CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
829 results Clear all
CVE-2026-2671 3.1 LOW EPSS 0.00
Mendi Neurofeedback Headset V4 - Info Disclosure
A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy Handler. Performing a manipulation results in cleartext transmission of sensitive information. The attack can only be performed from the local network. The attack's complexity is rated as high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-310 Mar 07, 2026
CVE-2026-30796 EPSS 0.00
RustDesk Server Pro <1.7.5 - Info Disclosure
Cleartext Transmission of Sensitive Information vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Address book sync API modules) allows Sniffing Attacks. This vulnerability is associated with program files Closed source — API endpoint handling heartbeat sync and program routines Heartbeat API handler (accepts preset-address-book-password in plaintext). This issue affects RustDesk Server Pro: through 1.7.5.
CWE-319 Mar 05, 2026
CVE-2026-30795 EPSS 0.00
RustDesk Client <=1.4.5 - Info Disclosure
Cleartext Transmission of Sensitive Information vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop modules) allows Sniffing Attacks. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines Heartbeat JSON payload construction (preset-address-book-password). This issue affects RustDesk Client: through 1.4.5.
CWE-319 Mar 05, 2026
CVE-2025-69969 9.6 CRITICAL 1 Writeup EPSS 0.00
SRK Powertech Pebble Prism Ultra 2.9.2 - Command Injection
A lack of authentication and authorization mechanisms in the Bluetooth Low Energy (BLE) communication protocol of SRK Powertech Pvt Ltd Pebble Prism Ultra v2.9.2 allows attackers to reverse engineer the protocol and execute arbitrary commands on the device without establishing a connection. This is exploitable over Bluetooth Low Energy (BLE) proximity (Adjacent), requiring no physical contact with the device. Furthermore, the vulnerability is not limited to arbitrary commands but includes cleartext data interception and unauthenticated firmware hijacking via OTA services.
CWE-311 Mar 04, 2026
CVE-2025-13490 5.9 MEDIUM EPSS 0.00
IBM App Connect Operator - Info Disclosure
IBM App Connect Operator versions CD 11.3.0 through 11.6.0 and 12.1.0 through 12.20.0, LTS versions 12.0.0 through 12.0.20, and IBM App Connect Enterprise Certified Containers Operands versions CD 12.0.11.2‑r1 through 12.0.12.5‑r1 and 13.0.1.0‑r1 through 13.0.6.1‑r1, and LTS versions 12.0.12‑r1 through 12.0.12‑r20, contain a vulnerability in which the IBM App Connect Enterprise Certified Container transmits data in clear text, potentially allowing an attacker to intercept and obtain sensitive information through man‑in‑the‑middle techniques.
CWE-319 Mar 03, 2026
CVE-2026-20801 5.6 MEDIUM EPSS 0.00
Gallagher VMS - Info Disclosure
Cleartext Transmission of Sensitive Information (CWE-319) in a component used in the Gallagher Hanwha VMS and Gallagher NxWitness VMS integrations allows unprivileged users with local network access to view live video streams. This issue affects all versions of Gallagher NxWitness VMS integration prior to 9.10.017 and Gallagher Hanwha VMS integration prior to 9.10.025.
CWE-319 Mar 03, 2026
CVE-2024-43766 6.5 MEDIUM EPSS 0.00
btm_ble_sec.cc - Info Disclosure
In multiple functions of btm_ble_sec.cc, there is a possible unencrypted communication due to Invalid error handling. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-319 Mar 02, 2026
CVE-2025-58107 7.5 HIGH EPSS 0.00
Microsoft Exchange through 2019 - Info Disclosure
In Microsoft Exchange through 2019, Exchange ActiveSync (EAS) configurations on on-premises servers may transmit sensitive data from Samsung mobile devices in cleartext, including the user's name, e-mail address, device ID, bearer token, and base64-encoded password.
CWE-319 Mar 02, 2026
CVE-2026-27752 5.9 MEDIUM EPSS 0.00
SODOLA SL902-SWTGW124AS <200.1.20 - Info Disclosure
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.
CWE-319 Feb 27, 2026
CVE-2026-24455 7.5 HIGH 1 Writeup EPSS 0.00
Device Web Interface - Info Disclosure
The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HTTP Basic Authentication. Traffic is encoded but not encrypted, exposing user credentials to passive interception by attackers on the same network.
CWE-319 Feb 20, 2026
CVE-2025-27903 5.9 MEDIUM EPSS 0.00
IBM DB2 Recovery Expert 5.5 IF002 - Info Disclosure
IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows transmits data in a cleartext communication channel that could allow an attacker to obtain sensitive information using man in the middle techniques.
CWE-319 Feb 17, 2026
CVE-2026-2539 EPSS 0.00
Micca KE700 - Info Disclosure
The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames. An attacker with a radio interception tool (e.g., SDR) can capture the random number and counters transmitted in cleartext, which is sensitive information required for authentication.
CWE-319 Feb 15, 2026
CVE-2025-10174 8.3 HIGH EPSS 0.00
PanCafe Pro <3.3.2-23092025 - Info Disclosure
Cleartext Transmission of Sensitive Information vulnerability in Pan Software & Information Technologies Ltd. PanCafe Pro allows Flooding.This issue affects PanCafe Pro: from < 3.3.2 through 23092025.
CWE-319 Feb 11, 2026
CVE-2025-66604 5.3 MEDIUM EPSS 0.00
FAST/TOOLS <10.04 - Info Disclosure
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The library version could be displayed on the web page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
CWE-319 Feb 09, 2026
CVE-2026-0714 6.8 MEDIUM EPSS 0.00
Moxa Industrial Linux 3 - Physical Attack
A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.
CWE-319 Feb 05, 2026
CVE-2026-24441 5.9 MEDIUM EPSS 0.00
Shenzhen Tenda AC7 <V03.03.03.01_cn - Info Disclosure
Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior expose account credentials in plaintext within HTTP responses, allowing an on-path attacker to obtain sensitive authentication material.
CWE-319 Feb 03, 2026
CVE-2026-1777 7.2 HIGH EPSS 0.00
Amazon SageMaker Python SDK <v3.2.0,v2.256.0 - Info Disclosure
The Amazon SageMaker Python SDK before v3.2.0 and v2.256.0 includes the ModelBuilder HMAC signing key in the cleartext response elements of the DescribeTrainingJob function. A third party with permissions to both call this API and permissions to modify objects in the Training Jobs S3 output location may have the ability to upload arbitrary artifacts which are executed the next time the Training Job is invoked.
CWE-319 Feb 02, 2026
CVE-2026-23564 6.5 MEDIUM EPSS 0.00
TeamViewer DEX Client <26.1 - Info Disclosure
A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information.
CWE-319 Jan 29, 2026
CVE-2026-22274 6.5 MEDIUM EPSS 0.00
Dell ECS <3.8.1.7 & Dell ObjectScale <4.2.0.0 - Info Disclosure
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Transmission of Sensitive Information vulnerability in the Fabric Syslog. An unauthenticated attacker with remote access could potentially exploit this vulnerability to intercept and modify information in transit.
CWE-319 Jan 23, 2026
CVE-2026-22271 7.5 HIGH EPSS 0.00
Dell ECS <3.8.1.7 & Dell ObjectScale <4.2.0.0 - Info Disclosure
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Transmission of Sensitive Information vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information exposure.
CWE-319 Jan 23, 2026