CVE & Exploit Intelligence Database

Updated 42m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
3,879 results Clear all
CVE-2026-3800 6.3 MEDIUM 1 Writeup EPSS 0.00
janobe Resort Reservation System 1.0 - Unrestricted Upload
A vulnerability has been found in SourceCodester/janobe Resort Reservation System 1.0. Affected is the function doInsert of the file /controller.php?action=add. Such manipulation of the argument image leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
CWE-284 Mar 09, 2026
CVE-2026-3797 6.3 MEDIUM EPSS 0.00
Tiandy Video Surveillance System 7.17.0 - Unrestricted Upload
A security vulnerability has been detected in Tiandy Video Surveillance System 视频监控平台 7.17.0. The impacted element is the function uploadFile of the file /src/com/tiandy/easy7/core/rest/CLS_REST_File.java. The manipulation of the argument fileName leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-284 Mar 09, 2026
CVE-2026-3749 6.3 MEDIUM EPSS 0.00
Bytedesk <=1.3.9 - Unrestricted Upload
A weakness has been identified in Bytedesk up to 1.3.9. This vulnerability affects the function handleFileUpload of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestService.java of the component SVG File Handler. Executing a manipulation can lead to unrestricted upload. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 1.4.5.1 is able to resolve this issue. This patch is called 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component.
CWE-284 Mar 08, 2026
CVE-2026-3748 6.3 MEDIUM EPSS 0.00
Bytedesk <=1.3.9 - Unrestricted Upload
A security flaw has been discovered in Bytedesk up to 1.3.9. This affects the function uploadFile of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestController.java of the component SVG File Handler. Performing a manipulation results in unrestricted upload. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.4.5.1 is able to mitigate this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is recommended.
CWE-284 Mar 08, 2026
CVE-2026-29186 7.7 HIGH EPSS 0.00
Backstage <1.14.3 - Code Injection
Backstage is an open framework for building developer portals. Prior to version 1.14.3, this is a configuration bypass vulnerability that enables arbitrary code execution. The @backstage/plugin-techdocs-node package uses an allowlist to filter dangerous MkDocs configuration keys during the documentation build process. A gap in this allowlist allows attackers to craft an mkdocs.yml that causes arbitrary Python code execution, completely bypassing TechDocs' security controls. This issue has been patched in version 1.14.3.
CWE-434 Mar 07, 2026
CVE-2026-30821 EPSS 0.00
Flowise <3.0.13 - Auth Bypass
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the /api/v1/attachments/:chatflowId/:chatId endpoint is listed in WHITELIST_URLS, allowing unauthenticated access to the file upload API. While the server validates uploads based on the MIME types defined in chatbotConfig.fullFileUpload.allowedUploadFileTypes, it implicitly trusts the client-provided Content-Type header (file.mimetype) without verifying the file's actual content (magic bytes) or extension (file.originalname). Consequently, an attacker can bypass this restriction by spoofing the Content-Type as a permitted type (e.g., application/pdf) while uploading malicious scripts or arbitrary files. Once uploaded via addArrayFilesToStorage, these files persist in backend storage (S3, GCS, or local disk). This vulnerability serves as a critical entry point that, when chained with other features like static hosting or file retrieval, can lead to Stored XSS, malicious file hosting, or Remote Code Execution (RCE). This issue has been patched in version 3.0.13.
CWE-434 Mar 07, 2026
CVE-2018-25171 8.2 HIGH 1 PoC Analysis EPSS 0.00
EdTv 2 - SQL Injection
EdTv 2 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to the admin/edit_source endpoint with crafted SQL UNION statements to extract database information including schema names, user credentials, and version details.
CWE-434 Mar 06, 2026
CVE-2018-25168 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
Precurio Intranet Portal 2.0 - CSRF
Precurio Intranet Portal 2.0 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative user accounts by submitting crafted POST requests. Attackers can forge requests to the /public/admin/user/submitnew endpoint with user creation parameters to add new admin accounts without requiring CSRF tokens or user interaction.
CWE-434 Mar 06, 2026
CVE-2018-25162 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
2-Plan Team 1.0.4 - Authenticated RCE
2-Plan Team 1.0.4 contains an arbitrary file upload vulnerability that allows authenticated attackers to upload executable PHP files by sending multipart form data to managefile.php. Attackers can upload PHP files through the userfile1 parameter with action=upload, which are stored in the files directory and executed by the web server for remote code execution.
CWE-434 Mar 06, 2026
CVE-2026-28800 6.4 MEDIUM EPSS 0.00
Natro Macro <1.1.0 - Unauthenticated RCE
Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, anyone with Discord Remote Control set up in a non-private channel gives access to any user with the permission to send message in said channel access to do anything on their computer. This includes keyboard and mouse inputs and full file access. This issue has been patched in version 1.1.0.
CWE-434 Mar 06, 2026
CVE-2026-27605 6.3 MEDIUM EPSS 0.00
Chartbrew <4.8.4 - XSS
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the application allows uploading files (project logos) without validating the file type or content. It trusts the extension provided by the user. These files are saved to the uploads/ directory and served statically. An attacker can upload an HTML file containing malicious JavaScript. Since authentication tokens are likely stored in localStorage (as they are returned in the API body), this XSS can lead to account takeover. This issue has been patched in version 4.8.4.
CWE-434 Mar 06, 2026
CVE-2026-29041 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Chamilo <1.11.34 - Authenticated RCE
Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS is affected by an authenticated remote code execution vulnerability caused by improper validation of uploaded files. The application relies solely on MIME-type verification when handling file uploads and does not adequately validate file extensions or enforce safe server-side storage restrictions. As a result, an authenticated low-privileged user can upload a crafted file containing executable code and subsequently execute arbitrary commands on the server. This issue has been patched in version 1.11.34.
CWE-434 Mar 06, 2026
CVE-2026-28502 1 Writeup EPSS 0.00
WWBN AVideo <24.0 - Authenticated RCE
WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrator to upload a specially crafted ZIP archive containing executable server-side files. Due to insufficient validation of extracted file contents, the archive was extracted directly into a web-accessible plugin directory, allowing arbitrary PHP code execution. This issue has been patched in version 24.0.
CWE-434 Mar 06, 2026
CVE-2026-21536 9.8 CRITICAL EPSS 0.00
Microsoft Devices Pricing Program - RCE
Microsoft Devices Pricing Program Remote Code Execution Vulnerability
CWE-434 Mar 05, 2026
CVE-2026-3459 8.1 HIGH EPSS 0.00
Drag and Drop Multiple File Upload - Contact Form 7 <=1.3.7.3 - RCE
The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'dnd_upload_cf7_upload' function in versions up to, and including, 1.3.7.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This can be exploited if the form includes a multiple file upload field with ‘*’ as the accepted file type.
CWE-434 Mar 05, 2026
CVE-2026-21628 EPSS 0.00
File Management Feature - Unauthenticated RCE
A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution.
CWE-434 Mar 05, 2026
CVE-2026-2743 9.8 CRITICAL EPSS 0.00
SeppMail <=15.0.2.1 - Path Traversal to RCE
Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppMail User Web Interface. The affected feature is the large file transfer (LFT). This issue affects SeppMail: 15.0.2.1 and before
CWE-434 Mar 05, 2026
CVE-2026-28133 EPSS 0.00
WP Chill Filr <=1.2.12 - File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in WP Chill Filr filr-protection allows Upload a Web Shell to a Web Server.This issue affects Filr: from n/a through <= 1.2.12.
CWE-434 Mar 05, 2026
CVE-2026-28114 9.1 CRITICAL EPSS 0.00
WooCommerce License Manager <=7.0.6 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in firassaidi WooCommerce License Manager fs-license-manager allows Upload a Web Shell to a Web Server.This issue affects WooCommerce License Manager: from n/a through <= 7.0.6.
CWE-434 Mar 05, 2026
CVE-2026-24960 9.9 CRITICAL EPSS 0.00
Charety <2.0.2 - Unrestricted File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Charety charety allows Using Malicious Files.This issue affects Charety: from n/a through < 2.0.2.
CWE-434 Mar 05, 2026