CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
1,290 results Clear all
CVE-2022-41575 7.5 HIGH EPSS 0.00
Gradle Enterprise <2022.3.3 - Info Disclosure
A credential-exposure vulnerability in the support-bundle mechanism in Gradle Enterprise 2022.3 through 2022.3.3 allows remote attackers to access a subset of application data (e.g., cleartext credentials). This is fixed in 2022.3.3.
CWE-522 Oct 21, 2022
CVE-2022-43419 6.5 MEDIUM EPSS 0.01
Jenkins Katalon Plugin <1.0.32 - Info Disclosure
Jenkins Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
CWE-522 Oct 19, 2022
CVE-2022-22251 7.8 HIGH EPSS 0.00
Juniper Networks Junos OS <21.2R1 - Privilege Escalation
On cSRX Series devices software permission issues in the container filesystem and stored files combined with storing passwords in a recoverable format in Juniper Networks Junos OS allows a local, low-privileged attacker to elevate their permissions to take control of any instance of a cSRX software deployment. This issue affects Juniper Networks Junos OS 20.2 version 20.2R1 and later versions prior to 21.2R1 on cSRX Series.
CWE-522 Oct 18, 2022
CVE-2022-28291 6.5 MEDIUM EPSS 0.00
Tenable Nessus - Insufficiently Protected Credentials
Insufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the “nessusd” process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an attacker to access credentials stored in Nessus scanners, potentially compromising its customers’ network of assets.
CWE-522 Oct 17, 2022
CVE-2019-14840 7.5 HIGH EPSS 0.00
Redhat Decision Manager - Insufficiently Protected Credentials
A flaw was found in the RHDM, where sensitive HTML form fields like Password has auto-complete enabled which may lead to leak of credentials.
CWE-522 Oct 17, 2022
CVE-2022-3206 5.9 MEDIUM EPSS 0.00
Passster WP <3.5.5.5.2 - Info Disclosure
The Passster WordPress plugin before 3.5.5.5.2 stores the password inside a cookie named "passster" using base64 encoding method which is easy to decode. This puts the password at risk in case the cookies get leaked.
CWE-319 Oct 17, 2022
CVE-2022-31130 4.9 MEDIUM 1 Writeup EPSS 0.00
Grafana <9.1.8 & <8.5.14 - Info Disclosure
Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.
CWE-522 Oct 13, 2022
CVE-2022-38465 9.3 CRITICAL EPSS 0.00
SIMATIC Drive Controller <V2.9.2, SIMATIC ET 200SP Open Controller ...
A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions < V21.9), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINUMERIK MC (All versions < V6.21), SINUMERIK ONE (All versions < V6.21). Affected products protect the built-in global private key in a way that cannot be considered sufficient any longer. The key is used for the legacy protection of confidential configuration data and the legacy PG/PC and HMI communication. This could allow attackers to discover the private key of a CPU product family by an offline attack against a single CPU of the family. Attackers could then use this knowledge to extract confidential configuration data from projects that are protected by that key or to perform attacks against legacy PG/PC and HMI communication.
CWE-522 Oct 11, 2022
CVE-2022-39168 7.5 HIGH EPSS 0.00
IBM Robotic Process Automation - Insufficiently Protected Credentials
IBM Robotic Process Automation Clients are vulnerable to proxy credentials being exposed in upgrade logs. IBM X-Force ID: 235422.
CWE-522 Sep 29, 2022
CVE-2020-15347 9.8 CRITICAL EPSS 0.01
Zyxel CloudCNM SecuManager <3.1.1 - Info Disclosure
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the q6xV4aW8bQ4cfD-b password for the axiros account.
CWE-522 Sep 29, 2022
CVE-2020-15341 7.5 HIGH EPSS 0.00
Zyxel CloudCNM SecuManager <3.1.1 - Unauthenticated API
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated update_all_realm_license API.
CWE-522 Sep 29, 2022
CVE-2022-29089 6.4 MEDIUM EPSS 0.00
Dell Networking OS10 - Info Disclosure
Dell Networking OS10, versions prior to October 2021 with Smart Fabric Services enabled, contains an information disclosure vulnerability. A remote, unauthenticated attacker could potentially exploit this vulnerability by reverse engineering to retrieve sensitive information and access the REST API with admin privileges.
CWE-522 Sep 28, 2022
CVE-2022-37193 7.4 HIGH 1 Writeup EPSS 0.00
Chipolo - Insufficiently Protected Credentials
Chipolo ONE Bluetooth tracker (2020) Chipolo iOS app version 4.13.0 is vulnerable to Incorrect Access Control. Chipolo devices suffer from access revocation evasion attacks once the malicious sharee obtains the access credentials.
CWE-522 Sep 27, 2022
CVE-2022-41255 6.5 MEDIUM EPSS 0.00
Jenkins CONS3RT Plugin <1.0.0 - Info Disclosure
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CWE-522 Sep 21, 2022
CVE-2022-41247 4.3 MEDIUM EPSS 0.00
Jenkins BigPanda Notifier Plugin <1.4.0 - Info Disclosure
Jenkins BigPanda Notifier Plugin 1.4.0 and earlier stores the BigPanda API key unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CWE-522 Sep 21, 2022
CVE-2022-39816 6.5 MEDIUM EPSS 0.00
Nokia 1350 Optical Management System - Insufficiently Protected Cre...
In NOKIA 1350 OMS R14.2, Insufficiently Protected Credentials (cleartext administrator password) occur in the edit configuration page. Exploitation requires an authenticated attacker.
CWE-522 Sep 13, 2022
CVE-2022-36617 4.9 MEDIUM EPSS 0.00
Haystacksoftware Arq Backup - Insufficiently Protected Credentials
Arq Backup 7.19.5.0 and below stores backup encryption passwords using reversible encryption. This issue allows attackers with administrative privileges to recover cleartext passwords.
CWE-522 Sep 09, 2022
CVE-2021-36783 9.9 CRITICAL EPSS 0.00
Suse Rancher < 2.5.13 - Insufficiently Protected Credentials
A Insufficiently Protected Credentials vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners and Project Members to read credentials, passwords and API tokens that have been stored in cleartext and exposed via API endpoints. This issue affects: SUSE Rancher Rancher versions prior to 2.6.4; Rancher versions prior to 2.5.13.
CWE-522 Sep 07, 2022
CVE-2022-34371 8.1 HIGH EPSS 0.00
Dell Emc Powerscale Onefs - Insufficiently Protected Credentials
Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.3, contain an unprotected transport of credentials vulnerability. A malicious unprivileged network attacker could potentially exploit this vulnerability, leading to full system compromise.
CWE-522 Sep 02, 2022
CVE-2021-39045 5.5 MEDIUM EPSS 0.00
IBM Cognos Analytics < 11.1.7 - Insufficiently Protected Credentials
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a local attacker to obtain information due to the autocomplete feature on password input fields. IBM X-Force ID: 214345.
CWE-522 Sep 01, 2022