CVE & Exploit Intelligence Database

Updated 26m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
247 results Clear all
CVE-2018-25193 7.5 HIGH 1 PoC Analysis EPSS 0.00
Mongoose Web Server 6.9 - DoS
Mongoose Web Server 6.9 contains a denial of service vulnerability that allows remote attackers to crash the service by establishing multiple socket connections. Attackers can repeatedly create connections to the default port and send malformed data to exhaust server resources and cause service unavailability.
CWE-1188 Mar 06, 2026
CVE-2018-25169 7.5 HIGH 1 PoC Analysis EPSS 0.00
AMPPS 2.7 - DoS
AMPPS 2.7 contains a denial of service vulnerability that allows remote attackers to crash the service by sending malformed data to the default HTTP port. Attackers can establish multiple socket connections and transmit invalid payloads to exhaust server resources and cause service unavailability.
CWE-1188 Mar 06, 2026
CVE-2026-26122 6.5 MEDIUM EPSS 0.01
Microsoft ACI Confidential Containers - Info Disclosure
Initialization of a resource with an insecure default in Azure Compute Gallery allows an authorized attacker to disclose information over a network.
CWE-1188 Mar 05, 2026
CVE-2026-28775 9.8 CRITICAL EPSS 0.00
IDC SFX Series - RCE
An unauthenticated Remote Code Execution (RCE) vulnerability exists in the SNMP service of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver. The deployment insecurely provisions the `private` SNMP community string with read/write access by default. Because the SNMP agent runs as root, an unauthenticated remote attacker can utilize `NET-SNMP-EXTEND-MIB` directives, abusing the fact that the system runs a vulnerable version of net-snmp pre 5.8, to execute arbitrary operating system commands with root privileges.
CWE-1188 Mar 04, 2026
CVE-2025-70998 9.8 CRITICAL 1 Writeup EPSS 0.00
UTT HiPER 810 v1.5.0-140603 - Auth Bypass
UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.
CWE-1188 Feb 18, 2026
CVE-2026-2617 6.3 MEDIUM EPSS 0.00
Beetel 777VR1 <=01.00.09 - Insecure Default
A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the component Telnet Service/SSH Service. The manipulation results in insecure default initialization of resource. The attack can only be performed from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-1188 Feb 17, 2026
CVE-2026-25894 9.8 CRITICAL 1 Writeup EPSS 0.00
FUXA <1.2.9 - RCE
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An insecure default configuration in FUXA allows an unauthenticated, remote attacker to gain administrative access and execute arbitrary code on the server. This affects FUXA through version 1.2.9 when authentication is enabled, but the administrator JWT secret is not configured. This issue has been patched in FUXA version 1.2.10.
CWE-1188 Feb 09, 2026
CVE-2026-1675 5.3 MEDIUM EPSS 0.00
WordPress Advanced Country Blocker <2.3.1 - Auth Bypass
The Advanced Country Blocker plugin for WordPress is vulnerable to Authorization Bypass in all versions up to, and including, 2.3.1 due to the use of a predictable default value for the secret bypass key created during installation without requiring users to change it. This makes it possible for unauthenticated attackers to bypass the geolocation blocking mechanism by appending the key to any URL on sites where the administrator has not changed the default value.
CWE-1188 Feb 07, 2026
CVE-2026-25499 7.5 HIGH 1 Writeup EPSS 0.00
BPG Terraform Provider < 0.93.1 - Path Traversal
Terraform / OpenTofu Provider adds support for Proxmox Virtual Environment. Prior to version 0.93.1, in the SSH configuration documentation, the sudoer line suggested is insecure and can result in escaping the folder using ../, allowing any files on the system to be edited. This issue has been patched in version 0.93.1.
CWE-22 Feb 04, 2026
CVE-2025-69970 9.3 CRITICAL 1 Writeup EPSS 0.00
FUXA v1.2.7 - Info Disclosure
FUXA v1.2.7 contains an insecure default configuration vulnerability in server/settings.default.js. The 'secureEnabled' flag is commented out by default, causing the application to initialize with authentication disabled. This allows unauthenticated remote attackers to access sensitive API endpoints, modify projects, and control industrial equipment immediately after installation.
CWE-1188 Feb 03, 2026
CVE-2025-59097 EPSS 0.00
exos 9300 - Info Disclosure
The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps. This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication: - Re-configure Access Managers (e.g. remove alarming system requirements) - Freely re-configure the inputs and outputs - Open all connected doors permanently - Open all doors for a defined time interval - Change the admin password - and many more Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet.
CWE-306 Jan 26, 2026
CVE-2025-59090 EPSS 0.00
exos 9300 - Info Disclosure
On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards.
CWE-306 Jan 26, 2026
CVE-2025-62877 9.8 CRITICAL EPSS 0.00
SUSE Virtualization (Harvester) <1.5.x,1.6.x - Info Disclosure
Projects using the SUSE Virtualization (Harvester) environment may expose the OS default ssh login password  if they are using the 1.5.x or 1.6.x interactive installer to either create a new cluster or add new hosts to an existing cluster. The environment is not affected if the PXE boot mechanism is utilized along with the Harvester configuration setup.
CWE-1188 Jan 08, 2026
CVE-2025-5591 5.4 MEDIUM EPSS 0.00
Kentico Xperience 13 - XSS
Kentico Xperience 13 is vulnerable to a stored cross-site scripting attack via a form component, allowing an attacker to hijack a victim user’s session and perform actions in their security context.
CWE-1188 Jan 05, 2026
CVE-2025-56332 9.1 CRITICAL EPSS 0.00
Pangolin < 1.7.0 - Authentication Bypass
Authentication Bypass in fosrl/pangolin v1.6.2 and before allows attackers to access Pangolin resource via Insecure Default Configuration
CWE-1188 Dec 30, 2025
CVE-2025-14758 6.5 MEDIUM EPSS 0.00
YAOOK Operator - Info Disclosure
Incorrect configuration of replication security in the MariaDB component of the infra-operator in YAOOK Operator allows an on-path attacker to read database contents, potentially including credentials
CWE-1188 Dec 16, 2025
CVE-2025-66482 6.5 MEDIUM 1 Writeup EPSS 0.00
Misskey <2025.12.0-alpha.2 - SSRF
Misskey is an open source, federated social media platform. Attackers who use an untrusted reverse proxy or not using a reverse proxy at all can bypass IP rate limiting by adding a forged X-Forwarded-For header. Starting with version 2025.9.1, an option (`trustProxy`) has been added in config file to prevent this from happening. However, it is initialized with an insecure default value before version 2025.12.0-alpha.2, making it still vulnerable if the configuration is not set correctly. This is patched in v2025.12.0-alpha.2 by flipping default value of `trustProxy` to `false`. Users of a trusted reverse proxy who are unsure if they manually overode this value should check their config for optimal behavior. Users are running Misskey with a trusted reverse proxy should not be affected by this vulnerability. From v2025.9.1 to v2025.11.1, workaround is available. Set `trustProxy: false` in config file.
CWE-1188 Dec 16, 2025
CVE-2025-64781 4.7 MEDIUM EPSS 0.00
GroupSession <5.7.1 - Open Redirect
In GroupSession Free edition prior to ver5.7.1, GroupSession byCloud prior to ver5.7.1, and GroupSession ZION prior to ver5.7.1, "External page display restriction" is set to "Do not limit" in the initial configuration. With this configuration, the user may be redirected to an arbitrary website when accessing a specially crafted URL.
CWE-1188 Dec 12, 2025
CVE-2025-48629 7.8 HIGH EPSS 0.00
VoiceInteractionManagerService - Privilege Escalation
In findAvailRecognizer of VoiceInteractionManagerService.java, there is a possible way to become the default speech recognizer app due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-1188 Dec 08, 2025
CVE-2025-48621 7.3 HIGH EPSS 0.00
Java - Privilege Escalation
In DefaultTransitionHandler.java, there is a possible way to enable a tapjacking attack due to a insecure default. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CWE-1188 Dec 08, 2025