CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
248 results Clear all
CVE-2023-3007 6.5 MEDIUM EPSS 0.00
Ningzichun Student Management System 1.0 - Weak Password Recovery
A vulnerability was found in ningzichun Student Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file resetPassword.php of the component Password Reset Handler. The manipulation of the argument sid leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230354 is the identifier assigned to this vulnerability.
CWE-640 May 31, 2023
CVE-2023-31459 8.8 HIGH EPSS 0.00
Mitel MiVoice Connect <9.6.2208.101 - Privilege Escalation
A vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect versions 9.6.2208.101 and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because the initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands.
CWE-640 May 24, 2023
CVE-2023-28821 5.3 MEDIUM EPSS 0.00
Concrete CMS <9.1 - Info Disclosure
Concrete CMS (previously concrete5) before 9.1 did not have a rate limit for password resets.
CWE-640 Apr 28, 2023
CVE-2023-30466 9.8 CRITICAL EPSS 0.01
Milesight Ms-n5008-uc Firmware - Password Reset Weakness
This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device. Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.
CWE-640 Apr 28, 2023
CVE-2023-31287 7.8 HIGH 1 Writeup EPSS 0.00
Serenity Serene <6.7.0 - Info Disclosure
An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. Password reset links are sent by email. A link contains a token that is used to reset the password. This token remains valid even after the password reset and can be used a second time to change the password of the corresponding user. The token expires only 3 hours after issuance and is sent as a query parameter when resetting. An attacker with access to the browser history can thus use the token again to change the password in order to take over the account.
CWE-640 Apr 27, 2023
CVE-2021-36436 5.3 MEDIUM 1 Writeup EPSS 0.00
Mobicint Backend for Credit Unions <3 - Info Disclosure
An issue in Mobicint Backend for Credit Unions v3 allows attackers to retrieve partial email addresses and user entered information via submission to the forgotten-password endpoint.
CWE-640 Apr 20, 2023
CVE-2022-45637 9.8 CRITICAL EPSS 0.00
Megafeis Bofei Dbd+ - Password Reset Weakness
An insecure password reset issue discovered in MEGAFEIS, BOFEI DBD+ Application for IOS & Android v1.4.4 service via insecure expiry mechanism.
CWE-640 Mar 21, 2023
CVE-2022-47697 9.8 CRITICAL EPSS 0.00
Comfast Cf-wr623n Firmware < 2.3.0.1 - Password Reset Weakness
COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 and before is vulnerable to Account takeover. Anyone can reset the password of the admin accounts.
CWE-640 Jan 31, 2023
CVE-2022-26872 8.3 HIGH EPSS 0.00
AMI Megarac - Privilege Escalation
AMI Megarac Password reset interception via API
CWE-640 Jan 30, 2023
CVE-2015-10071 2.6 LOW EPSS 0.00
gitter-badger ezpublish-modern-legacy - Weak Password Recovery
A vulnerability was found in gitter-badger ezpublish-modern-legacy. It has been rated as problematic. This issue affects some unknown processing of the file kernel/user/forgotpassword.php. The manipulation leads to weak password recovery. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.0 is able to address this issue. The patch is named 5908d5ee65fec61ce0e321d586530461a210bf2a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218951.
CWE-640 Jan 19, 2023
CVE-2022-25027 7.5 HIGH EPSS 0.01
Rocketsoftware Trufusion Enterprise < 7.9.5.1 - Authentication Bypass
The Forgotten Password functionality of Rocket TRUfusion Portal v7.9.2.1 allows remote attackers to bypass authentication and access restricted pages by validating the user's session token when the "Password forgotten?" button is clicked.
CWE-287 Jan 12, 2023
CVE-2020-12067 7.5 HIGH EPSS 0.00
Pilz Pmc < 3.5.17 - Password Reset Weakness
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), a user's password may be changed by an attacker without knowledge of the current password.
CWE-640 Dec 26, 2022
CVE-2022-47377 9.8 CRITICAL EPSS 0.01
SICK SIM2000ST <1.13.4 - Privilege Escalation
Password recovery vulnerability in SICK SIM2000ST Partnumber 2086502 with firmware version <1.13.4 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to an increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 1.13.4 as soon as possible (available in SICK Support Portal).
CWE-306 Dec 16, 2022
CVE-2022-3485 9.8 CRITICAL EPSS 0.01
IFM Moneo Qha210 Firmware < 1.9.3 - Password Reset Weakness
In IFM Moneo Appliance with version up to 1.9.3 an unauthenticated remote attacker can reset the administrator password by only supplying the serial number and thus gain full control of the device.
CWE-640 Dec 12, 2022
CVE-2022-44004 9.8 CRITICAL EPSS 0.02
BACKCLICK Professional <5.9.63 - Auth Bypass
An issue was discovered in BACKCLICK Professional 5.9.63. Due to insecure design or lack of authentication, unauthenticated attackers can complete the password-reset process for any account and set a new password.
CWE-640 Nov 16, 2022
CVE-2022-37300 9.8 CRITICAL EPSS 0.01
Schneider-electric Ecostruxure Contro... - Password Reset Weakness
A CWE-640: Weak Password Recovery Mechanism for Forgotten Password vulnerability exists that could cause unauthorized access in read and write mode to the controller when communicating over Modbus. Affected Products: EcoStruxure Control Expert Including all Unity Pro versions (former name of EcoStruxure Control Expert) (V15.0 SP1 and prior), EcoStruxure Process Expert, Including all versions of EcoStruxure Hybrid DCS (former name of EcoStruxure Process Expert) (V2021 and prior), Modicon M340 CPU (part numbers BMXP34*) (V3.40 and prior), Modicon M580 CPU (part numbers BMEP* and BMEH*) (V3.20 and prior).
CWE-640 Sep 12, 2022
CVE-2022-34530 5.3 MEDIUM 1 Writeup EPSS 0.00
Backdropcms Backdrop Cms < 1.22.0 - Password Reset Weakness
An issue in the login and reset password functionality of Backdrop CMS v1.22.0 allows attackers to enumerate usernames via password reset requests and distinct responses returned based on usernames.
CWE-640 Aug 01, 2022
CVE-2022-23172 5.5 MEDIUM EPSS 0.00
Priority < 22.0 - Password Reset Weakness
An attacker can access to "Forgot my password" button, as soon as he puts users is valid in the system, the system would issue a message that a password reset email had been sent to user. This way you can verify which users are in the system and which are not.
CWE-640 Jul 06, 2022
CVE-2022-29174 8.1 HIGH 1 Writeup EPSS 0.00
Countly Server <22.03.7, <21.11.4 - Info Disclosure
countly-server is the server-side part of Countly, a product analytics solution. Prior to versions 22.03.7 and 21.11.4, a malicious actor who knows an account email address/username and full name specified in the database is capable of guessing the password reset token. The actor may use this information to reset the password and take over the account. The problem has been patched in Countly Server version 22.03.7 for servers using the new user interface and in 21.11.4 for servers using the old user interface.
CWE-640 May 17, 2022
CVE-2022-29933 8.8 HIGH 1 Writeup EPSS 0.02
Craftcms Craft Cms < 3.7.36 - Password Reset Weakness
Craft CMS through 3.7.36 allows a remote unauthenticated attacker, who knows at least one valid username, to reset the account's password and take over the account by providing a crafted HTTP header to the application while using the password reset functionality. Specifically, the attacker must send X-Forwarded-Host to the /index.php?p=admin/actions/users/send-password-reset-email URI. NOTE: the vendor's position is that a customer can already work around this by adjusting the configuration (i.e., by not using the default configuration).
CWE-640 May 09, 2022