CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
248 results Clear all
CVE-2025-50503 8.8 HIGH 1 Writeup EPSS 0.00
Touch Lebanon Mobile App 2.20.2 - Auth Bypass
A vulnerability in the password reset workflow of the Touch Lebanon Mobile App 2.20.2 allows an attacker to bypass the OTP reset password mechanism. By manipulating the reset process, an unauthorized user may be able to reset the password and gain access to the account without needing to provide a legitimate authentication factor, such as an OTP. This compromises account security and allows for potential unauthorized access to user data.
CWE-640 Aug 20, 2025
CVE-2025-55030 6.1 MEDIUM EPSS 0.00
Firefox for iOS <142 - XSS
Firefox for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline rather than downloading, potentially allowing for XSS attacks This vulnerability affects Firefox for iOS < 142.
CWE-640 Aug 19, 2025
CVE-2025-50594 9.8 CRITICAL EPSS 0.00
Danphe Health Hospital Management System EMR <3.2 - Privilege Escal...
An issue was discovered in /Code/Websites/DanpheEMR/Controllers/Settings/SecuritySettingsController.cs in Danphe Health Hospital Management System EMR 3.2 allowing attackers to reset any account password.
CWE-640 Aug 13, 2025
CVE-2025-7948 4.3 MEDIUM EPSS 0.00
jshERP <3.5 - Weak Password Recovery
A vulnerability classified as problematic was found in jshERP up to 3.5. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/user/updatePwd. The manipulation leads to weak password recovery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-640 Jul 22, 2025
CVE-2025-7881 2.7 LOW EPSS 0.00
Mercusys MW301R 1.0.2 Build 190726 Rel.59423n - Weak Password Recovery
A vulnerability was found in Mercusys MW301R 1.0.2 Build 190726 Rel.59423n. It has been declared as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation of the argument code leads to weak password recovery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Jul 20, 2025
CVE-2024-43190 5.9 MEDIUM EPSS 0.00
IBM Engineering Requirements Management DOORS 9.7.2.9 - Info Disclo...
IBM Engineering Requirements Management DOORS 9.7.2.9, under certain configurations, could allow a remote attacker to obtain password reset instructions of a legitimate user using man in the middle techniques.
CWE-640 Jul 07, 2025
CVE-2025-53373 1 Writeup EPSS 0.00
Natours - SSRF
Natours is a Tour Booking API. The attacker can easily take over any victim account by injecting an attacker-controlled server domain in the Host header when requesting the /forgetpassword endpoint. This vulnerability is fixed with commit 7401793a8d9ed0f0c250c4e0ee2815d685d7a70b.
CWE-640 Jul 07, 2025
CVE-2025-43932 9.8 CRITICAL 1 Writeup EPSS 0.00
JobCenter <7e7b0b2 - Privilege Escalation
JobCenter through 7e7b0b2 allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header.
CWE-640 Jul 07, 2025
CVE-2025-43931 9.8 CRITICAL 1 Writeup EPSS 0.00
flask-boilerplate <a170e7c - Auth Bypass
flask-boilerplate through a170e7c allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header.
CWE-640 Jul 07, 2025
CVE-2025-52560 8.1 HIGH 1 Writeup EPSS 0.00
Kanboard < 1.2.46 - Password Reset Weakness
Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard allows password reset emails to be sent with URLs derived from the unvalidated Host header when the application_url configuration is unset (default behavior). This allows an attacker to craft a malicious password reset link that leaks the token to an attacker-controlled domain. If a victim (including an administrator) clicks the poisoned link, their account can be taken over. This affects all users who initiate a password reset while application_url is not set. This issue has been patched in version 1.2.46.
CWE-640 Jun 24, 2025
CVE-2025-6216 9.8 CRITICAL NUCLEI EPSS 0.25
Allegra - Auth Bypass
Allegra calculateTokenExpDate Password Recovery Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Allegra. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password recovery mechanism. The issue results from reliance upon a predictable value when generating a password reset token. An attacker can leverage this vulnerability to bypass authentication on the application. Was ZDI-CAN-27104.
CWE-640 Jun 21, 2025
CVE-2025-6097 5.3 MEDIUM 1 Writeup EPSS 0.00
UTT 进取 750W <5.0 - Auth Bypass
A vulnerability was found in UTT 进取 750W up to 5.0 and classified as critical. Affected by this issue is the function formDefineManagement of the file /goform/setSysAdm of the component Administrator Password Handler. The manipulation of the argument passwd1 leads to unverified password change. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-620 Jun 16, 2025
CVE-2025-47646 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.05
Gilblas Ngunte Possi PSW Front-end Login & Registration <1.13 - Inf...
Weak Password Recovery Mechanism for Forgotten Password vulnerability in Gilblas Ngunte Possi PSW Front-end Login &amp; Registration allows Password Recovery Exploitation. This issue affects PSW Front-end Login &amp; Registration: from n/a through 1.13.
CWE-640 May 23, 2025
CVE-2025-4903 5.3 MEDIUM 1 Writeup EPSS 0.01
Dlink Di-7003g Firmware - Password Reset Weakness
A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&remote_management=0&http_passwd=game&exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-620 May 19, 2025
CVE-2025-4552 5.4 MEDIUM 1 Writeup EPSS 0.00
Continew Admin < 3.6.0 - Password Reset Weakness
A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-620 May 12, 2025
CVE-2025-3849 4.3 MEDIUM EPSS 0.00
Yxj2018 Springboot-vue-onlineexam - Password Reset Weakness
A vulnerability classified as problematic was found in YXJ2018 SpringBoot-Vue-OnlineExam 1.0. This vulnerability affects unknown code of the file /api/studentPWD. The manipulation of the argument studentId leads to unverified password change. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-620 Apr 22, 2025
CVE-2025-31380 9.8 CRITICAL EPSS 0.00
Paid Videochat Turnkey Site <7.3.11 - Info Disclosure
Weak Password Recovery Mechanism for Forgotten Password vulnerability in videowhisper Paid Videochat Turnkey Site allows Password Recovery Exploitation. This issue affects Paid Videochat Turnkey Site: from n/a through 7.3.11.
CWE-640 Apr 17, 2025
CVE-2024-12295 8.8 HIGH EPSS 0.00
BoomBox Theme Extensions <1.8.0 - Privilege Escalation
The BoomBox Theme Extensions plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.8.0. This is due to the plugin not properly validating a user's identity prior to updating their password through the 'boombox_ajax_reset_password' function. This makes it possible for authenticated attackers, with subscriber-level privileges and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CWE-640 Mar 19, 2025
CVE-2025-29995 EPSS 0.00
CAP Back Office - Privilege Escalation
This vulnerability exists in the CAP back office application due to a weak password-reset mechanism implemented at API endpoints. An authenticated remote attacker with a valid login ID could exploit this vulnerability through vulnerable API endpoint which could lead to account takeover of targeted users.
CWE-640 Mar 13, 2025
CVE-2024-12604 6.5 MEDIUM EPSS 0.00
Tap&Sign App <V.1.025 - Info Disclosure
Cleartext Storage of Sensitive Information in an Environment Variable, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Tapandsign Technologies Tap&Sign App allows Password Recovery Exploitation, Functionality Misuse.This issue affects Tap&Sign App: before V.1.025.
CWE-526 Mar 10, 2025