CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
43 results Clear all
CVE-2026-22886 9.8 CRITICAL EPSS 0.00
OpenMQ - Auth Bypass
OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.
CWE-1393 Mar 03, 2026
CVE-2026-24449 4.6 MEDIUM EPSS 0.00
WRC-X1500GS-B/WRC-X1500GSA-B - Info Disclosure
For WRC-X1500GS-B and WRC-X1500GSA-B, the initial passwords can be calculated easily from the system information.
CWE-1391 Feb 03, 2026
CVE-2025-59103 EPSS 0.00
Access Manager 92xx - Info Disclosure
The Access Manager 92xx in hardware revision K7 is based on Linux instead of Windows CE embedded in older hardware revisions. In this new hardware revision it was noticed that an SSH service is exposed on port 22. By analyzing the firmware of the devices, it was noticed that there are two users with hardcoded and weak passwords that can be used to access the devices via SSH. The passwords can be also guessed very easily. The password of at least one user is set to a random value after the first deployment, with the restriction that the password is only randomized if the configured date is prior to 2022. Therefore, under certain circumstances, the passwords are not randomized. For example, if the clock is never set on the device, the battery of the clock module has been changed, the Access Manager has been factory reset and has not received a time yet.
CWE-1391 Jan 26, 2026
CVE-2026-22920 3.7 LOW EPSS 0.00
Device <unknown> - Info Disclosure
The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.
CWE-1391 Jan 15, 2026
CVE-2026-22910 7.5 HIGH EPSS 0.00
Device - Info Disclosure
The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.
CWE-1391 Jan 15, 2026
CVE-2025-59460 7.5 HIGH EPSS 0.00
Default Deployment - Info Disclosure
The system is deployed in its default state, with configuration settings that do not comply with the latest best practices for restricting access. This increases the risk of unauthorised connections.
CWE-1391 Oct 27, 2025
CVE-2025-30519 9.8 CRITICAL EPSS 0.00
Dover Fueling Solutions ProGauge MagLink LX4 - Privilege Escalation
Dover Fueling Solutions ProGauge MagLink LX4 Devices have default root credentials that cannot be changed through standard administrative means. An attacker with network access to the device can gain administrative access to the system.
CWE-1391 Sep 18, 2025
CVE-2025-6737 7.2 HIGH EPSS 0.00
Securden's Unified PAM - Privilege Escalation
Securden’s Unified PAM Remote Vendor Gateway access portal shares infrastructure and access tokens across multiple tenants. A malicious actor can obtain authentication material and access the gateway server with low-privilege permissions.
CWE-1391 Aug 25, 2025
CVE-2025-55584 5.3 MEDIUM 1 Writeup EPSS 0.00
TOTOLINK A3002R v4.0.0-B20230531.1404 - Info Disclosure
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain insecure credentials for the telnet service and root account.
CWE-1391 Aug 18, 2025
CVE-2025-35970 7.5 HIGH EPSS 0.00
SEIKO EPSON/FUJIFILM - Info Disclosure
On multiple products of SEIKO EPSON and FUJIFILM Corporation, the initial administrator password is easy to guess from the information available via SNMP. If the administrator password is not changed from the initial one, a remote attacker with SNMP access can log in to the product with the administrator privilege.
CWE-1391 Aug 07, 2025
CVE-2025-6077 9.8 CRITICAL EPSS 0.00
Partner Software - Info Disclosure
Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.
CWE-1391 Aug 02, 2025
CVE-2025-53558 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.11
ZTE Japan K.K. - Auth Bypass
ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common credential for all installations. With the knowledge of the credential, an attacker may log in to the affected devices.
CWE-1391 Jul 31, 2025
CVE-2025-6523 7.7 HIGH EPSS 0.00
Devolutions Server <2025.2.3.0 - Auth Bypass
Use of weak credentials in emergency authentication component in Devolutions Server allows an unauthenticated attacker to bypass authentication via brute forcing the short emergency codes generated by the server within a feasible timeframe. This issue affects the following versions : * Devolutions Server 2025.2.2.0 through 2025.2.3.0 * Devolutions Server 2025.1.11.0 and earlier
CWE-1391 Jul 22, 2025
CVE-2025-52364 7.5 HIGH EPSS 0.00
Tenda CP3 Pro Firmware V22.5.4.93 - RCE
Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present
CWE-1391 Jul 09, 2025
CVE-2024-51978 9.8 CRITICAL EXPLOITED 1 PoC 2 Writeups Analysis NUCLEI EPSS 0.48
Unknown Device - Info Disclosure
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
CWE-1391 Jun 25, 2025
CVE-2025-4057 5.5 MEDIUM 1 Writeup EPSS 0.00
ActiveMQ Artemis - Info Disclosure
A flaw was found in ActiveMQ Artemis. The password generated by activemq-artemis-operator does not regenerate between separated CR dependencies.
CWE-1391 May 26, 2025
CVE-2025-32471 3.7 LOW EPSS 0.00
Device <unknown> - Info Disclosure
The device’s passwords have not been adequately salted, making them vulnerable to password extraction attacks.
CWE-1391 Apr 28, 2025
CVE-2025-2229 7.7 HIGH EPSS 0.00
Token Generation - Info Disclosure
A token is created using the username, current date/time, and a fixed AES-128 encryption key, which is the same across all installations.
CWE-1391 Mar 13, 2025
CVE-2025-1081 3.1 LOW EPSS 0.00
Bharti Airtel Xstream Fiber <20250123 - Info Disclosure
A vulnerability was found in Bharti Airtel Xstream Fiber up to 20250123. It has been rated as problematic. This issue affects some unknown processing of the component WiFi Password Handler. The manipulation leads to use of weak credentials. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-1391 Feb 06, 2025
CVE-2025-22936 5.7 MEDIUM EPSS 0.00
Smartcom Bulgaria AD Smartcom Ralink CPE/WiFi router - Info Disclosure
An issue in Smartcom Bulgaria AD Smartcom Ralink CPE/WiFi router SAM-4G1G-TT-W-VC, SAM-4F1F-TT-W-A1 allows a remote attacker to obtain sensitive information via the Weak default WiFi password generation algorithm in WiFi routers.
CWE-1391 Feb 06, 2025