CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
2,026 results Clear all
CVE-2024-2104 8.8 HIGH EPSS 0.00
BLE Device - Info Disclosure
Due to improper BLE security configurations on the device's GATT server, an adjacent unauthenticated attacker can read and write device control commands through the mobile app service wich could render the device unusable.
CWE-306 Dec 10, 2025
CVE-2023-53774 9.8 CRITICAL 1 PoC Analysis EPSS 0.02
MiniDVBLinux 5.4 - RCE
MiniDVBLinux 5.4 contains a remote code execution vulnerability in the SVDRP protocol that allows remote attackers to send commands to manipulate TV systems. Attackers can send crafted SVDRP commands through the svdrpsend.sh script to execute messages and potentially control the video disk recorder remotely.
CWE-306 Dec 09, 2025
CVE-2023-53773 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
MiniDVBLinux 5.4 - Info Disclosure
MiniDVBLinux 5.4 contains an unauthenticated vulnerability in the tv_action.sh script that allows remote attackers to generate live stream snapshots through the Simple VDR Protocol. Attackers can request /tpl/tv_action.sh to create and retrieve a live TV screenshot stored in /var/www/images/tv.jpg without authentication.
CWE-306 Dec 09, 2025
CVE-2023-53771 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
MiniDVBLinux 5.4 - Auth Bypass
MiniDVBLinux 5.4 contains an authentication bypass vulnerability that allows remote attackers to change the root password without authentication. Attackers can send crafted POST requests to the system setup endpoint with modified SYSTEM_PASSWORD parameters to reset root credentials.
CWE-306 Dec 09, 2025
CVE-2021-47731 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Selea Targa IP OCR-ANPR Camera - Info Disclosure
Selea Targa IP OCR-ANPR Camera contains a hard-coded developer password vulnerability that allows unauthorized configuration access through an undocumented page. Attackers can exploit the hidden endpoint by using the hard-coded password 'Selea781830' to enable configuration upload and overwrite device settings.
CWE-306 Dec 09, 2025
CVE-2021-47727 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Selea Targa IP OCR-ANPR Camera - Info Disclosure
Selea Targa IP OCR-ANPR Camera contains an unauthenticated vulnerability that allows remote attackers to access live video streams without authentication. Attackers can directly connect to RTP/RTSP or M-JPEG streams by requesting specific endpoints like p1.mjpg or p1.264 to view camera footage.
CWE-306 Dec 09, 2025
CVE-2021-47710 1 PoC Analysis EPSS 0.00
COMMAX Smart Home System - Info Disclosure
COMMAX Smart Home System is a smart IoT home solution that allows an unauthenticated attacker to disclose RTSP credentials in plain-text by exploiting the /overview.asp endpoint. Attackers can access sensitive information, including login credentials and DVR settings, by submitting a GET request to this endpoint.
CWE-306 Dec 09, 2025
CVE-2021-47709 1 PoC Analysis EPSS 0.00
COMMAX Smart Home System - DoS
COMMAX Smart Home System allows an unauthenticated attacker to change configuration and cause denial-of-service through the setconf endpoint. Attackers can trigger a denial-of-service scenario by sending a malformed request to the setconf endpoint.
CWE-306 Dec 09, 2025
CVE-2025-59516 7.8 HIGH EPSS 0.00
Windows Storage VSP Driver - Privilege Escalation
Missing authentication for critical function in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.
CWE-306 Dec 09, 2025
CVE-2025-34414 EPSS 0.01
Entrust Instant Financial Issuance (IFI) On Premise <6.10.5-6.11.1 ...
Entrust Instant Financial Issuance (IFI) On Premise software (formerly referred to as CardWizard) versions 5.x, prior to 6.10.5, and prior to 6.11.1 contain an insecure .NET Remoting exposure in the Legacy Remoting Service that is enabled by default. The service registers a TCP remoting channel with SOAP and binary formatters configured at TypeFilterLevel=Full and exposes default ObjectURI endpoints such as logfile.rem, photo.rem, cwPhoto.rem, and reports.rem on a network-reachable remoting port. A remote, unauthenticated attacker who can reach the remoting port can invoke exposed remoting objects to read arbitrary files from the server and coerce outbound authentication, and may achieve arbitrary file write and remote code execution via known .NET Remoting exploitation techniques. This can lead to disclosure of sensitive installation and service-account data and compromise of the affected host.
CWE-502 Dec 09, 2025
CVE-2025-12941 5.7 MEDIUM EPSS 0.00
NETGEAR C6220/C6230 - DoS
Denial of Service Vulnerability in NETGEAR C6220 and C6230 (DOCSIS® 3.0 Two-in-one Cable Modem + WiFi Router) allows authenticated local WiFi users reboot the router.
CWE-306 Dec 09, 2025
CVE-2025-42875 6.6 MEDIUM EPSS 0.00
SAP Internet Communication Framework - Auth Bypass
The SAP Internet Communication Framework does not conduct any authentication checks for features that need user identification allowing an attacker to reuse authorization tokens, violating secure authentication practices causing low impact on Confidentiality, Integrity and Availability of the application.
CWE-306 Dec 09, 2025
CVE-2025-48608 5.5 MEDIUM EPSS 0.00
SettingsProvider - Info Disclosure
In isValidMediaUri of SettingsProvider.java, there is a possible cross user media read due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-862 Dec 08, 2025
CVE-2025-48572 7.8 HIGH KEV EPSS 0.00
Android - Privilege Escalation
In multiple locations, there is a possible way to launch activities from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-306 Dec 08, 2025
CVE-2025-27020 9.8 CRITICAL EPSS 0.00
Infinera MTC-9 <R23.0. - Command Injection
Improper configuration of the SSH service in Infinera MTC-9 allows an unauthenticated attacker to execute arbitrary commands and access data on file system . This issue affects MTC-9: from R22.1.1.0275 before R23.0.
CWE-306 Dec 08, 2025
CVE-2025-27019 9.8 CRITICAL EPSS 0.00
Infinera MTC-9 <R23.0 - RCE
Remote shell service (RSH) in Infinera MTC-9 version R22.1.1.0275 allows an attacker to utilize password-less user accounts and obtain system access by activating a reverse shell.This issue affects MTC-9: from R22.1.1.0275 before R23.0.
CWE-306 Dec 08, 2025
CVE-2025-64056 4.3 MEDIUM 1 Writeup EPSS 0.00
Fanvil X210 Firmware - Missing Authentication
File upload vulnerability in Fanvil x210 V2 2.12.20 allows unauthenticated attackers on the local network to store arbitrary files on the filesystem.
CWE-306 Dec 05, 2025
CVE-2025-66555 1 PoC Analysis EPSS 0.00
AirKeyboard iOS App 1.0.5 - RCE
AirKeyboard iOS App 1.0.5 contains a missing authentication vulnerability that allows unauthenticated attackers to type arbitrary keystrokes directly into the victim's iOS device in real-time without user interaction, resulting in full remote input control.
CWE-306 Dec 04, 2025
CVE-2025-63896 7.6 HIGH 1 Writeup EPSS 0.00
JXL 9 Inch Car Android Double Din Player <v12.0 - Code Injection
An issue in the Bluetooth Human Interface Device (HID) of JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to inject arbitrary keystrokes via a spoofed Bluetooth HID device.
CWE-306 Dec 04, 2025
CVE-2025-27935 EPSS 0.00
PingFederate - Auth Bypass
The OTP Integration Kit for PingFederate fails to enforce HTTP method validation and state validation properly. The server advances the authentication state without verifying the OTP, thereby bypassing multi-factor authentication.
CWE-306 Dec 04, 2025