CVE & Exploit Intelligence Database

Updated 36m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
1,290 results Clear all
CVE-2023-37951 6.5 MEDIUM EPSS 0.00
Jenkins Mabl < 0.0.46 - Insufficiently Protected Credentials
Jenkins mabl Plugin 0.0.46 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.
CWE-522 Jul 12, 2023
CVE-2023-36266 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
Keeper Password Manager <17.2 - Info Disclosure
An issue was discovered in Keeper Password Manager for Desktop version 16.10.2 (fixed in 17.2), and the KeeperFill Browser Extensions version 16.5.4 (fixed in 17.2), allows local attackers to gain sensitive information via plaintext password storage in memory after the user is already logged in, and may persist after logout. NOTE: the vendor disputes this for two reasons: the information is inherently available during a logged-in session when the attacker can read from arbitrary memory locations, and information only remains available after logout because of memory-management limitations of web browsers (not because the Keeper technology itself is retaining the information).
CWE-522 Jul 12, 2023
CVE-2023-35348 6.5 MEDIUM EPSS 0.00
Microsoft Windows Server 2016 - Insufficiently Protected Credentials
Active Directory Federation Service Security Feature Bypass Vulnerability
CWE-522 Jul 11, 2023
CVE-2023-36476 7.9 HIGH 1 Writeup EPSS 0.00
calamares-nixos-extensions <0.3.12 - Info Disclosure
calamares-nixos-extensions provides Calamares branding and modules for NixOS, a distribution of GNU/Linux. Users of calamares-nixos-extensions version 0.3.12 and prior who installed NixOS through the graphical calamares installer, with an unencrypted `/boot`, on either non-UEFI systems or with a LUKS partition different from `/` have their LUKS key file in `/boot` as a plaintext CPIO archive attached to their NixOS initrd. A patch is available and anticipated to be part of version 0.3.13 to backport to NixOS 22.11, 23.05, and unstable channels. Expert users who have a copy of their data may, as a workaround, re-encrypt the LUKS partition(s) themselves.
CWE-522 Jun 29, 2023
CVE-2020-18406 7.5 HIGH EPSS 0.00
cmseasy <7.0.0 - Info Disclosure
An issue was discovered in cmseasy v7.0.0 that allows user credentials to be sent in clear text due to no encryption of form data.
CWE-522 Jun 27, 2023
CVE-2023-28857 4.0 MEDIUM EPSS 0.00
Apereo CAS - Info Disclosure
Apereo CAS is an open source multilingual single sign-on solution for the web. Apereo CAS can be configured to use authentication based on client X509 certificates. These certificates can be provided via TLS handshake or a special HTTP header, such as “ssl_client_cert”. When checking the validity of the provided client certificate, X509CredentialsAuthenticationHandler performs check that this certificate is not revoked. To do so, it fetches URLs provided in the “CRL Distribution Points” extension of the certificate, which are taken from the certificate itself and therefore can be controlled by a malicious user. If the CAS server is configured to use an LDAP server for x509 authentication with a password, for example by setting a “cas.authn.x509.ldap.ldap-url” and “cas.authn.x509.ldap.bind-credential” properties, X509CredentialsAuthenticationHandler fetches revocation URLs from the certificate, which can be LDAP urls. When making requests to this LDAP urls, Apereo CAS uses the same password as for initially configured LDAP server, which can lead to a password leak. An unauthenticated user can leak the password used to LDAP connection configured on server. This issue has been addressed in version 6.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-522 Jun 27, 2023
CVE-2023-35789 5.5 MEDIUM EPSS 0.00
Rabbitmq-c < 0.13.0 - Insufficiently Protected Credentials
An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.
CWE-522 Jun 16, 2023
CVE-2022-47376 7.3 HIGH EPSS 0.00
Alaris Infusion Central <1.4 - Info Disclosure
The Alaris Infusion Central software, versions 1.1 to 1.3.2, may contain a recoverable password after the installation. No patient health data is stored in the database, although some site installations may choose to store personal data.
CWE-522 Jun 13, 2023
CVE-2023-33620 5.9 MEDIUM EPSS 0.00
GL.iNET GL-AR750S-Ext <3.215 - Info Disclosure
GL.iNET GL-AR750S-Ext firmware v3.215 uses an insecure protocol in its communications which allows attackers to eavesdrop via a man-in-the-middle attack.
CWE-522 Jun 13, 2023
CVE-2023-26204 3.7 LOW EPSS 0.00
FortiSIEM <6.7 - Info Disclosure
A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attacker able to access user DB content to impersonate any admin user on the device GUI.
CWE-522 Jun 13, 2023
CVE-2023-29168 3.7 LOW EPSS 0.00
Vuforia - Info Disclosure
The local Vuforia web application does not support HTTPS, and federated credentials are passed via basic authentication.
CWE-522 Jun 07, 2023
CVE-2023-27126 4.6 MEDIUM EPSS 0.00
TP-Link TAPO C200 V3 (EU) - Info Disclosure
The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim.
CWE-522 Jun 06, 2023
CVE-2023-22862 5.9 MEDIUM EPSS 0.00
IBM Aspera Connect/Cargo 4.2.5 - Info Disclosure
IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 transmits authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
CWE-523 Jun 05, 2023
CVE-2023-25740 8.8 HIGH EPSS 0.00
Mozilla Firefox < 110.0 - Insufficiently Protected Credentials
After downloading a Windows <code>.scf</code> script from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.<br>*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110.
CWE-522 Jun 02, 2023
CVE-2023-31187 6.5 MEDIUM EPSS 0.00
Avaya IX Workforce Engagement v15.2.7.1195 - Info Disclosure
Avaya IX Workforce Engagement v15.2.7.1195 - CWE-522: Insufficiently Protected Credentials
CWE-522 May 30, 2023
CVE-2023-32687 7.7 HIGH EPSS 0.00
Tgstation13 Tgstation-server - Insufficiently Protected Credentials
tgstation-server is a toolset to manage production BYOND servers. Starting in version 4.7.0 and prior to 5.12.1, instance users with the list chat bots permission can read chat bot connections strings without the associated permission. This issue is patched in version 5.12.1. As a workaround, remove the list chat bots permission from users that should not have the ability to view connection strings. Invalidate any credentials previously stored for safety.
CWE-522 May 29, 2023
CVE-2023-33263 7.5 HIGH EPSS 0.00
WFTPD 3.25 - Info Disclosure
In WFTPD 3.25, usernames and password hashes are stored in an openly viewable wftpd.ini configuration file within the WFTPD directory. NOTE: this is a product from 2006.
CWE-522 May 25, 2023
CVE-2023-2881 4.9 MEDIUM 1 Writeup EPSS 0.00
pimcore/customer-data-framework <3.3.10 - Info Disclosure
Storing Passwords in a Recoverable Format in GitHub repository pimcore/customer-data-framework prior to 3.3.10.
CWE-522 May 25, 2023
CVE-2023-33264 4.3 MEDIUM EPSS 0.02
Hazelcast <5.0.4, <5.1.6, <5.2.3 - Info Disclosure
In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, configuration routines don't mask passwords in the member configuration properly. This allows Hazelcast Management Center users to view some of the secrets.
CWE-522 May 22, 2023
CVE-2023-1763 6.5 MEDIUM EPSS 0.00
Canon IJ Network Tool <4.7.5 - Info Disclosure
Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the software.
CWE-549 May 17, 2023