CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
403 results Clear all
CVE-2026-3965 6.3 MEDIUM 1 Writeup
Whyour Qinglong <=2.20.1 - Auth Bypass
A security vulnerability has been detected in whyour qinglong up to 2.20.1. Affected is an unknown function of the file back/loaders/express.ts of the component API Interface. The manipulation of the argument command leads to protection mechanism failure. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.20.2 is able to address this issue. The identifier of the patch is 6bec52dca158481258315ba0fc2f11206df7b719. It is advisable to upgrade the affected component. The code maintainer was informed beforehand about the issues. He reacted very fast and highly professional.
CWE-693 Mar 12, 2026
CVE-2026-0118 8.4 HIGH EPSS 0.00
oobconfig - Privilege Escalation
In oobconfig, there is a possible bypass of carrier restrictions due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Mar 10, 2026
CVE-2026-30938 5.3 MEDIUM EPSS 0.00
Parse Server <8.6.12/9.5.1-alpha.1 - Auth Bypass
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.12 and 9.5.1-alpha.1, the requestKeywordDenylist security control can be bypassed by placing any nested object or array before a prohibited keyword in the request payload. This is caused by a logic bug that stops scanning sibling keys after encountering the first nested value. Any custom requestKeywordDenylist entries configured by the developer are equally by-passable using the same technique. All Parse Server deployments are affected. The requestKeywordDenylist is enabled by default. This vulnerability is fixed in 8.6.12 and 9.5.1-alpha.1. Use a Cloud Code beforeSave trigger to validate incoming data for prohibited keywords across all classes.
CWE-693 Mar 10, 2026
CVE-2024-55024 9.8 CRITICAL EPSS 0.00
Weintek cMT-3072XH2 v2.1.53 - Auth Bypass
An authentication bypass vulnerability in the authorization mechanism of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to perform Administrative actions using service accounts.
CWE-693 Mar 03, 2026
CVE-2026-0017 7.7 HIGH EPSS 0.00
BiometricService.java - Privilege Escalation
In onChange of BiometricService.java, there is a possible way to enable fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-285 Mar 02, 2026
CVE-2026-0012 6.2 MEDIUM EPSS 0.00
ExpandableNotificationRow - Info Disclosure
In setHideSensitive of ExpandableNotificationRow.java, there is a possible contact name leak due due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-284 Mar 02, 2026
CVE-2026-0011 8.4 HIGH EPSS 0.00
Android Settings - Privilege Escalation
In enableSystemPackageLPw of Settings.java, there is a possible way to prevent location access from working due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-703 Mar 02, 2026
CVE-2025-48653 7.8 HIGH EPSS 0.00
Android - Privilege Escalation
In loadDataAndPostValue of multiple files, there is a possible way to obscure permission usage due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Mar 02, 2026
CVE-2025-48635 7.7 HIGH EPSS 0.00
TaskFragmentOrganizerController - Privilege Escalation
In multiple functions of TaskFragmentOrganizerController.java, there is a possible activity token leak due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-532 Mar 02, 2026
CVE-2025-48605 8.4 HIGH EPSS 0.00
KeyguardViewMediator - Privilege Escalation
In multiple functions of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Mar 02, 2026
CVE-2025-48602 8.4 HIGH EPSS 0.00
KeyguardViewMediator - Privilege Escalation
In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Mar 02, 2026
CVE-2024-31328 8.8 HIGH EPSS 0.00
BroadcastController - Privilege Escalation
In broadcastIntentLockedTraced of BroadcastController.java, there is a possible way to launch arbitrary activities from the background on the paired companion phone due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-693 Mar 02, 2026
CVE-2025-58406 4.3 MEDIUM EPSS 0.00
CGM CLININET - Info Disclosure
The CGM CLININET application respond without essential security HTTP headers, exposing users to client‑side attacks such as clickjacking, MIME sniffing, unsafe caching, weak cross‑origin isolation, and missing transport security controls.
CWE-693 Mar 02, 2026
CVE-2026-2803 7.5 HIGH EPSS 0.00
Firefox <148 - Info Disclosure
Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
CWE-693 Feb 24, 2026
CVE-2026-2768 10.0 CRITICAL EPSS 0.00
Firefox <148 - Sandbox Escape
Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
CWE-284 Feb 24, 2026
CVE-2026-2761 10.0 CRITICAL EPSS 0.00
Firefox <148 - Sandbox Escape
Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
CWE-693 Feb 24, 2026
CVE-2026-26994 6.5 MEDIUM 1 Writeup EPSS 0.00
uTLS <=1.6.7 - TLS Downgrade Vulnerability
uTLS is a fork of crypto/tls, created to customize ClientHello for fingerprinting resistance while still using it for the handshake. In versions 1.6.7 and below, uTLS did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a uTLS ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a uTLS client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because uTLS did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint uTLS connections. This issue has been fixed in version 1.7.0.
CWE-693 Feb 20, 2026
CVE-2026-20667 8.8 HIGH EPSS 0.00
watchOS <26.3 - Info Disclosure
A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.
CWE-693 Feb 11, 2026
CVE-2025-46290 7.5 HIGH EPSS 0.00
macOS <15.7.4-14.8.4 - DoS
A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. A remote attacker may be able to cause a denial-of-service.
CWE-693 Feb 11, 2026
CVE-2026-21513 8.8 HIGH KEV EPSS 0.05
MSHTML Framework - Auth Bypass
Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
CWE-693 Feb 10, 2026