CVE & Exploit Intelligence Database

Updated 25m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
249 results Clear all
CVE-2026-27575 9.1 CRITICAL EPSS 0.00
Vikunja <2.0.0 - Auth Bypass
Vikunja is an open-source self-hosted task management platform. Prior to version 2.0.0, the application allows users to set weak passwords (e.g., 1234, password) without enforcing minimum strength requirements. Additionally, active sessions remain valid after a user changes their password. An attacker who compromises an account (via brute-force or credential stuffing) can maintain persistent access even after the victim resets their password. Version 2.0.0 contains a fix.
CWE-613 Feb 25, 2026
CVE-2026-25715 9.8 CRITICAL 1 Writeup EPSS 0.00
Device Web Interface - Auth Bypass
The web management interface of the device allows the administrator username and password to be set to blank values. Once applied, the device permits authentication with empty credentials over the web management interface and Telnet service. This effectively disables authentication across all critical management channels, allowing any network-adjacent attacker to gain full administrative control without credentials.
CWE-521 Feb 20, 2026
CVE-2026-1408 2.0 LOW EPSS 0.00
Beetel 777VR1 <01.00.09/01.00.09_55 - Info Disclosure
A weakness has been identified in Beetel 777VR1 up to 01.00.09/01.00.09_55. This vulnerability affects unknown code of the component UART Interface. Executing a manipulation can lead to weak password requirements. The physical device can be targeted for the attack. The attack requires a high level of complexity. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-521 Jan 25, 2026
CVE-2025-55252 3.1 LOW EPSS 0.00
HCL AION <2 - Info Disclosure
HCL AION  version 2 is affected by a Weak Password Policy vulnerability. This can  allow the use of easily guessable passwords, potentially resulting in unauthorized access
CWE-521 Jan 19, 2026
CVE-2025-68963 5.7 MEDIUM EPSS 0.00
Clone Module - Info Disclosure
Man-in-the-middle attack vulnerability in the Clone module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CWE-521 Jan 14, 2026
CVE-2025-68716 8.4 HIGH 1 Writeup EPSS 0.00
KAYSUS KS-WR3600 - RCE
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. This allows any LAN-adjacent attacker to trivially gain root shell access and execute arbitrary commands with full privileges.
CWE-284 Jan 08, 2026
CVE-2025-23408 6.5 MEDIUM EPSS 0.00
Apache Fineract <1.10.1 - Info Disclosure
Weak Password Requirements vulnerability in Apache Fineract. This issue affects Apache Fineract: through 1.10.1. The issue is fixed in version 1.11.0. Users are encouraged to upgrade to version 1.13.0, the latest release.
CWE-521 Dec 12, 2025
CVE-2025-67513 EPSS 0.00
FreePBX <16.0.96 & <17.0.1-9 - Info Disclosure
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
CWE-521 Dec 10, 2025
CVE-2025-53963 9.8 CRITICAL EPSS 0.00
Thermo Fisher Ion Torrent OneTouch 2 - RCE
An issue was discovered on Thermo Fisher Ion Torrent OneTouch 2 INS1005527 devices. They run an SSH server accessible over the default port 22. The root account has a weak default password of ionadmin, and a password change policy for the root account is not enforced. Thus, an attacker with network connectivity can achieve root code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CWE-521 Dec 04, 2025
CVE-2025-65014 3.7 LOW EPSS 0.00
LibreNMS <25.11.0 - Info Disclosure
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Prior to version 25.11.0, a weak password policy vulnerability was identified in the user management functionality of the LibreNMS application. This vulnerability allows administrators to create accounts with extremely weak and predictable passwords, such as 12345678. This exposes the platform to brute-force and credential stuffing attacks. This issue has been patched in version 25.11.0.
CWE-521 Nov 18, 2025
CVE-2025-63800 7.5 HIGH EPSS 0.00
Open Source Point of Sale 3.4.1 - Info Disclosure
The password change endpoint in Open Source Point of Sale 3.4.1 allows users to set their account password to an empty string due to missing server-side validation. When an authenticated user omits or leaves the `password` and `repeat_password` parameters empty in the password change request, the backend still returns a successful response and sets the password to an empty string. This effectively disables authentication and may allow unauthorized access to user or administrative accounts.
CWE-521 Nov 18, 2025
CVE-2025-63747 9.8 CRITICAL EPSS 0.00
QaTraq 6.9.2 - Info Disclosure
QaTraq 6.9.2 ships with administrative account credentials which are enabled in default installations and permit immediate login via the web application login page. Because the account provides administrative privileges in the default configuration, an attacker who can reach the login page can gain administrative access.
CWE-521 Nov 17, 2025
CVE-2025-55034 8.2 HIGH 1 Writeup EPSS 0.00
General Industrial Controls Lynx+ Gateway - Info Disclosure
General Industrial Controls Lynx+ Gateway is vulnerable to a weak password requirement vulnerability, which may allow an attacker to execute a brute-force attack resulting in unauthorized access and login.
CWE-521 Nov 15, 2025
CVE-2025-12552 9.8 CRITICAL EPSS 0.00
BLU-IC2 <1.19.5 - Info Disclosure
Insufficient Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
CWE-521 Oct 31, 2025
CVE-2025-11200 9.8 CRITICAL 1 Writeup EPSS 0.00
MLflow - Auth Bypass
MLflow Weak Password Requirements Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from weak password requirements. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26916.
CWE-521 Oct 29, 2025
CVE-2025-12364 9.8 CRITICAL EPSS 0.00
BLU-IC2, IC4 <1.19.5 - Info Disclosure
Weak Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
CWE-521 Oct 27, 2025
CVE-2025-12285 9.8 CRITICAL EPSS 0.00
Azure-access Blu-ic2 Firmware < 1.20 - Improper Input Validation
Missing Initial Password Change.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
CWE-521 Oct 26, 2025
CVE-2025-60954 8.3 HIGH 1 Writeup EPSS 0.00
Microweber CMS 2.0 - Info Disclosure
Microweber CMS 2.0 has Weak Password Requirements. The application does not enforce minimum password length or complexity during password resets. Users can set extremely weak passwords, including single-character passwords, which can lead to account compromise, including administrative accounts.
CWE-521 Oct 24, 2025
CVE-2025-11322 3.7 LOW EPSS 0.00
Mangati NovoSGA <2.2.12 - Info Disclosure
A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirmação da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-521 Oct 06, 2025
CVE-2023-49883 5.9 MEDIUM EPSS 0.00
IBM Transformation Extender Advanced 10.0.1 - Info Disclosure
IBM Transformation Extender Advanced 10.0.1 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.
CWE-521 Oct 01, 2025