CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,098 CVEs tracked 53,218 with exploits 4,684 exploited in wild 1,536 CISA KEV 3,912 Nuclei templates 37,750 vendors 42,417 researchers
121 results Clear all
CVE-2026-2878 5.3 MEDIUM EPSS 0.00
Progress Telerik UI for AJAX <2026.1.225 - Info Disclosure
In Progress® Telerik® UI for AJAX, versions prior to 2026.1.225, an insufficient entropy vulnerability exists in RadAsyncUpload, where a predictable temporary identifier, based on timestamp and filename, can enable collisions and file content tampering.
CWE-331 Feb 25, 2026
CVE-2025-0577 4.8 MEDIUM EPSS 0.00
glibc - Insufficient Entropy
An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of functions may return predictable randomness if these functions are called again after the fork, which happens concurrently with a call to any of these functions.
CWE-331 Feb 18, 2026
CVE-2026-2541 EPSS 0.00
Micca KE700 - Info Disclosure
The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code. Successful exploitation simplify an attacker to predict the next valid rolling code, granting unauthorized access to the vehicle.
CWE-331 Feb 15, 2026
CVE-2025-7432 EPSS 0.00
Silicon Labs' Series 2 - Info Disclosure
DPA countermeasures in Silicon Labs' Series 2 devices are not reseeded under certain conditions.  This may allow an attacker to eventually extract secret keys through a DPA attack.
CWE-331 Feb 09, 2026
CVE-2026-1814 EPSS 0.00
Rapid7 Nexpose >=6.4.50 - Info Disclosure
Rapid7 Nexpose versions 6.4.50 and later are vulnerable to an insufficient entropy issue in the CredentialsKeyStorePassword.generateRandomPassword() method. When updating legacy keystore passwords, the application generates a new password with insufficient length (7-12 characters) and a static prefix 'p', resulting in a weak keyspace. An attacker with access to the nsc.ks file can brute-force this password using consumer-grade hardware to decrypt stored credentials.
CWE-331 Feb 03, 2026
CVE-2025-13399 EPSS 0.00
VX800v v1.0 - Info Disclosure
A weakness in the web interface’s application layer encryption in VX800v v1.0 allows an adjacent attacker to brute force the weak AES key and decrypt intercepted traffic. Successful exploitation requires network proximity but no authentication, and may result in high impact to confidentiality, integrity, and availability of transmitted data.
CWE-331 Jan 29, 2026
CVE-2026-22698 1 Writeup EPSS 0.00
RustCrypto <0.14.0-rc.0 - RCE
RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including types and traits for representing various elliptic curve forms, scalars, points, and public/secret keys composed thereof. In versions 0.14.0-pre.0 and 0.14.0-rc.0, a critical vulnerability exists in the SM2 Public Key Encryption (PKE) implementation where the ephemeral nonce k is generated with severely reduced entropy. A unit mismatch error causes the nonce generation function to request only 32 bits of randomness instead of the expected 256 bits. This reduces the security of the encryption from a 128-bit level to a trivial 16-bit level, allowing a practical attack to recover the nonce k and decrypt any ciphertext given only the public key and ciphertext. This issue has been patched via commit e4f7778.
CWE-331 Jan 10, 2026
CVE-2020-36925 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Arteco Web Client DVR/NVR - Auth Bypass
Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera streams without authorization.
CWE-331 Jan 06, 2026
CVE-2025-15387 8.8 HIGH EPSS 0.00
VPN Firewall - Info Disclosure
VPN Firewall developed by QNO Technology has a Insufficient Entropy vulnerability, allowing unauthenticated remote attackers to obtain any logged-in user session through brute-force attacks and subsequently log into the system.
CWE-331 Dec 31, 2025
CVE-2025-67504 9.1 CRITICAL 1 Writeup EPSS 0.00
Wbce Cms < 1.6.5 - Privilege Escalation
WBCE CMS is a content management system. Versions 1.6.4 and below use function GenerateRandomPassword() to create passwords using PHP's rand(). rand() is not cryptographically secure, which allows password sequences to be predicted or brute-forced. This can lead to user account compromise or privilege escalation if these passwords are used for new accounts or password resets. The vulnerability is fixed in version 1.6.5.
CWE-331 Dec 09, 2025
CVE-2025-66565 9.8 CRITICAL 1 Writeup EPSS 0.00
Fiber Utils <2.0.0-rc.3 - Info Disclosure
Fiber Utils is a collection of common functions created for Fiber. In versions 2.0.0-rc.3 and below, when the system's cryptographic random number generator (crypto/rand) fails, both functions silently fall back to returning predictable UUID values, including the zero UUID "00000000-0000-0000-0000-000000000000". The vulnerability occurs through two related but distinct failure paths, both ultimately caused by crypto/rand.Read() failures, compromising the security of all Fiber applications using these functions for security-critical operations. This issue is fixed in version 2.0.0-rc.4.
CWE-331 Dec 09, 2025
CVE-2025-14261 7.1 HIGH EPSS 0.00
Litmus - Auth Bypass
The Litmus platform uses JWT for authentication and authorization, but the secret being used for signing the JWT is only 6 bytes long at its core, which makes it extremely easy to crack.
CWE-331 Dec 08, 2025
CVE-2025-32898 4.7 MEDIUM 1 PoC Analysis EPSS 0.00
KDE Connect <2025-04-18 - Info Disclosure
The KDE Connect verification-code protocol before 2025-04-18 uses only 8 characters and therefore allows brute-force attacks. This affects KDE Connect before 1.33.0 on Android, KDE Connect before 25.04 on desktop, KDE Connect before 0.5 on iOS, Valent before 1.0.0.alpha.47, and GSConnect before 59.
CWE-331 Dec 05, 2025
CVE-2025-62774 3.1 LOW EPSS 0.00
Mercku M6a <2.1.0 - Info Disclosure
On Mercku M6a devices through 2.1.0, the authentication system uses predictable session tokens based on timestamps.
CWE-331 Oct 22, 2025
CVE-2024-58040 9.1 CRITICAL EPSS 0.00
Crypt::RandomEncryption 0.01 - Insecure RNG
Crypt::RandomEncryption for Perl version 0.01 uses insecure rand() function during encryption.
CWE-338 Sep 30, 2025
CVE-2025-59015 6.5 MEDIUM EPSS 0.00
TYPO3 CMS <13.4.17 - Info Disclosure
A deterministic three‑character prefix in the Password Generation component of TYPO3 CMS versions 12.0.0–12.4.36 and 13.0.0–13.4.17 reduces entropy, allowing attackers to carry out brute‑force attacks more quickly.
CWE-331 Sep 09, 2025
CVE-2025-54885 EPSS 0.00
Thinbus Javascript Secure Remote Password <2.0.0 - Info Disclosure
Thinbus Javascript Secure Remote Password is a browser SRP6a implementation for zero-knowledge password authentication. In versions 2.0.0 and below, a protocol compliance bug causes the client to generate a fixed 252 bits of entropy instead of the intended bit length of the safe prime (defaulted to 2048 bits). The client public value is being generated from a private value that is 4 bits below the specification. This reduces the protocol's designed security margin it is now practically exploitable. The servers full sized 2048 bit random number is used to create the shared session key and password proof. This is fixed in version 2.0.1.
CWE-331 Aug 07, 2025
CVE-2025-50122 EPSS 0.00
Unknown - Info Disclosure
A CWE-331: Insufficient Entropy vulnerability exists that could cause root password discovery when the password generation algorithm is reverse engineered with access to installation or upgrade artifacts.
CWE-331 Jul 11, 2025
CVE-2025-6931 3.7 LOW EPSS 0.00
D-Link DCS-6517/7517 <2.02.0 - Insufficient Entropy
A vulnerability classified as problematic was found in D-Link DCS-6517 and DCS-7517 up to 2.02.0. Affected by this vulnerability is the function generate_pass_from_mac of the file /bin/httpd of the component Root Password Generation Handler. The manipulation leads to insufficient entropy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-331 Jun 30, 2025
CVE-2025-52464 8.3 HIGH 1 Writeup EPSS 0.00
Meshtastic <2.6.11 - Info Disclosure
Meshtastic is an open source mesh networking solution. In versions from 2.5.0 to before 2.6.11, the flashing procedure of several hardware vendors was resulting in duplicated public/private keys. Additionally, the Meshtastic was failing to properly initialize the internal randomness pool on some platforms, leading to possible low-entropy key generation. When users with an affected key pair sent Direct Messages, those message could be captured and decrypted by an attacker that has compiled the list of compromised keys. This issue has been patched in version 2.6.11 where key generation is delayed til the first time the LoRa region is set, along with warning users when a compromised key is detected. Version 2.6.12 furthers this patch by automatically wiping known compromised keys when found. A workaround to this vulnerability involves users doing a complete device wipe to remove vendor-cloned keys.
CWE-331 Jun 19, 2025