CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
442 results Clear all
CVE-2026-22694 6.1 MEDIUM 1 Writeup EPSS 0.00
AliasVault <0.25.2 - Info Disclosure
AliasVault is a privacy-first password manager with built-in email aliasing. AliasVault Android versions 0.24.0 through 0.25.2 contained an issue in how passkey requests from Android apps were validated. Under certain local conditions, a malicious app could attempt to obtain a passkey response for a site it was not authorized to access. The issue involved incomplete validation of calling app identity, origin, and RP ID in the Android credential provider. This issue was fixed in AliasVault Android 0.25.3.
CWE-346 Jan 14, 2026
CVE-2022-50925 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Prowise Reflect <1.0.9 - Code Injection
Prowise Reflect version 1.0.9 contains a remote keystroke injection vulnerability that allows attackers to send keyboard events through an exposed WebSocket on port 8082. Attackers can craft malicious web pages to inject keystrokes, opening applications and typing arbitrary text by sending specific WebSocket messages.
CWE-346 Jan 13, 2026
CVE-2026-22794 9.6 CRITICAL 2 PoCs Analysis EPSS 0.00
Appsmith < 1.93 - Origin Validation Error
Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset / email verification links in emails can be generated pointing to the attacker’s domain, causing authentication tokens to be exposed and potentially leading to account takeover. This vulnerability is fixed in 1.93.
CWE-346 Jan 12, 2026
CVE-2025-14279 8.1 HIGH 1 Writeup EPSS 0.00
MLFlow <3.4.0 - SSRF
MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data exfiltration, destruction, or manipulation. The issue is resolved in version 3.5.0.
CWE-346 Jan 12, 2026
CVE-2026-22030 6.5 MEDIUM EPSS 0.00
Shopify React-router < 7.11.0 - CSRF
React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes. There is no impact if Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) is being used. This issue has been patched in @remix-run/server-runtime version 2.17.3 and react-router version 7.12.0.
CWE-346 Jan 10, 2026
CVE-2025-67825 5.5 MEDIUM EPSS 0.00
Gonitro Nitro Pdf Pro < 14.42.0.34 - Origin Validation Error
An issue was discovered in Nitro PDF Pro for Windows before 14.42.0.34. In certain cases, it displays signer information from a non-verified PDF field rather than from the verified certificate subject. This could allow a document to present inconsistent signer details. The display logic was updated to ensure signer information consistently reflects the verified certificate identity.
CWE-346 Jan 08, 2026
CVE-2025-69260 7.5 HIGH EPSS 0.01
Trendmicro Apex Central - Out-of-Bounds Read
A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability.
CWE-125 Jan 08, 2026
CVE-2025-69259 7.5 HIGH EPSS 0.01
Trendmicro Apex Central - NULL Pointer Dereference
A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability..
CWE-346 Jan 08, 2026
CVE-2025-69258 9.8 CRITICAL EPSS 0.01
Trendmicro Apex Central - Origin Validation Error
A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.
CWE-290 Jan 08, 2026
CVE-2026-20893 7.8 HIGH EPSS 0.00
Fujitsu Security Solution AuthConductor Client Basic V2 <2.0.25.0 -...
Origin validation error issue exists in Fujitsu Security Solution AuthConductor Client Basic V2 2.0.25.0 and earlier. If this vulnerability is exploited, an attacker who can log in to the Windows system where the affected product is installed may execute arbitrary code with SYSTEM privilege and/or modify the registry value.
CWE-346 Jan 07, 2026
CVE-2025-69235 7.5 HIGH EPSS 0.00
Navercorp Whale < 4.35.351.12 - Origin Validation Error
Whale browser before 4.35.351.12 allows an attacker to bypass the Same-Origin Policy in a sidebar environment.
CWE-346 Dec 30, 2025
CVE-2025-61740 EPSS 0.00
Device - DoS
Authentication issue that does not verify the source of a packet which could allow an attacker to create a denial-of-service condition or modify the configuration of the device.
CWE-346 Dec 22, 2025
CVE-2025-63388 9.1 CRITICAL EPSS 0.00
Dify v1.9.1 - CSRF
A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/system-features endpoint. The endpoint implements an overly permissive CORS policy that reflects arbitrary Origin headers and sets Access-Control-Allow-Credentials: true, allowing any external domain to make authenticated cross-origin requests. NOTE: the Supplier disputes this, providing the rationale of "sending requests with credentials does not provide any additional access compared to unauthenticated requests."
CWE-346 Dec 18, 2025
CVE-2025-63386 9.1 CRITICAL EPSS 0.00
Dify v1.9.1 - CSRF
A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentials: true, permitting arbitrary external domains to make authenticated requests. NOTE: the Supplier disputes this because the endpoint configuration is intentional to support bootstrap.
CWE-346 Dec 18, 2025
CVE-2025-14331 6.5 MEDIUM EPSS 0.00
Firefox < 146 - SSRF
Same-origin policy bypass in the Request Handling component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
CWE-346 Dec 09, 2025
CVE-2025-34291 8.8 HIGH EXPLOITED NUCLEI EPSS 0.18
Langflow < 1.6.9 - Origin Validation Error
Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.
CWE-346 Dec 05, 2025
CVE-2025-8074 5.6 MEDIUM EPSS 0.00
Synology Beedrive < 1.4.3-13973 - Origin Validation Error
Origin validation error vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.3-13973 allows local users to write arbitrary files with non-sensitive information via unspecified vectors.
CWE-346 Dec 04, 2025
CVE-2024-32642 8.8 HIGH 1 Writeup EPSS 0.00
Masacms < 7.2.8 - Origin Validation Error
Masa CMS is an open source Enterprise Content Management platform. Prior to 7.2.8, 7.3.13, and 7.4.6, there is vulnerable to host header poisoning which allows account takeover via password reset email. This vulnerability is fixed in 7.2.8, 7.3.13, and 7.4.6.
CWE-346 Dec 03, 2025
CVE-2025-13947 7.4 HIGH EPSS 0.00
WebKitGTK - Info Disclosure
A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.
CWE-346 Dec 03, 2025
CVE-2025-37734 4.3 MEDIUM EPSS 0.00
Kibana - SSRF
Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant.
CWE-346 Nov 12, 2025