CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
1,290 results Clear all
CVE-2024-38505 5.3 MEDIUM EPSS 0.00
JetBrains YouTrack <2024.2.34646 - Info Disclosure
In JetBrains YouTrack before 2024.2.34646 user access token was sent to the third-party site
CWE-522 Jun 18, 2024
CVE-2024-30119 3.7 LOW EPSS 0.00
HCL DRYiCE Optibot Reset Station - Info Disclosure
HCL DRYiCE Optibot Reset Station is impacted by a missing Strict Transport Security Header.  This could allow an attacker to intercept or manipulate data during redirection.
CWE-522 Jun 14, 2024
CVE-2024-38285 EPSS 0.00
Logs <unknown> - Info Disclosure
Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools.
CWE-522 Jun 13, 2024
CVE-2024-38282 EPSS 0.00
Camera OS - Info Disclosure
Utilizing default credentials, an attacker is able to log into the camera's operating system which could allow changes to be made to the operations or shutdown the camera requiring a physical reboot of the system.
CWE-522 Jun 13, 2024
CVE-2024-25052 4.4 MEDIUM EPSS 0.00
IBM Jazz Reporting Service 7.0.3 - Info Disclosure
IBM Jazz Reporting Service 7.0.3 stores user credentials in plain clear text which can be read by an admin user. IBM X-Force ID: 283363.
CWE-522 Jun 13, 2024
CVE-2024-26330 6.5 MEDIUM EPSS 0.00
Kape CyberGhostVPN <8.4.3.12823 - Info Disclosure
An issue was discovered in Kape CyberGhostVPN 8.4.3.12823 on Windows. After a successful logout, user credentials remain in memory while the process is still open, and can be obtained by dumping the process memory and parsing it.
CWE-522 Jun 11, 2024
CVE-2024-35208 6.3 MEDIUM EPSS 0.00
Siemens Sinec Traffic Analyzer - Insufficiently Protected Credentials
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server stored the password in cleartext. This could allow attacker in a privileged position to obtain access passwords.
CWE-522 Jun 11, 2024
CVE-2024-37051 9.3 CRITICAL 2 PoCs Analysis EPSS 0.06
Jetbrains Aqua < 2024.1.2 - Insufficiently Protected Credentials
GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
CWE-522 Jun 10, 2024
CVE-2024-5657 3.7 LOW 1 Writeup EPSS 0.00
CraftCMS <3.3.3 - Info Disclosure
The CraftCMS plugin Two-Factor Authentication in versions 3.3.1, 3.3.2 and 3.3.3 discloses the password hash of the currently authenticated user after submitting a valid TOTP.
CWE-522 Jun 06, 2024
CVE-2024-36127 7.5 HIGH 1 Writeup EPSS 0.00
apko <0.14.4 - Info Disclosure
apko is an apk-based OCI image builder. apko exposures HTTP basic auth credentials from repository and keyring URLs in log output. This vulnerability is fixed in v0.14.5.
CWE-522 Jun 03, 2024
CVE-2024-5176 EPSS 0.00
Welch Allyn Config Tool <1.9.4.1 - RCE
Insufficiently Protected Credentials vulnerability in Baxter Welch Allyn Configuration Tool may allow Remote Services with Stolen Credentials.This issue affects Welch Allyn Configuration Tool: versions 1.9.4.1 and prior.
CWE-522 May 31, 2024
CVE-2024-33849 6.5 MEDIUM EPSS 0.00
CI-Out-of-Office Manager <6.0.0.77 - Info Disclosure
ci solution CI-Out-of-Office Manager through 6.0.0.77 uses a Hard-coded Cryptographic Key.
CWE-522 May 28, 2024
CVE-2024-35192 5.5 MEDIUM 1 Writeup EPSS 0.00
Aquasecurity Trivy < 0.51.2 - Insufficiently Protected Credentials
Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is able to trigger Trivy to scan container images from a crafted malicious registry, it could result in the leakage of credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure Container Registry (ACR). These tokens can then be used to push/pull images from those registries to which the identity/user running Trivy has access. Systems are not affected if the default credential provider chain is unable to obtain valid credentials. This vulnerability only applies when scanning container images directly from a registry. This vulnerability is fixed in 0.51.2.
CWE-522 May 20, 2024
CVE-2024-36081 9.8 CRITICAL EPSS 0.00
Westermo EDW-100 - Info Disclosure
Westermo EDW-100 devices through 2024-05-03 allow an unauthenticated user to download a configuration file containing a cleartext password. NOTE: this is a serial-to-Ethernet converter that should not be placed at the edge of the network.
CWE-522 May 19, 2024
CVE-2024-23583 6.7 MEDIUM EPSS 0.00
Hcltech Bigfix Platform - Insufficiently Protected Credentials
An attacker could potentially intercept credentials via the task manager and perform unauthorized access to the Client Deploy Tool on Windows systems.
CWE-522 May 17, 2024
CVE-2024-27109 7.6 HIGH EPSS 0.00
GE HealthCare EchoPAC - Info Disclosure
Insufficiently protected credentials in GE HealthCare EchoPAC products
CWE-522 May 14, 2024
CVE-2024-33497 6.3 MEDIUM EPSS 0.00
SIMATIC RTLS Locating Manager -<V3.0.1.1 - Info Disclosure
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). Affected SIMATIC RTLS Locating Manager Track Viewer Client do not properly protect credentials that are used to authenticate to the server. This could allow an authenticated local attacker to extract the credentials and use them to escalate their access rights from the Manager to the Systemadministrator role.
CWE-522 May 14, 2024
CVE-2024-33496 6.3 MEDIUM EPSS 0.00
SIMATIC RTLS Locating Manager -<V3.0.1.1 - Info Disclosure
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). Affected SIMATIC RTLS Locating Manager Report Clients do not properly protect credentials that are used to authenticate to the server. This could allow an authenticated local attacker to extract the credentials and use them to escalate their access rights from the Manager to the Systemadministrator role.
CWE-522 May 14, 2024
CVE-2024-22345 6.2 MEDIUM EPSS 0.00
IBM TXSeries for Multiplatforms 8.2 - Info Disclosure
IBM TXSeries for Multiplatforms 8.2 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM X-Force ID: 280192.
CWE-522 May 14, 2024
CVE-2023-42955 4.9 MEDIUM EPSS 0.00
FileMaker Server 20.3.1 - Info Disclosure
Claris International has successfully resolved an issue of potentially exposing password information to front-end websites when signed in to the Admin Console with an administrator role. This issue has been fixed in FileMaker Server 20.3.1 by eliminating the send of Admin Role passwords in the Node.js socket.
CWE-522 May 14, 2024