CVE & Exploit Intelligence Database

Updated 23m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
1,623 results Clear all
CVE-2026-29023 7.3 HIGH
Keygraph Shannon - Auth Bypass
Keygraph Shannon contains a hard-coded API key in its router configuration that, when the router component is enabled and exposed, allows network attackers to authenticate using the publicly known static key. An attacker able to reach the router port can proxy requests through the Shannon instance using the victim’s configured upstream provider API credentials, resulting in unauthorized API usage and potential disclosure of proxied request and response data. This vulnerability's general exploitability has been mitigated with the introduction of commit 023cc95.
CWE-798 Mar 09, 2026
CVE-2026-29128 10.0 CRITICAL EPSS 0.00
IDC SFX2100 Firmware - Info Disclosure
IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able to abuse the reuse/hardcoded nature of these credentials to further access other systems in the network, gain a foothold on the satellite receiver or potentially locally privilege escalate.
CWE-798 Mar 05, 2026
CVE-2026-29120 EPSS 0.00
IDC SFX Series - Info Disclosure
The /root/anaconda-ks.cfg installation configuration file in International Datacasting Corporation (IDC) SFX Series(SFX2100) SuperFlex Satellite Receiver insecurely stores the hardcoded root password hash. The password itself is highly insecure and susceptible to offline dictionary attacks using the rockyou.txt wordlist. Because direct root SSH login is disabled, an attacker must first obtain low-privileged access to the system (e.g., via other vulnerabilities) to be able to log in as the root user. The password is hardcoded and so allows for an actor with local access on effected versions to escalate to root
CWE-798 Mar 04, 2026
CVE-2026-29119 EPSS 0.00
IDC SFX Series SuperFlex(SFX2100) - Auth Bypass
International Datacasting Corporation (IDC) SFX Series SuperFlex(SFX2100) SatelliteReceiver contains hardcoded and insecure credentials for the `admin` account. A remote unauthenticated attacker can use these undocumented credentials to access the satellite system directly via the Telnet service, leading to potential system compromise.
CWE-798 Mar 04, 2026
CVE-2026-28778 EPSS 0.00
IDC SFX Series - Auth Bypass
International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver contains undocumented, hardcoded/insecure credentials for the `xd` user account. A remote unauthenticated attacker can log in via FTP using these credentials. Because the `xd` user has write permissions to their home directory where root-executed binaries and symlinks (such as those invoked by `xdstartstop`) are stored, the attacker can overwrite these files or manipulate symlinks to achieve arbitrary code execution as the root user.
CWE-798 Mar 04, 2026
CVE-2026-28777 EPSS 0.00
IDC SFX2100 - Auth Bypass
International Datacasting Corporation (IDC) SFX2100 Satellite Receiver, trivial password for the `user` (usr) account. A remote unauthenticated attacker can exploit this to gain unauthorized SSH access to the system, while intially dropped into a restricted shell, an attacker can trivially spawn a complete pty to gain an appropriately interactive shell.
CWE-798 Mar 04, 2026
CVE-2026-28776 EPSS 0.00
IDC SFX Series - Auth Bypass
International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver contains hardcoded credentials for the `monitor` account. A remote unauthenticated attacker can use these trivial, undocumented credentials to access the system via SSH. While initially dropped into a restricted shell, the attacker can trivially break out to achieve standard shell functionality.
CWE-798 Mar 04, 2026
CVE-2025-14923 4.7 MEDIUM EPSS 0.00
IBM WebSphere Liberty 17.0.0.3-26.0.0.2 - Auth Bypass
IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.2 IBM WebSphere Application Server Liberty could provide weaker than expected security when using the Security Utility when administering security settings.
CWE-321 Mar 03, 2026
CVE-2024-55027 7.5 HIGH EPSS 0.00
Weintek cMT-3072XH2 v2.1.53 - Info Disclosure
Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to stroe credentials in plaintext in the component uac_temp.db.
CWE-312 Mar 03, 2026
CVE-2024-55023 5.3 MEDIUM EPSS 0.00
Weintek cMT-3072XH2 v2.1.53 - Info Disclosure
Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded encryption key which could allow attackers to access sensitive information.
CWE-798 Mar 03, 2026
CVE-2024-55021 7.5 HIGH EPSS 0.00
Weintek cMT-3072XH2 v2.1.53 - Auth Bypass
Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded password in the FTP protocol.
CWE-798 Mar 03, 2026
CVE-2026-27167 NONE EPSS 0.00
Gradio 4.16.0-6.6.0 - Auth Bypass
Gradio is an open-source Python package designed for quick prototyping. Starting in version 4.16.0 and prior to version 6.6.0, Gradio applications running outside of Hugging Face Spaces automatically enable "mocked" OAuth routes when OAuth components (e.g. `gr.LoginButton`) are used. When a user visits `/login/huggingface`, the server retrieves its own Hugging Face access token via `huggingface_hub.get_token()` and stores it in the visitor's session cookie. If the application is network-accessible, any remote attacker can trigger this flow to steal the server owner's HF token. The session cookie is signed with a hardcoded secret derived from the string `"-v4"`, making the payload trivially decodable. Version 6.6.0 fixes the issue.
CWE-798 Feb 27, 2026
CVE-2025-1242 9.1 CRITICAL 2 PoCs 1 Writeup Analysis EPSS 0.00
Gardyn IoT Hub - Info Disclosure
The administrative credentials can be extracted through application API responses, mobile application reverse engineering, and device firmware reverse engineering. The exposure may result in an attacker gaining full administrative access to the Gardyn IoT Hub exposing connected devices to malicious control.
CWE-798 Feb 25, 2026
CVE-2025-13776 7.1 HIGH EPSS 0.00
Finka Programs - Auth Bypass
Multiple Finka programs use hard-coded Firebird database credentials (shared across all instances of this software). A malicious attacker in local network who knows default credentials is able to read and edit database content. This vulnerability has been fixed in version: Finka-FK 18.5, Finka-KPR 16.6, Finka-Płace 13.4, Finka-Faktura 18.3, Finka-Magazyn 8.3, Finka-STW 12.3
CWE-798 Feb 24, 2026
CVE-2026-27507 9.8 CRITICAL EPSS 0.00
Binardat 10G08-0800GSM V300SP10260209 - Auth Bypass
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.
CWE-798 Feb 24, 2026
CVE-2025-67304 9.8 CRITICAL 1 Writeup EPSS 0.00
Ruckus Network Director <4.5.0.54 - Auth Bypass
In Ruckus Network Director (RND) < 4.5.0.54, the OVA appliance contains hardcoded credentials for the ruckus PostgreSQL database user. In the default configuration, the PostgreSQL service is accessible over the network on TCP port 5432. An attacker can use the hardcoded credentials to authenticate remotely, gaining superuser access to the database. This allows creation of administrative users for the web interface, extraction of password hashes, and execution of arbitrary OS commands.
CWE-798 Feb 19, 2026
CVE-2026-2702 3.1 LOW EPSS 0.00
Beetel 777VR1 <=01.00.09 - Auth Bypass
A security flaw has been discovered in Beetel 777VR1 up to 01.00.09. This issue affects some unknown processing of the component WPA2 PSK. Performing a manipulation results in hard-coded credentials. The attacker must have access to the local network to execute the attack. The complexity of an attack is rather high. The exploitability is assessed as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Feb 19, 2026
CVE-2026-22769 10.0 CRITICAL KEV EPSS 0.34
Dell RecoverPoint <6.0.3.1 HF1 - Auth Bypass
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.
CWE-798 Feb 17, 2026
CVE-2025-33089 6.5 MEDIUM EPSS 0.00
IBM Concert 1.0.0-2.1.0 - Auth Bypass
IBM Concert 1.0.0 through 2.1.0 could allow a remote attacker to obtain sensitive information or perform unauthorized actions due to the use of hard coded user credentials.
CWE-798 Feb 17, 2026
CVE-2026-23647 9.8 CRITICAL EPSS 0.00
Glory RBG-100 ISPK-08 - Auth Bypass
Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An attacker with network access to exposed services such as SSH may authenticate using these credentials and gain unauthorized access to the system. Successful exploitation allows remote access with elevated privileges and may result in full system compromise.
CWE-798 Feb 17, 2026