2022 R1 expose an unauthenticated .NET Remoting HTTP service on TCP port 8001. The service publishes default ObjectURIs (including EndeavorServer.rem and RemoteFileReceiver.rem) and permits the use of SOAP and binary formatters with TypeFilterLevel set to Full. An unauthenticated remote attacker can invoke the exposed remoting endpoints to perform arbitrary file read and write operations via the WebClient class. This allows retrieval of sensitive files such as WebRoot\\web.config, which may disclose IIS machineKey validation and decryption keys. An attacker can use these keys to generate a malicious ASP.NET ViewState payload and achieve remote code execution within the IIS application context. Additionally, supplying a UNC path can trigger outbound SMB authentication from the service account, potentially exposing NTLMv2 hashes for relay or offline cracking.
CWE-306 Feb 13, 2026
CVE-2026-26190 9.8 CRITICAL 1 Writeup EPSS 0.00
Milvus < 2.5.27 - Missing Authentication
Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.
CWE-306 Feb 13, 2026
CVE-2025-14349 8.8 HIGH EPSS 0.00
Universal Software Inc. FlexCity/Kiosk <1.0.36 - Privilege Escalation
Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
CWE-267 Feb 13, 2026
CVE-2026-26055 7.5 HIGH EPSS 0.00
Yoke - Missing Authentication
Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization.
CWE-306 Feb 12, 2026
CVE-2026-26235 7.5 HIGH 2 PoCs Analysis EPSS 0.00
JUNG Smart Visu Server 1.1.1050 - DoS
JUNG Smart Visu Server 1.1.1050 contains a denial of service vulnerability that allows unauthenticated attackers to remotely shutdown or reboot the server. Attackers can send a single POST request to trigger the server reboot without requiring any authentication.
CWE-306 Feb 12, 2026
CVE-2026-1729 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
AdForest theme <6.0.12 - Auth Bypass
The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.0.12. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the 'sb_login_user_with_otp_fun' function. This makes it possible for unauthenticated attackers to log in as arbitrary users, including administrators.
CWE-306 Feb 12, 2026
CVE-2026-25084 9.8 CRITICAL 1 Writeup EPSS 0.00
ZLAN5143D - Auth Bypass
Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs.
CWE-306 Feb 11, 2026
CVE-2026-24789 9.8 CRITICAL 1 Writeup EPSS 0.00
Unprotected API - Info Disclosure
An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication.
CWE-306 Feb 11, 2026