CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
88 results Clear all
CVE-2024-29844 9.8 CRITICAL EPSS 0.00
Evolution Controller 2.x - Info Disclosure
Default credentials on the Web Interface of Evolution Controller 2.x allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password.
CWE-1392 Apr 15, 2024
CVE-2024-31069 7.4 HIGH EPSS 0.00
IO-1020 Micro ELD web server - Info Disclosure
IO-1020 Micro ELD web server uses a default password for authentication.
CWE-1392 Apr 12, 2024
CVE-2024-30210 7.4 HIGH EPSS 0.00
IO-1020 Micro ELD - Info Disclosure
IO-1020 Micro ELD uses a default WIFI password that could allow an adjacent attacker to connect to the device.
CWE-1392 Apr 12, 2024
CVE-2024-28093 8.8 HIGH EPSS 0.00
AdTran NetVanta 3120 - Info Disclosure
The TELNET service of AdTran NetVanta 3120 18.01.01.00.E devices is enabled by default, and has default credentials for a root-level account.
CWE-1392 Mar 26, 2024
CVE-2023-49621 9.8 CRITICAL EPSS 0.00
SIMATIC CN 4100 <V2.7 - Privilege Escalation
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application uses default credential with admin privileges. An attacker could use the credentials to gain complete control of the affected device.
CWE-1392 Jan 09, 2024
CVE-2023-30801 9.8 CRITICAL EXPLOITED EPSS 0.01
Qbittorrent < 4.5.5 - Hard-coded Credentials
All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.
CWE-1392 Oct 10, 2023
CVE-2023-3703 10.0 CRITICAL EPSS 0.00
Proscend Advice ICR Series - Default Credentials
Proscend Advice ICR Series routers FW version 1.76 - CWE-1392: Use of Default Credentials
CWE-1392 Sep 03, 2023
CVE-2023-30603 9.8 CRITICAL EPSS 0.01
Hitron Technologies CODA-5310 - Privilege Escalation
Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remote attackers can exploit this vulnerability to obtain the administrator’s privilege, resulting in performing arbitrary system operation or disrupt service.
CWE-1392 Jun 02, 2023