CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
4,085 results Clear all
CVE-2012-4604 EPSS 0.00
Websense Web Security <7.6.24 - Auth Bypass
The TRITON management console in Websense Web Security before 7.6 Hotfix 24 allows remote attackers to bypass authentication and read arbitrary reports via a crafted uid field, in conjunction with a crafted userRoles field, in a cookie, as demonstrated by a request to explorer_wse/favorites.exe.
CWE-287 Aug 23, 2012
CVE-2012-4599 EPSS 0.07
McAfee SmartFilter <4.2.1.01 - RCE
McAfee SmartFilter Administration, and SmartFilter Administration Bess Edition, before 4.2.1.01 does not require authentication for access to the JBoss Remote Method Invocation (RMI) interface, which allows remote attackers to execute arbitrary code via a crafted .war file.
CWE-287 Aug 22, 2012
CVE-2012-4595 EPSS 0.00
McAfee EWS <5.5.6 & MEG <7.0.2 - Auth Bypass
McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to bypass authentication and obtain an admin session ID via unspecified vectors.
CWE-287 Aug 22, 2012
CVE-2012-4581 EPSS 0.00
McAfee EWS <5.5.6 & MEG 7.0 <1 - Auth Bypass
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by capturing a session cookie and then modifying the response to a login attempt, related to a "Logout Failure" issue.
CWE-287 Aug 22, 2012
CVE-2011-5100 EPSS 0.00
Mcafee Firewall Reporter < 5.1.0.6 - Authentication Bypass
The web interface in McAfee Firewall Reporter before 5.1.0.13 does not properly implement cookie authentication, which allows remote attackers to obtain access, and disable anti-virus functionality, via an HTTP request.
CWE-287 Aug 22, 2012
CVE-2009-5116 EPSS 0.00
Mcafee Linuxshield < 1.5.1 - Authentication Bypass
McAfee LinuxShield 1.5.1 and earlier does not properly implement client authentication, which allows remote authenticated users to obtain Admin access to the statistics server by leveraging a client account.
CWE-287 Aug 22, 2012
CVE-2012-2132 EPSS 0.00
Gnome Libsoup - Authentication Bypass
libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
CWE-287 Aug 20, 2012
CVE-2012-3024 EPSS 0.00
Tridium Niagara AX Framework <3.6 - Auth Bypass
Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack.
CWE-287 Aug 16, 2012
CVE-2012-3473 EPSS 0.00
Ushahidi Platform < 2.4.1 - Authentication Bypass
The (1) reports API and (2) administration feature in the comments API in the Ushahidi Platform before 2.5 do not require authentication, which allows remote attackers to generate reports and organize comments via API functions.
CWE-287 Aug 12, 2012
CVE-2012-3472 EPSS 0.01
Ushahidi Platform < 2.4.1 - Authentication Bypass
The email API in application/libraries/api/MY_Email_Api_Object.php in the Ushahidi Platform before 2.5 does not require authentication, which allows remote attackers to list, delete, or organize messages via a GET request.
CWE-287 Aug 12, 2012
CVE-2012-2963 EPSS 0.01
BreakingPoint Storm <3.0 - Info Disclosure
The administrative interface in the embedded web server on the BreakingPoint Storm appliance before 3.0 does not require authentication for the gwt/BugReport script, which allows remote attackers to obtain sensitive information by downloading a .tgz file.
CWE-287 Aug 12, 2012
CVE-2012-3424 EPSS 0.01
Rails < 3.0.16 - Authentication Bypass
The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method.
CWE-287 Aug 08, 2012
CVE-2012-2498 EPSS 0.00
Cisco Anyconnect Secure Mobility Client - Authentication Bypass
Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.08066 does not ensure that authentication makes use of a legitimate certificate, which allows user-assisted man-in-the-middle attackers to spoof servers via a crafted certificate, aka Bug ID CSCtz29197.
CWE-287 Aug 06, 2012
CVE-2012-3408 EPSS 0.00
Puppet Enterprise < 2.5.2 - Authentication Bypass
lib/puppet/network/authstore.rb in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address.
CWE-287 Aug 06, 2012
CVE-2012-2626 EXPLOITED 2 PoCs Analysis EPSS 0.76
Plixer Scrutinizer <9.5.0 - RCE
cgi-bin/admin.cgi in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 does not require token authentication, which allows remote attackers to add administrative accounts via a userprefs action.
CWE-287 Jul 31, 2012
CVE-2012-3885 EPSS 0.00
Airdroid - Authentication Bypass
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote attackers to obtain access via a brute-force attack.
CWE-287 Jul 26, 2012
CVE-2012-3884 EPSS 0.00
Airdroid - Authentication Bypass
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote attackers to obtain access by sniffing the local wireless network and then replaying the authentication data.
CWE-287 Jul 26, 2012
CVE-2012-3356 EPSS 0.00
Viewvc < 1.1.14 - Authentication Bypass
The remote SVN views functionality (lib/vclib/svn/svn_ra.py) in ViewVC before 1.1.15 does not properly perform authorization, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
CWE-287 Jul 22, 2012
CVE-2011-4590 EPSS 0.00
Moodle - Authentication Bypass
The web services implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly consider the maintenance-mode state and account attributes during login attempts, which allows remote authenticated users to bypass intended access restrictions by connecting to a webservice server.
CWE-287 Jul 20, 2012
CVE-2012-2974 EPSS 0.00
SMC SMC8024L2 - Auth Bypass
The web interface on the SMC SMC8024L2 switch allows remote attackers to bypass authentication and obtain administrative access via a direct request to a .html file under (1) status/, (2) system/, (3) ports/, (4) trunks/, (5) vlans/, (6) qos/, (7) rstp/, (8) dot1x/, (9) security/, (10) igmps/, or (11) snmp/.
CWE-287 Jul 19, 2012