CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
2,026 results Clear all
CVE-2026-1341 EPSS 0.00
Avation Light Engine Pro - Info Disclosure
Avation Light Engine Pro exposes its configuration and control interface without any authentication or access control.
CWE-306 Feb 03, 2026
CVE-2026-25137 9.1 CRITICAL EPSS 0.00
NixOs Odoo <25.11-26.05 - Info Disclosure
The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.
CWE-552 Feb 02, 2026
CVE-2022-50981 9.8 CRITICAL EPSS 0.00
Affected Devices - RCE
An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced.
CWE-306 Feb 02, 2026
CVE-2022-50980 6.5 MEDIUM EPSS 0.00
CAN - DoS
A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN.
CWE-306 Feb 02, 2026
CVE-2022-50979 6.5 MEDIUM EPSS 0.00
Modbus <unknown> - DoS
An unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (RS485).
CWE-306 Feb 02, 2026
CVE-2022-50978 7.5 HIGH EPSS 0.00
Modbus < unknown - DoS
An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP).
CWE-306 Feb 02, 2026
CVE-2022-50977 7.5 HIGH EPSS 0.00
Multiple Config Presets <unknown> - DoS
An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via HTTP.
CWE-306 Feb 02, 2026
CVE-2026-24728 EPSS 0.00
Interinfo DreamMaker <2025/10/22 - Auth Bypass
A missing authentication for critical function vulnerability in the /servlet/baServer3 endpoint of Interinfo DreamMaker versions before 2025/10/22 allows remote attackers to access exposed administrative functionality without prior authentication.
CWE-306 Jan 30, 2026
CVE-2026-25116 7.6 HIGH EPSS 0.00
Runtipi <4.7.2 - Path Traversal
Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml` configuration file. By exploiting insecure URN parsing, an attacker can replace the primary stack configuration with a malicious one, resulting in full Remote Code Execution (RCE) and host filesystem compromise the next time the instance is restarted by the operator. Version 4.7.2 fixes the vulnerability.
CWE-306 Jan 29, 2026
CVE-2026-1453 9.8 CRITICAL 1 Writeup EPSS 0.00
KiloView Encoder Series - Privilege Escalation
A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over the product.
CWE-306 Jan 29, 2026
CVE-2020-36963 7.5 HIGH 1 PoC Analysis EPSS 0.00
Intelbras Router RF 301K <1.1.2 - Auth Bypass
Intelbras Router RF 301K firmware version 1.1.2 contains an authentication bypass vulnerability that allows unauthenticated attackers to download router configuration files. Attackers can send a specific HTTP GET request to /cgi-bin/DownloadCfg/RouterCfm.cfg to retrieve sensitive router configuration without authentication.
CWE-306 Jan 28, 2026
CVE-2025-12386 1 Writeup EPSS 0.00
Pix-Link LV-WR21Q - Info Disclosure
Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo. Remote unauthenticated attacker is able to use this endpoint to e.g: retrieve cleartext password to the access point. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CWE-306 Jan 27, 2026
CVE-2025-59097 EPSS 0.00
exos 9300 - Info Disclosure
The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps. This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication: - Re-configure Access Managers (e.g. remove alarming system requirements) - Freely re-configure the inputs and outputs - Open all connected doors permanently - Open all doors for a defined time interval - Change the admin password - and many more Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet.
CWE-306 Jan 26, 2026
CVE-2025-59090 EPSS 0.00
exos 9300 - Info Disclosure
On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards.
CWE-306 Jan 26, 2026
CVE-2026-1410 6.4 MEDIUM EPSS 0.00
Beetel 777vr1 Firmware < 01.00.09_55 - Missing Authentication
A vulnerability was detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. Impacted is an unknown function of the component UART Interface. The manipulation results in missing authentication. An attack on the physical device is feasible. This attack is characterized by high complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-306 Jan 26, 2026
CVE-2025-52024 9.4 CRITICAL EPSS 0.00
Aptsys Gemscms Backend < 2025-05-28 - Missing Authorization
A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-05-28, which exposes internal API testing tools to unauthenticated users. By accessing specific URLs, an attacker is presented with a directory-style index listing all available backend services and POS web services, each with an HTML form for submitting test input. These panels are intended for developer use, but are accessible in production environments with no authentication or session validation. This grants any external actor the ability to discover, test, and execute API endpoints that perform critical functions including but not limited to user transaction retrieval, credit adjustments, POS actions, and internal data queries.
CWE-306 Jan 23, 2026
CVE-2026-24423 9.8 CRITICAL KEV RANSOMWARE 2 PoCs Analysis EPSS 0.29
SmarterTools SmarterMail <9511 - RCE
SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
CWE-306 Jan 23, 2026
CVE-2021-47891 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Unified Remote 3.9.0.2463 - RCE
Unified Remote 3.9.0.2463 contains a remote code execution vulnerability that allows attackers to send crafted network packets to execute arbitrary commands. Attackers can exploit the service by connecting to port 9512 and sending specially crafted packets to open a command prompt and download and execute malicious payloads.
CWE-306 Jan 23, 2026
CVE-2026-1364 9.8 CRITICAL EPSS 0.00
IAQS I6 - Auth Bypass
IAQS and I6 developed by JNC has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly operate system administrative functionalities.
CWE-306 Jan 23, 2026
CVE-2026-0778 8.8 HIGH EPSS 0.00
Enel X JuiceBox 40 - RCE
Enel X JuiceBox 40 Telnet Service Missing Authentication Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Enel X JuiceBox 40 charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the telnet service, which listens on TCP port 2000 by default. The issue results from the lack of authentication prior to allowing remote connections. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23285.
CWE-306 Jan 23, 2026