CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
248 results Clear all
CVE-2025-2093 3.1 LOW EPSS 0.00
Phpgurukul Online Library Management System - Password Reset Weakness
A vulnerability was found in PHPGurukul Online Library Management System 3.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /change-password.php. The manipulation of the argument email/phone number leads to weak password recovery. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CWE-640 Mar 07, 2025
CVE-2025-1570 8.1 HIGH EPSS 0.00
Wpwax Directorist < 8.2 - Password Reset Weakness
The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 8.1. This is due to the directorist_generate_password_reset_pin_code() and reset_user_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.
CWE-640 Feb 28, 2025
CVE-2025-1231 5.4 MEDIUM EPSS 0.00
Dovolations Server <2024.3.10.0 - Privilege Escalation
Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.
CWE-287 Feb 11, 2025
CVE-2025-22144 9.8 CRITICAL EPSS 0.00
NamelessMC - Privilege Escalation
NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-610 Jan 13, 2025
CVE-2025-0331 5.3 MEDIUM EPSS 0.00
YunzMall <2.4.2 - Info Disclosure
A vulnerability, which was classified as critical, has been found in YunzMall up to 2.4.2. This issue affects the function changePwd of the file /app/platform/controllers/ResetpwdController.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Jan 09, 2025
CVE-2024-11350 9.8 CRITICAL EPSS 0.00
AdForest <5.1.6 - Privilege Escalation
The AdForest theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.1.6. This is due to the plugin not properly validating a user's identity prior to updating their password through the adforest_reset_password() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CWE-640 Jan 08, 2025
CVE-2024-53552 9.8 CRITICAL EPSS 0.00
Crushftp < 10.8.3 - Password Reset Weakness
CrushFTP 10 before 10.8.3 and 11 before 11.2.3 mishandles password reset, leading to account takeover.
CWE-640 Dec 10, 2024
CVE-2024-47547 9.4 CRITICAL EPSS 0.00
Ruijie Reyee OS <2.320.x - Info Disclosure
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a weak mechanism for its users to change their passwords which leaves authentication vulnerable to brute force attacks.
CWE-640 Dec 06, 2024
CVE-2024-11103 9.8 CRITICAL EPSS 0.00
Contest-gallery Contest Gallery < 24.0.8 - Password Reset Weakness
The Contest Gallery plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 24.0.7. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CWE-640 Nov 28, 2024
CVE-2024-45670 5.6 MEDIUM EPSS 0.00
IBM Soar < 51.0.2.0 - Password Reset Weakness
IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism.
CWE-640 Nov 14, 2024
CVE-2024-50356 NONE 1 Writeup EPSS 0.00
Press - Info Disclosure
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.
CWE-640 Oct 31, 2024
CVE-2024-48428 9.8 CRITICAL EPSS 0.00
Olivegroup Olivevle - Password Reset Weakness
An issue in Olive VLE allows an attacker to obtain sensitive information via the reset password function.
CWE-640 Oct 25, 2024
CVE-2024-9302 8.1 HIGH EPSS 0.01
Appcheap App Builder < 5.3.7 - Password Reset Weakness
The App Builder – Create Native Android & iOS Apps On The Flight plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.3.7. This is due to the verify_otp_forgot_password() and update_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.
CWE-640 Oct 25, 2024
CVE-2024-9305 8.1 HIGH EPSS 0.00
Apppresser < 4.4.5 - Password Reset Weakness
The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.4. This is due to the appp_reset_password() and validate_reset_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.
CWE-640 Oct 16, 2024
CVE-2024-9907 3.7 LOW EPSS 0.00
QileCMS <1.1.3 - Info Disclosure
A vulnerability classified as problematic was found in QileCMS up to 1.1.3. This vulnerability affects the function sendEmail of the file /qilecms/user/controller/Forget.php of the component Verification Code Handler. The manipulation leads to weak password recovery. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Oct 13, 2024
CVE-2024-45980 8.8 HIGH 1 Writeup EPSS 0.00
MEANStore 1.0 - Host Header Injection
A host header injection vulnerability in MEANStore 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
CWE-640 Sep 26, 2024
CVE-2024-8878 9.8 CRITICAL EPSS 0.01
Riello-ups Netman 204 Firmware < 4.05 - Password Reset Weakness
The password recovery mechanism for the forgotten password in Riello Netman 204 allows an attacker to reset the admin password and take over control of the device.This issue affects Netman 204: through 4.05.
CWE-640 Sep 25, 2024
CVE-2024-8692 5.3 MEDIUM EPSS 0.00
TDuckCloud TDuckPro <6.3 - Weak Password Recovery
A vulnerability classified as critical was found in TDuckCloud TDuckPro up to 6.3. Affected by this vulnerability is an unknown functionality. The manipulation leads to weak password recovery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Sep 11, 2024
CVE-2024-42915 8.0 HIGH 2 Writeups EPSS 0.00
Staff Appraisal System v1.0 - Host Header Injection
A host header injection vulnerability in Staff Appraisal System v1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This will allow attackers to arbitrarily reset other users' passwords and compromise their accounts.
CWE-640 Aug 23, 2024
CVE-2024-6203 8.3 HIGH EPSS 0.00
HaloITSM <2.146.1 - Password Reset Poisoning
HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim's account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
CWE-640 Aug 06, 2024