CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
1,626 results Clear all
CVE-2025-38741 7.5 HIGH EPSS 0.00
Dell Enterprise SONiC OS <4.5.0 - Info Disclosure
Dell Enterprise SONiC OS, version 4.5.0, contains a cryptographic key vulnerability in SSH. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to unauthorized access to communication.
CWE-321 Aug 04, 2025
CVE-2025-26476 8.4 HIGH EPSS 0.00
Dell ECS <3.8.1.5/ObjectScale 4.0.0.0 - Memory Corruption
Dell ECS versions prior to 3.8.1.5/ ObjectScale version 4.0.0.0, contain a Use of Hard-coded Cryptographic Key vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.
CWE-321 Aug 04, 2025
CVE-2025-51536 9.8 CRITICAL EPSS 0.00
OpenAtlas <8.11.0 - Info Disclosure
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a hardcoded Administrator password.
CWE-1392 Aug 04, 2025
CVE-2025-44643 8.6 HIGH EPSS 0.00
Draytek AP903 <1.4.18-AP918R <1.4.9 - Privilege Escalation
Certain Draytek products are affected by Insecure Configuration. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the password property in the ripd.conf configuration file sets a hardcoded weak password, posing a security risk. An attacker with network access could exploit this to gain unauthorized control over the routing daemon, potentially altering network routes or intercepting traffic.
CWE-276 Aug 04, 2025
CVE-2025-37112 6.0 MEDIUM EPSS 0.00
HPE Telco NFVO - Info Disclosure
A vulnerability was discovered in the storage policy for certain sets of encryption keys in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information.
CWE-798 Jul 31, 2025
CVE-2025-37111 6.0 MEDIUM EPSS 0.00
HPE Telco NFVO - Info Disclosure
A vulnerability was discovered in the storage policy for certain sets of authentication keys in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information.
CWE-798 Jul 31, 2025
CVE-2014-125121 2 PoCs Analysis EPSS 0.41
Array Networks vAPV/vxAG <8.3.2.17-9.2.0.34 - Privilege Escalation
Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The devices ship with a default SSH login or a hardcoded DSA private key, allowing an attacker to authenticate remotely with limited privileges. Once authenticated, an attacker can overwrite the world-writable /ca/bin/monitor.sh script with arbitrary commands. Since this script is executed with elevated privileges through the backend binary, enabling the debug monitor via backend -c "debug monitor on" triggers execution of the attacker's payload as root. This allows full system compromise.
CWE-798 Jul 31, 2025
CVE-2025-30125 9.8 CRITICAL 1 Writeup EPSS 0.00
Marbella KR8s Dashcam FF <2.0.8 - Info Disclosure
An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 devices. All dashcams were shipped with the same default credentials of 12345678, which creates an insecure-by-default condition. For users who change their passwords, it's limited to 8 characters. These short passwords can be cracked in 8 hours via low-end commercial cloud resources.
CWE-798 Jul 28, 2025
CVE-2025-8231 6.8 MEDIUM 1 Writeup EPSS 0.00
D-Link DIR-890L <111b04 - Hard-Coded Credentials
A vulnerability, which was classified as critical, has been found in D-Link DIR-890L up to 111b04. This issue affects some unknown processing of the file rgbin of the component UART Port. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CWE-259 Jul 27, 2025
CVE-2025-45466 8.8 HIGH 1 PoC Analysis EPSS 0.00
Unitree Go1 Firmware - Hard-coded Credentials
Unitree Go1 <= Go1_2022_05_11 is vulnerale to Incorrect Access Control due to authentication credentials being hardcoded in plaintext.
CWE-798 Jul 25, 2025
CVE-2014-125115 2 PoCs Analysis EPSS 0.65
Pandora FMS <5.0 SP2 - SQL Injection
An unauthenticated SQL injection vulnerability exists in Pandora FMS version 5.0 SP2 and earlier. The mobile/index.php endpoint fails to properly sanitize user input in the loginhash_data parameter, allowing attackers to extract administrator credentials or active session tokens via crafted requests. This occurs because input is directly concatenated into an SQL query without adequate validation, enabling SQL injection. After authentication is bypassed, a second vulnerability in the File Manager component permits arbitrary PHP file uploads. The file upload functionality does not enforce MIME-type or file extension restrictions, allowing authenticated users to upload web shells into a publicly accessible directory and achieve remote code execution.
CWE-798 Jul 25, 2025
CVE-2025-31953 7.1 HIGH EPSS 0.00
Hcltech Dryice Iautomate - Hard-coded Credentials
HCL iAutomate includes hardcoded credentials which may result in potential exposure of confidential data if intercepted or accessed by unauthorized parties.
CWE-798 Jul 24, 2025
CVE-2025-54455 9.1 CRITICAL EPSS 0.00
Samsung Magicinfo 9 Server < 21.1080.0 - Hard-coded Credentials
Use of Hard-coded Credentials vulnerability in Samsung Electronics MagicINFO 9 Server allows Authentication Bypass.This issue affects MagicINFO 9 Server: less than 21.1080.0.
CWE-798 Jul 23, 2025
CVE-2025-54454 9.1 CRITICAL EPSS 0.00
Samsung Magicinfo 9 Server < 21.1080.0 - Hard-coded Credentials
Use of Hard-coded Credentials vulnerability in Samsung Electronics MagicINFO 9 Server allows Authentication Bypass.This issue affects MagicINFO 9 Server: less than 21.1080.0.
CWE-798 Jul 23, 2025
CVE-2025-4130 7.5 HIGH EPSS 0.00
PAVO Pay <13.05.2025 - Info Disclosure
Use of Hard-coded Credentials vulnerability in PAVO Inc. PAVO Pay allows Read Sensitive Constants Within an Executable.This issue affects PAVO Pay: before 13.05.2025.
CWE-798 Jul 21, 2025
CVE-2025-4570 EPSS 0.00
MyASUS - Info Disclosure
An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services. Refer to the 'Security Update for for MyASUS' section on the ASUS Security Advisory for more information.
CWE-798 Jul 21, 2025
CVE-2025-4569 EPSS 0.00
MyASUS - Info Disclosure
An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services. Refer to the 'Security Update for for MyASUS' section on the ASUS Security Advisory for more information.
CWE-798 Jul 21, 2025
CVE-2025-4049 EPSS 0.00
SIGNUM-NET FARA <5.0.80.34 - Info Disclosure
Use of hard-coded, the same among all vulnerable installations SQLite credentials vulnerability in SIGNUM-NET FARA allows to read and manipulate local-stored database.This issue affects FARA: through 5.0.80.34.
CWE-798 Jul 21, 2025
CVE-2025-6982 EPSS 0.00
TP-Link Archer C50 - Info Disclosure
Use of Hard-coded Credentials in TP-Link Archer C50 V3( <= 180703)/V4( <= 250117 )/V5( <= 200407 ), allows attackers to decrypt the config.xml files.
CWE-798 Jul 16, 2025
CVE-2025-53754 EPSS 0.00
Digisol DG-GR6821AC Router - Privilege Escalation
This vulnerability exists in Digisol DG-GR6821AC Router due to hard-coded Root Access Credentials in system configuration of the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to obtain the stored root access credentials. Successful exploitation of this vulnerability could allow the attacker to gain admin access to the targeted device.
CWE-798 Jul 16, 2025