CVE & Exploit Intelligence Database

Updated 42m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
110 results Clear all
CVE-2026-30790 EPSS 0.00
RustDesk Server Pro/OSS - Auth Bypass
Improper Restriction of Excessive Authentication Attempts, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Peer authentication, API login modules), rustdesk-server RustDesk Server (OSS) rustdesk-server on Windows, MacOS, Linux (Peer authentication, API login modules) allows Password Brute Forcing. This vulnerability is associated with program files src/server/connection.Rs and program routines Salt/challenge generation, SHA256(SHA256(pwd+salt)+challenge) verification. This issue affects RustDesk Server Pro: through 1.7.5; RustDesk Server (OSS): through 1.1.15.
CWE-307 Mar 05, 2026
CVE-2026-30789 EPSS 0.00
RustDesk Client <1.4.5 - Auth Bypass
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
CWE-294 Mar 05, 2026
CVE-2026-30785 EPSS 0.00
RustDesk Client - Info Disclosure
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id(). This issue affects RustDesk Client: through 1.4.5.
CWE-323 Mar 05, 2026
CVE-2025-67168 5.3 MEDIUM 2 Writeups EPSS 0.00
RiteCMS v3.1.0 - Info Disclosure
RiteCMS v3.1.0 was discovered to use insecure encryption to store passwords.
CWE-916 Dec 17, 2025
CVE-2025-13532 6.2 MEDIUM EPSS 0.00
Fortra's Core Privileged Access Manager - Info Disclosure
Insecure defaults in the Server Agent component of Fortra's Core Privileged Access Manager (BoKS) can result in the selection of weak password hash algorithms.  This issue affects BoKS Server Agent 9.0 instances that support yescrypt and are running in a BoKS 8.1 domain.
CWE-916 Dec 16, 2025
CVE-2025-41692 6.8 MEDIUM EPSS 0.00
WebUI <unknown> - Privilege Escalation
A high privileged remote attacker with admin privileges for the webUI can brute-force the "root" and "user" passwords of the underlying OS due to a weak password generation algorithm.
CWE-916 Dec 09, 2025
CVE-2025-46413 4.3 MEDIUM EPSS 0.00
BUFFALO WSR-1800AX4 - Info Disclosure
Use of password hash with insufficient computational effort issue exists in BUFFALO Wi-Fi router 'WSR-1800AX4 series'. When WPS is enabled, PIN code and/or Wi-Fi password may be obtained by an attacker.
CWE-916 Nov 07, 2025
CVE-2025-7789 3.7 LOW EPSS 0.00
Xuxueli xxl-job <3.1.1 - Password Hashing
A vulnerability was found in Xuxueli xxl-job up to 3.1.1 and classified as problematic. Affected by this issue is the function makeToken of the file src/main/java/com/xxl/job/admin/controller/IndexController.java of the component Token Generation. The manipulation leads to password hash with insufficient computational effort. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
CWE-326 Jul 18, 2025
CVE-2025-3937 7.7 HIGH EPSS 0.00
Tridium Niagara <4.14.2-4.15.1-4.10.11 - Cryptanalysis
Use of Password Hash With Insufficient Computational Effort vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
CWE-916 May 22, 2025
CVE-2025-24340 6.5 MEDIUM EPSS 0.00
ctrlX OS - Info Disclosure
A vulnerability in the users configuration file of ctrlX OS may allow a remote authenticated (low-privileged) attacker to recover the plaintext passwords of other users.
CWE-916 Apr 30, 2025
CVE-2025-27552 4.0 MEDIUM EPSS 0.00
DBIx::Class::EncodedColumn <0.00032 - Info Disclosure
DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.
CWE-331 Mar 26, 2025
CVE-2025-27551 4.0 MEDIUM EPSS 0.00
DBIx::Class::EncodedColumn <0.00032 - Info Disclosure
DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.
CWE-331 Mar 26, 2025
CVE-2025-26486 6.0 MEDIUM EPSS 0.00
Beta80 Life 1st Identity Mgr <1.5.2.142 - Info Disclosure
Broken or Risky Cryptographic Algorithm, Use of Password Hash With Insufficient Computational Effort, Use of Weak Hash, Use of a One-Way Hash with a Predictable Salt vulnerabilities in Beta80 "Life 1st Identity Manager" enable an attacker with access to password hashes to bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses "Life 1st Identity Manager" as a service for authentication. This issue affects Life 1st: 1.5.2.14234.
CWE-760 Mar 19, 2025
CVE-2025-2349 3.1 LOW EPSS 0.00
IROAD Dash Cam FX2 <20250308 - Info Disclosure
A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CWE-326 Mar 16, 2025
CVE-2025-2265 7.8 HIGH EPSS 0.00
Sante PACS Server.exe - Info Disclosure
The password of a web user in "Sante PACS Server.exe" is zero-padded to 0x2000 bytes, SHA1-hashed, base64-encoded, and stored in the USER table in the SQLite database HTTP.db. However, the number of hash bytes encoded and stored is truncated if the hash contains a zero byte
CWE-916 Mar 13, 2025
CVE-2023-33838 4.4 MEDIUM EPSS 0.00
IBM Security Verify Governance 10.0.2 - Info Disclosure
IBM Security Verify Governance 10.0.2 Identity Manager uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the product does not also use a salt as part of the input.
CWE-759 Jan 29, 2025
CVE-2024-5743 9.8 CRITICAL EPSS 0.00
Eve Home Eve Play <1.1.42 - RCE
An attacker could exploit the 'Use of Password Hash With Insufficient Computational Effort' vulnerability in EveHome Eve Play to execute arbitrary code. This issue affects Eve Play: through 1.1.42.
CWE-916 Jan 13, 2025
CVE-2024-55057 5.4 MEDIUM 1 Writeup EPSS 0.00
Phpgurukul Online Birth Certificate System 1.0 - Info Disclosure
Phpgurukul Online Birth Certificate System 1.0 suffers from insufficient password requirements which can lead to unauthorized access to user accounts.
CWE-916 Dec 17, 2024
CVE-2024-7701 7.5 HIGH 1 Writeup EPSS 0.00
Percona Toolkit <3.6.0 - Info Disclosure
Use of Password Hash With Insufficient Computational Effort vulnerability in percona percona-toolkit allows Encryption Brute Forcing.This issue affects percona-toolkit: 3.6.0.
CWE-916 Dec 15, 2024
CVE-2024-23091 7.5 HIGH EPSS 0.00
HotelDruid <1.32 - Info Disclosure
Weak password hashing using MD5 in funzioni.php in HotelDruid before 1.32 allows an attacker to obtain plaintext passwords from hash values.
CWE-916 Jul 30, 2024