CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,283 with exploits 4,731 exploited in wild 1,542 CISA KEV 3,930 Nuclei templates 37,826 vendors 42,577 researchers
4,085 results Clear all
CVE-2016-7144 8.1 HIGH 1 PoC Analysis EPSS 0.02
Unrealircd < 3.2.10.5 - Authentication Bypass
The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
CWE-287 Jan 18, 2017
CVE-2016-6659 8.1 HIGH EPSS 0.00
Cloud Foundry <248, UAA 2.x <2.7.4.12, 3.x <3.6.5, 3.7.x <3.9.3 - P...
Cloud Foundry before 248; UAA 2.x before 2.7.4.12, 3.x before 3.6.5, and 3.7.x through 3.9.x before 3.9.3; and UAA bosh release (aka uaa-release) before 13.9 for UAA 3.6.5 and before 24 for UAA 3.9.3 allow attackers to gain privileges by accessing UAA logs and subsequently running a specially crafted application that interacts with a configured SAML provider.
CWE-287 Dec 23, 2016
CVE-2016-6474 7.3 HIGH EPSS 0.00
Cisco IOS and IOS XE - Auth Bypass
A vulnerability in the implementation of X.509 Version 3 for SSH authentication functionality in Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to bypass authentication on an affected system. More Information: CSCuv89417. Known Affected Releases: 15.5(2.25)T. Known Fixed Releases: 15.2(4)E1 15.2(4)E2 15.2(4)E3 15.2(4)EA4 15.2(4.0r)EB 15.2(4.1.27)EB 15.2(4.4.2)EA4 15.2(4.7.1)EC 15.2(4.7.2)EC 15.2(5.1.1)E 15.2(5.5.63)E 15.2(5.5.64)E 15.4(1)IA1.80 15.5(3)M1.1 15.5(3)M2 15.5(3)S1.4 15.5(3)S2 15.6(0.22)S0.12 15.6(1)T0.1 15.6(1)T1 15.6(1.15)T 15.6(1.17)S0.7 15.6(1.17)SP 15.6(1.22.1a)T0 15.6(2)S 15.6(2)SP 16.1(1.24) 16.1.2 16.2(0.247) 16.3(0.11) 3.8(1)E Denali-16.1.2.
CWE-287 Dec 14, 2016
CVE-2016-4322 9.8 CRITICAL EPSS 0.02
BMC BladeLogic Server Automation <8.7.3 - Auth Bypass
BMC BladeLogic Server Automation (BSA) before 8.7 Patch 3 allows remote attackers to bypass authentication and consequently read arbitrary files or possibly have unspecified other impact by leveraging a "logic flaw" in the authentication process.
CWE-287 Dec 13, 2016
CVE-2016-9796 9.8 CRITICAL 1 PoC Analysis EPSS 0.24
Alcatel-lucent Omnivista 8770 Network... - Authentication Bypass
Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs interfaces, which can be queried using the GIOP protocol on TCP port 30024. An attacker can bypass authentication, and OmniVista invokes methods (AddJobSet, AddJob, and ExecuteNow) that can be used to run arbitrary commands on the server, with the privilege of NT AUTHORITY\SYSTEM on the server. NOTE: The discoverer states "The vendor position is to refer to the technical guidelines of the product security deployment to mitigate this issue, which means applying proper firewall rules to prevent unauthorised clients to connect to the OmniVista server."
CWE-287 Dec 03, 2016
CVE-2016-2944 9.8 CRITICAL EPSS 0.00
IBM Bigfix Remote Control < 9.1.2 - Authentication Bypass
IBM BigFix Remote Control before 9.1.3 does not properly restrict failed login attempts, which makes it easier for remote attackers to obtain access via a brute-force approach.
CWE-287 Nov 30, 2016
CVE-2016-6452 9.8 CRITICAL EPSS 0.01
Cisco Prime Home <6.0 - Auth Bypass
A vulnerability in the web-based graphical user interface (GUI) of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. Cisco Prime Home versions 5.1.1.6 and earlier and 5.2.2.2 and earlier have been confirmed to be vulnerable. Cisco Prime Home versions 6.0 and later are not vulnerable. More Information: CSCvb71732. Known Affected Releases: 5.0 5.0(1) 5.0(1.1) 5.0(1.2) 5.0(2) 5.15.1(0) 5.1(1) 5.1(1.3) 5.1(1.4) 5.1(1.5) 5.1(1.6) 5.1(2) 5.1(2.1) 5.1(2.3) 5.25.2(0.1) 5.2(1.0) 5.2(1.2) 5.2(2.0) 5.2(2.1) 5.2(2.2).
CWE-287 Nov 03, 2016
CVE-2016-6397 9.8 CRITICAL EPSS 0.01
Cisco IPICS <4.11 - Config Modification
A vulnerability in the interdevice communications interface of the Cisco IP Interoperability and Collaboration System (IPICS) Universal Media Services (UMS) could allow an unauthenticated, remote attacker to modify configuration parameters of the UMS and cause the system to become unavailable. Affected Products: This vulnerability affects Cisco IPICS releases 4.8(1) to 4.10(1). More Information: CSCva46644. Known Affected Releases: 4.10(1) 4.8(1) 4.8(2) 4.9(1) 4.9(2).
CWE-287 Oct 28, 2016
CVE-2016-1000214 5.3 MEDIUM EPSS 0.00
Ruckus Wireless H500 - Auth Bypass
Ruckus Wireless H500 web management interface authentication bypass
CWE-287 Oct 25, 2016
CVE-2016-6434 7.8 HIGH 1 PoC Analysis EPSS 0.00
Cisco Firepower Management Center 6.0.1 - Info Disclosure
Cisco Firepower Management Center 6.0.1 has hardcoded database credentials, which allows local users to obtain sensitive information by leveraging CLI access, aka Bug ID CSCva30370.
CWE-287 Oct 06, 2016
CVE-2016-5686 9.8 CRITICAL EPSS 0.03
Johnson & Johnson Animas OneTouch Ping - Auth Bypass
Johnson & Johnson Animas OneTouch Ping devices mishandle acknowledgements, which makes it easier for remote attackers to bypass authentication via a custom communication protocol.
CWE-287 Oct 05, 2016
CVE-2016-5086 9.8 CRITICAL EPSS 0.03
Animas Onetouch Ping Firmware - Authentication Bypass
Johnson & Johnson Animas OneTouch Ping devices allow remote attackers to bypass authentication via replay attacks.
CWE-287 Oct 05, 2016
CVE-2016-7141 7.5 HIGH EPSS 0.01
Opensuse Leap < 7.50.1 - Authentication Bypass
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
CWE-287 Oct 03, 2016
CVE-2016-7191 8.1 HIGH 1 Writeup EPSS 0.04
Microsoft Azure Active Directory Passport - Authentication Bypass
The Microsoft Azure Active Directory Passport (aka Passport-Azure-AD) library 1.x before 1.4.6 and 2.x before 2.0.1 for Node.js does not recognize the validateIssuer setting, which allows remote attackers to bypass authentication via a crafted token.
CWE-287 Sep 28, 2016
CVE-2016-6159 7.5 HIGH EPSS 0.01
Huawei WS331a - Auth Bypass
The management interface of Huawei WS331a routers with software before WS331a-10 V100R001C01B112 allows remote attackers to bypass authentication and obtain administrative access by sending "special packages" to the LAN interface.
CWE-287 Sep 21, 2016
CVE-2016-4966 6.5 MEDIUM EPSS 0.02
Fortinet Fortiwan < 4.2.4 - Authentication Bypass
The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
CWE-287 Sep 21, 2016
CVE-2016-4860 7.3 HIGH EPSS 0.01
Yokogawa Stardom Fcn/fcj - Authentication Bypass
Yokogawa STARDOM FCN/FCJ controller R1.01 through R4.01 does not require authentication for Logic Designer connections, which allows remote attackers to reconfigure the device or cause a denial of service via a (1) stop application program, (2) change value, or (3) modify application command.
CWE-287 Sep 19, 2016
CVE-2016-0883 9.8 CRITICAL EPSS 0.00
Pivotal Cloud Foundry (PCF) Ops Manager <1.5.14 & <1.6.9 - Auth Bypass
Pivotal Cloud Foundry (PCF) Ops Manager before 1.5.14 and 1.6.x before 1.6.9 uses the same cookie-encryption key across different customers' installations, which allows remote attackers to bypass session authentication by leveraging knowledge of this key from another installation.
CWE-287 Sep 18, 2016
CVE-2016-1279 9.8 CRITICAL EPSS 0.02
Juniper Junos OS <12.1X46-D45-14.2R6 - Info Disclosure
J-Web in Juniper Junos OS before 12.1X46-D45, 12.1X46-D50, 12.1X47 before 12.1X47-D35, 12.3 before 12.3R12, 12.3X48 before 12.3X48-D25, 13.3 before 13.3R10, 13.3R9 before 13.3R9-S1, 14.1 before 14.1R7, 14.1X53 before 14.1X53-D35, 14.2 before 14.2R6, 15.1 before 15.1A2 or 15.1F4, 15.1X49 before 15.1X49-D30, and 15.1R before 15.1R3 might allow remote attackers to obtain sensitive information and consequently gain administrative privileges via unspecified vectors.
CWE-287 Sep 09, 2016
CVE-2016-7114 8.8 HIGH EPSS 0.01
Siemens En100 Ethernet Module Firmware - Authentication Bypass
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02; SIPROTEC 7SJ686 : All versions < V 4.87; SIPROTEC 7UT686 : All versions < V 4.02; SIPROTEC 7SD686 : All versions < V 4.05; SIPROTEC 7SJ66 : All versions < V 4.30. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations. A legitimate user must be logged into the web interface for the attack to be successful.
CWE-287 Sep 06, 2016