CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
53 results Clear all
CVE-2025-41762 6.2 MEDIUM EPSS 0.00
wwwdnload.cgi - Info Disclosure
An unauthenticated attacker can abuse the weak hash of the backup generated by the wwwdnload.cgi endpoint to gain unauthorized access to sensitive data, including password hashes and certificates.
CWE-328 Mar 09, 2026
CVE-2026-27754 6.5 MEDIUM EPSS 0.00
SODOLA SL902-SWTGW124AS Firmware <200.1.20 - Auth Bypass
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 hash function for session cookie generation, weakening session security. Attackers can exploit predictable session tokens combined with MD5's collision vulnerabilities to forge valid session cookies and gain unauthorized access to the device.
CWE-328 Feb 27, 2026
CVE-2025-14636 3.7 LOW 1 Writeup EPSS 0.00
Tenda AX9 22.03.01.46 - Weak Hash
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be used for attacks.
CWE-327 Dec 13, 2025
CVE-2025-11650 1.8 LOW 1 Writeup EPSS 0.00
Furbo Mini Firmware < 074 - Broken Cryptographic Algorithm
A vulnerability was determined in Tomofun Furbo 360 and Furbo Mini. The impacted element is an unknown function of the file /etc/shadow of the component Password Handler. Executing manipulation can lead to use of weak hash. The physical device can be targeted for the attack. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been publicly disclosed and may be utilized. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-327 Oct 12, 2025
CVE-2025-59354 5.3 MEDIUM EPSS 0.00
Dragonfly <2.1.0 - Info Disclosure
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the DragonFly2 uses a variety of hash functions, including the MD5 hash, for downloaded files. This allows attackers to replace files with malicious ones that have a colliding hash. This vulnerability is fixed in 2.1.0.
CWE-328 Sep 17, 2025
CVE-2025-9078 4.3 MEDIUM EPSS 0.00
Mattermost <10.8.4 - Info Disclosure
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to properly validate cache keys for link metadata which allows authenticated users to access unauthorized posts and poison link previews via hash collision attacks on FNV-1 hashing
CWE-328 Sep 15, 2025
CVE-2025-55053 6.5 MEDIUM EPSS 0.00
Weak Hash - Info Disclosure
CWE-328: Use of Weak Hash
CWE-328 Sep 09, 2025
CVE-2025-9383 2.5 LOW EPSS 0.00
FNKvision Y215 CCTV Camera - Weak Hash
A security vulnerability has been detected in FNKvision Y215 CCTV Camera 10.194.120.40. This issue affects the function crypt of the file /etc/passwd. The manipulation leads to use of weak hash. The attack can only be performed from a local environment. The complexity of an attack is rather high. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-327 Aug 24, 2025
CVE-2025-54535 5.8 MEDIUM EPSS 0.00
JetBrains TeamCity <2025.07 - Info Disclosure
In JetBrains TeamCity before 2025.07 password reset and email verification tokens were using weak hashing algorithms
CWE-328 Jul 28, 2025
CVE-2025-8260 3.1 LOW 1 Writeup EPSS 0.00
Vaelsys - Broken Cryptographic Algorithm
A vulnerability has been found in Vaelsys 4.1.0 and classified as problematic. This vulnerability affects unknown code of the file /grid/vgrid_server.php of the component MD4 Hash Handler. The manipulation of the argument xajaxargs leads to use of weak hash. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-327 Jul 28, 2025
CVE-2025-41256 7.4 HIGH 1 Writeup EPSS 0.00
Cyberduck <9.1.6 - Mountain Duck <4.17.5 - TLS Pinning Weakness
Cyberduck and Mountain Duck improper handle TLS certificate pinning for untrusted certificates (e.g., self-signed), since the certificate fingerprint is stored as SHA-1, although SHA-1 is considered weak. This issue affects Cyberduck: through 9.1.6; Mountain Duck: through 4.17.5.
CWE-328 Jun 25, 2025
CVE-2025-49197 6.5 MEDIUM EPSS 0.00
FTP App - Info Disclosure
The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.
CWE-328 Jun 12, 2025
CVE-2024-23589 6.8 MEDIUM EPSS 0.00
HCL Glovius Cloud - Info Disclosure
Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs
CWE-328 May 30, 2025
CVE-2025-48931 3.2 LOW EPSS 0.00
TeleMessage <2025-05-05 - Info Disclosure
The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort.
CWE-328 May 28, 2025
CVE-2024-38341 5.9 MEDIUM EPSS 0.00
IBM Sterling Secure Proxy <6.2.0.1 - Info Disclosure
IBM Sterling Secure Proxy 6.0.0.0 through 6.0.3.1, 6.1.0.0 through 6.1.0.0, and 6.2.0.0 through 6.2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CWE-326 May 28, 2025
CVE-2025-41652 9.8 CRITICAL EPSS 0.00
Devices - Auth Bypass
The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
CWE-328 May 27, 2025
CVE-2025-47276 7.5 HIGH 1 Writeup EPSS 0.00
Actualizer <1.2.0 - Info Disclosure
Actualizer is a single shell script solution to allow developers and embedded engineers to create Debian operating systems (OS). Prior to version 1.2.0, Actualizer uses OpenSSL's "-passwd" function, which uses SHA512 instead of a more suitable password hasher like Yescript/Argon2i. All Actualizer users building a full Debian Operating System are affected. Users should upgrade to version 1.2.0 of Actualizer. Existing OS deployment requires manual password changes against the alpha and root accounts. The change will deploy's Debian's yescript overriding the older SHA512 hash created by OpenSSL. As a workaround, users need to reset both `root` and "Alpha" users' passwords.
CWE-328 May 13, 2025
CVE-2024-47829 6.5 MEDIUM EPSS 0.00
pnpm <10.0.0 - Info Disclosure
pnpm is a package manager. Prior to version 10.0.0, the path shortening function uses the md5 function as a path shortening compression function, and if a collision occurs, it will result in the same storage path for two different libraries. Although the real names are under the package name /node_modoules/, there are no version numbers for the libraries they refer to. This issue has been patched in version 10.0.0.
CWE-328 Apr 23, 2025
CVE-2025-3576 5.9 MEDIUM EPSS 0.00
MIT Kerberos - Info Disclosure
A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
CWE-328 Apr 15, 2025
CVE-2025-31130 6.8 MEDIUM 1 Writeup EPSS 0.00
gitoxide <0.42.0 - Info Disclosure
gitoxide is an implementation of git written in Rust. Before 0.42.0, gitoxide uses SHA-1 hash implementations without any collision detection, leaving it vulnerable to hash collision attacks. gitoxide uses the sha1_smol or sha1 crate, both of which implement standard SHA-1 without any mitigations for collision attacks. This means that two distinct Git objects with colliding SHA-1 hashes would break the Git object model and integrity checks when used with gitoxide. This vulnerability is fixed in 0.42.0.
CWE-328 Apr 04, 2025