CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,293 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,930 Nuclei templates 37,826 vendors 42,585 researchers
4,085 results Clear all
CVE-2017-1000030 9.8 CRITICAL EPSS 0.04
Oracle GlassFish Server Open Source Edition 3.0.1 - Info Disclosure
Oracle, GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to Java Key Store Password Disclosure vulnerability, that makes it possible to provide an unauthenticated attacker plain text password of administrative user and grant access to the web-based administration interface.
CWE-287 Jul 17, 2017
CVE-2017-1000020 9.8 CRITICAL EPSS 0.01
ECos 1 - Auth Bypass
SYN Flood or FIN Flood attack in ECos 1 and other versions embedded devices results in web Authentication Bypass. "eCos Embedded Web Servers used by Multiple Routers and Home devices, while sending SYN Flood or FIN Flood packets fails to validate and handle the packets and does not ask for any sign of authentication resulting in Authentication Bypass. An attacker can take complete advantage of this bug and take over the device remotely or locally. The bug has been successfully tested and reproduced in some versions of SOHO Routers manufactured by TOTOLINK, GREATEK and others."
CWE-287 Jul 17, 2017
CVE-2016-8951 7.5 HIGH EPSS 0.01
IBM Emptoris Strategic Supply Management Platform <10.1.1.x - DoS
IBM Emptoris Strategic Supply Management Platform 10.0.0.x through 10.1.1.x is vulnerable to a denial of service attack. An attacker can exploit a vulnerability in the authentication features that could log out users and flood user accounts with emails. IBM X-Force ID: 118838.
CWE-287 Jul 13, 2017
CVE-2017-8495 7.5 HIGH EPSS 0.16
Microsoft Windows 10 - Authentication Bypass
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to bypass Extended Protection for Authentication when Kerberos fails to prevent tampering with the SNAME field during ticket exchange, aka "Kerberos SNAME Security Feature Bypass Vulnerability" or Orpheus' Lyre.
CWE-287 Jul 11, 2017
CVE-2017-5640 9.8 CRITICAL EPSS 0.01
Apache Impala - Authentication Bypass
It was noticed that a malicious process impersonating an Impala daemon in Apache Impala (incubating) 2.7.0 to 2.8.0 could cause Impala daemons to skip authentication checks when Kerberos is enabled (but TLS is not). If the malicious server responds with 'COMPLETE' before the SASL handshake has completed, the client will consider the handshake as completed even though no exchange of credentials has happened.
CWE-287 Jul 10, 2017
CVE-2017-7660 7.5 HIGH EPSS 0.00
Apache Solr - SSRF
Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe that the malicious node is a member of the cluster. So, if Solr users have enabled BasicAuth authentication mechanism using the BasicAuthPlugin or if the user has implemented a custom Authentication plugin, which does not implement either "HttpClientInterceptorPlugin" or "HttpClientBuilderPlugin", his/her servers are vulnerable to this attack. Users who only use SSL without basic authentication or those who use Kerberos are not affected.
CWE-287 Jul 07, 2017
CVE-2017-6868 8.1 HIGH EPSS 0.04
Siemens SIMATIC CP - Improper Authentication
An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior to 1.4.1. An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA's CPU.
CWE-287 Jul 07, 2017
CVE-2017-2186 8.8 HIGH EPSS 0.01
HOME SPOT CUBE2 <V101 - Auth Bypass
HOME SPOT CUBE2 firmware V101 and earlier allows an attacker to bypass authentication to load malicious firmware via WebUI.
CWE-287 Jul 07, 2017
CVE-2017-7405 9.8 CRITICAL EPSS 0.02
D-Link DIR-615 <20.12PTb04 - Privilege Escalation
On the D-Link DIR-615 before v20.12PTb04, once authenticated, this device identifies the user based on the IP address of his machine. By spoofing the IP address belonging to the victim's host, an attacker might be able to take over the administrative session without being prompted for authentication credentials. An attacker can get the victim's and router's IP addresses by simply sniffing the network traffic. Moreover, if the victim has web access enabled on his router and is accessing the web interface from a different network that is behind the NAT/Proxy, an attacker can sniff the network traffic to know the public IP address of the victim's router and take over his session as he won't be prompted for credentials.
CWE-287 Jul 07, 2017
CVE-2017-6711 9.1 CRITICAL EPSS 0.00
Cisco Ultra Services Framework - Unauthorized Access
A vulnerability in the Ultra Automation Service (UAS) of the Cisco Ultra Services Framework could allow an unauthenticated, remote attacker to gain unauthorized access to a targeted device. The vulnerability is due to an insecure default configuration of the Apache ZooKeeper service used by the affected software. An attacker could exploit this vulnerability by accessing the affected device through the orchestrator network. An exploit could allow the attacker to gain access to ZooKeeper data nodes (znodes) and influence the behavior of the system's high-availability feature. This vulnerability affects all releases of Cisco Ultra Services Framework UAS prior to Releases 5.0.3 and 5.1. Cisco Bug IDs: CSCvd29395.
CWE-287 Jul 06, 2017
CVE-2017-1264 7.5 HIGH EPSS 0.00
IBM Security Guardium - Authentication Bypass
IBM Security Guardium 10.0 does not prove or insufficiently proves that the actors identity is correct which can lead to exposure of resources or functionality to unintended actors. IBM X-Force ID: 124739.
CWE-287 Jul 05, 2017
CVE-2017-1258 6.5 MEDIUM EPSS 0.00
IBM Security Guardium - Authentication Bypass
IBM Security Guardium 10.0 and 10.1 does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM X-Force ID: 124685
CWE-287 Jul 05, 2017
CVE-2017-10807 9.8 CRITICAL 1 Writeup EPSS 0.02
Jabberd2 < 2.6.0 - Authentication Bypass
JabberD 2.x (aka jabberd2) before 2.6.1 allows anyone to authenticate using SASL ANONYMOUS, even when the sasl.anonymous c2s.xml option is not enabled.
CWE-287 Jul 04, 2017
CVE-2017-6722 6.1 MEDIUM EPSS 0.00
Cisco UCCx <11.5.1.10000.61 - Auth Bypass
A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) service of Cisco Unified Contact Center Express (UCCx) could allow an unauthenticated, remote attacker to masquerade as a legitimate user, aka a Clear Text Authentication Vulnerability. More Information: CSCuw86638. Known Affected Releases: 10.6(1). Known Fixed Releases: 11.5(1.10000.61).
CWE-287 Jul 04, 2017
CVE-2017-6703 5.9 MEDIUM EPSS 0.01
Cisco Prime Collaboration Provisioning - Authentication Bypass
A vulnerability in the web application in the Cisco Prime Collaboration Provisioning tool could allow an unauthenticated, remote attacker to hijack another user's session. More Information: CSCvc90346. Known Affected Releases: 12.1.
CWE-287 Jul 04, 2017
CVE-2017-7919 9.8 CRITICAL EPSS 0.01
Newport Xps-cx Firmware - Authentication Bypass
An Improper Authentication issue was discovered in Newport XPS-Cx and XPS-Qx. An attacker may bypass authentication by accessing a specific uniform resource locator (URL).
CWE-287 Jul 03, 2017
CVE-2017-10796 6.5 MEDIUM EPSS 0.00
Tp-link Nc250 Firmware < 1.2.1 - Authentication Bypass
On TP-Link NC250 devices with firmware through 1.2.1 build 170515, anyone can view video and audio without authentication via an rtsp://admin@yourip:554/h264_hd.sdp URL.
CWE-287 Jul 02, 2017
CVE-2017-10709 6.8 MEDIUM EPSS 0.00
Google Android - Authentication Bypass
The lockscreen on Elephone P9000 devices (running Android 6.0) allows physically proximate attackers to bypass a wrong-PIN lockout feature by pressing backspace after each PIN guess.
CWE-287 Jun 30, 2017
CVE-2017-6034 9.8 CRITICAL EPSS 0.00
Schneider-electric Modbus Firmware - Authentication Bypass
An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus Protocol. Sensitive information is transmitted in cleartext in the Modicon Modbus protocol, which may allow an attacker to replay the following commands: run, stop, upload, and download.
CWE-287 Jun 30, 2017
CVE-2015-1778 9.8 CRITICAL EPSS 0.03
Opendaylight < 0.2.3-Helium-SR3 - Authentication Bypass
The custom authentication realm used by karaf-tomcat's "opendaylight" realm in Opendaylight before Helium SR3 will authenticate any username and password combination.
CWE-287 Jun 27, 2017