CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
1,290 results Clear all
CVE-2021-38938 6.2 MEDIUM EPSS 0.00
IBM HATS <9.6.1.4, <9.7.0.3 - Info Disclosure
IBM Host Access Transformation Services (HATS) 9.6 through 9.6.1.4 and 9.7 through 9.7.0.3 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 210989.
CWE-522 Mar 15, 2024
CVE-2024-28110 7.5 HIGH 1 Writeup EPSS 0.00
Cloudevents GO SDK < 2.15.1 - Insufficiently Protected Credentials
Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue.
CWE-522 Mar 06, 2024
CVE-2024-21815 9.1 CRITICAL EPSS 0.00
Gallagher Command Centre < 8.60 - Insufficiently Protected Credentials
Insufficiently protected credentials (CWE-522) for third party DVR integrations to the Command Centre Server are accessible to authenticated but unprivileged users. This issue affects: Gallagher Command Centre 9.00 prior to vEL9.00.1774 (MR2), 8.90 prior to vEL8.90.1751 (MR3), 8.80 prior to vEL8.80.1526 (MR4), 8.70 prior to vEL8.70.2526 (MR6),  all version of 8.60 and prior.
CWE-522 Mar 05, 2024
CVE-2023-50436 5.3 MEDIUM EPSS 0.00
Couchbase Server < 7.2.4 - Insufficiently Protected Credentials
An issue was discovered in Couchbase Server before 7.2.4. ns_server admin credentials are leaked in encoded form in the diag.log file. The earliest affected version is 7.1.5.
CWE-522 Feb 29, 2024
CVE-2024-26133 5.5 MEDIUM 1 Writeup EPSS 0.00
EventStoreDB <20.10.6, <21.10.11, <22.10.5, <23.10.1 - Info Disclosure
EventStoreDB (ESDB) is an operational database built to store events. A vulnerability has been identified in the projections subsystem in versions 20 prior to 20.10.6, 21 prior to 21.10.11, 22 prior to 22.10.5, and 23 prior to 23.10.1. Only database instances that use custom projections are affected by this vulnerability. User passwords may become accessible to those who have access to the chunk files on disk, and users who have read access to system streams. Only users in the `$admins` group can access system streams by default. ESDB 23.10.1, 22.10.5, 21.10.11, and 20.10.6 contain a patch for this issue. Users should upgrade EventStoreDB, reset the passwords for current and previous members of `$admins` and `$ops` groups, and, if a password was reused in any other system, reset it in those systems to a unique password to follow best practices. If an upgrade cannot be done immediately, reset the passwords for current and previous members of `$admins` and `$ops` groups. Avoid creating custom projections until the patch has been applied.
CWE-522 Feb 21, 2024
CVE-2023-6259 7.1 HIGH EPSS 0.00
Brivo ACS100-ACS300 <6.2.4.3 - Privilege Escalation
Insufficiently Protected Credentials, : Improper Access Control vulnerability in Brivo ACS100, ACS300 allows Password Recovery Exploitation, Bypassing Physical Security.This issue affects ACS100, ACS300: from 5.2.4 before 6.2.4.3.
CWE-284 Feb 19, 2024
CVE-2023-4538 6.2 MEDIUM EPSS 0.00
Comarch ERP XL <2023.2 - Info Disclosure
The database access credentials configured during installation are stored in a special table, and are encrypted with a shared key, same among all Comarch ERP XL client installations. This could allow an attacker with access to that table to retrieve plain text passwords. This issue affects ERP XL: from 2020.2.2 through 2023.2.
CWE-522 Feb 15, 2024
CVE-2024-23306 7.1 HIGH EPSS 0.00
F5 Big-ip Next Cloud-native Network F... - Insufficiently Protected Credentials
A vulnerability exists in BIG-IP Next CNF and SPK systems that may allow access to undisclosed sensitive files.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CWE-522 Feb 14, 2024
CVE-2023-27975 7.1 HIGH EPSS 0.00
Schneider-electric Ecostruxure Contro... - Insufficiently Protected Credentials
CWE-522: Insufficiently Protected Credentials vulnerability exists that could cause unauthorized access to the project file in EcoStruxure Control Expert when a local user tampers with the memory of the engineering workstation.
CWE-522 Feb 14, 2024
CVE-2023-32280 5.3 MEDIUM EPSS 0.00
Intel Openbmc < egs-1.05 - Insufficiently Protected Credentials
Insufficiently protected credentials in some Intel(R) Server Product OpenBMC firmware before versions egs-1.05 may allow an unauthenticated user to enable information disclosure via network access.
CWE-522 Feb 14, 2024
CVE-2022-34311 4.3 MEDIUM EPSS 0.00
IBM Cics TX - Insufficiently Protected Credentials
IBM CICS TX Standard and Advanced 11.1 could allow a user with physical access to the web browser to gain access to the user's session due to insufficiently protected credentials. IBM X-Force ID: 229446.
CWE-522 Feb 12, 2024
CVE-2022-38714 4.9 MEDIUM EPSS 0.00
IBM DataStage on Cloud Pak for Data <4.5.2 - Info Disclosure
IBM DataStage on Cloud Pak for Data 4.0.6 to 4.5.2 stores sensitive credential information that can be read by a privileged user. IBM X-Force ID: 235060.
CWE-522 Feb 12, 2024
CVE-2024-22312 4.4 MEDIUM EPSS 0.00
IBM Storage Defender - Resiliency Service 2.0 - Info Disclosure
IBM Storage Defender - Resiliency Service 2.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 278748.
CWE-522 Feb 10, 2024
CVE-2023-50291 7.5 HIGH EPSS 0.03
Apache Solr < 8.11.3 - Insufficiently Protected Credentials
Insufficiently Protected Credentials vulnerability in Apache Solr. This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.3.0. One of the two endpoints that publishes the Solr process' Java system properties, /admin/info/properties, was only setup to hide system properties that had "password" contained in the name. There are a number of sensitive system properties, such as "basicauth" and "aws.secretKey" do not contain "password", thus their values were published via the "/admin/info/properties" endpoint. This endpoint populates the list of System Properties on the home screen of the Solr Admin page, making the exposed credentials visible in the UI. This /admin/info/properties endpoint is protected under the "config-read" permission. Therefore, Solr Clouds with Authorization enabled will only be vulnerable through logged-in users that have the "config-read" permission. Users are recommended to upgrade to version 9.3.0 or 8.11.3, which fixes the issue. A single option now controls hiding Java system property for all endpoints, "-Dsolr.hiddenSysProps". By default all known sensitive properties are hidden (including "-Dbasicauth"), as well as any property with a name containing "secret" or "password". Users who cannot upgrade can also use the following Java system property to fix the issue:   '-Dsolr.redaction.system.pattern=.*(password|secret|basicauth).*'
CWE-522 Feb 09, 2024
CVE-2024-24595 6.0 MEDIUM EPSS 0.00
Allegro AI's ClearML - Info Disclosure
Allegro AI’s open-source version of ClearML stores passwords in plaintext within the MongoDB instance, resulting in a compromised server leaking all user emails and passwords.
CWE-522 Feb 05, 2024
CVE-2024-21869 6.2 MEDIUM EPSS 0.00
Rapid SCADA <5.8.4 - Info Disclosure
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them.
CWE-522 Feb 02, 2024
CVE-2023-29055 7.5 HIGH EPSS 0.00
Apache Kylin <4.0.3 - Info Disclosure
In Apache Kylin version 2.0.0 to 4.0.3, there is a Server Config web interface that displays the content of file 'kylin.properties', that may contain serverside credentials. When the kylin service runs over HTTP (or other plain text protocol), it is possible for network sniffers to hijack the HTTP payload and get access to the content of kylin.properties and potentially the containing credentials. To avoid this threat, users are recommended to  * Always turn on HTTPS so that network payload is encrypted. * Avoid putting credentials in kylin.properties, or at least not in plain text. * Use network firewalls to protect the serverside such that it is not accessible to external attackers. * Upgrade to version Apache Kylin 4.0.4, which filters out the sensitive content that goes to the Server Config web interface.
CWE-522 Jan 29, 2024
CVE-2024-22432 7.8 HIGH EPSS 0.00
Networker 19.9- - Info Disclosure
Networker 19.9 and all prior versions contains a Plain-text Password stored in temporary config file during backup duration in NMDA MySQL Database backups. User has low privilege access to Networker Client system could potentially exploit this vulnerability, leading to the disclosure of configured MySQL Database user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application Database with privileges of the compromised account.
CWE-522 Jan 25, 2024
CVE-2023-6573 5.5 MEDIUM EPSS 0.00
HPE OneView - Info Disclosure
HPE OneView may have a missing passphrase during restore.
CWE-522 Jan 23, 2024
CVE-2023-49106 4.6 MEDIUM EPSS 0.00
Hitachi Device Manager <8.8.5-04 - Info Disclosure
Missing Password Field Masking vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Agent component).This issue affects Hitachi Device Manager: before 8.8.5-04.
CWE-549 Jan 16, 2024