CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
1,290 results Clear all
CVE-2021-22798 7.5 HIGH EPSS 0.00
Conext ComBox - Info Disclosure
A CWE-522: Insufficiently Protected Credentials vulnerability exists that could cause Sensitive data such as login credentials being exposed when a Network is sniffed. Affected Product: Conext� ComBox (All Versions)
CWE-522 Feb 11, 2022
CVE-2022-0019 4.7 MEDIUM EPSS 0.00
Paloaltonetworks Globalprotect - Insufficiently Protected Credentials
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms.
CWE-522 Feb 10, 2022
CVE-2021-33107 4.6 MEDIUM EPSS 0.00
Intel(R) AMT SDK <16.0.3 - Info Disclosure
Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access.
CWE-522 Feb 09, 2022
CVE-2021-40360 8.8 HIGH EPSS 0.00
SIMATIC PCS 7 & WinCC - Info Disclosure
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
CWE-522 Feb 09, 2022
CVE-2021-44451 6.5 MEDIUM NUCLEI EPSS 0.75
Apache Superset < 1.3.2 - Insufficiently Protected Credentials
Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher.
CWE-522 Feb 01, 2022
CVE-2022-23223 7.5 HIGH EPSS 0.05
Apache Shenyu < 2.4.2 - Insufficiently Protected Credentials
On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.
CWE-522 Jan 25, 2022
CVE-2022-22554 8.2 HIGH EPSS 0.00
Dell EMC System Update <1.9.2 - Info Disclosure
Dell EMC System Update, version 1.9.2 and prior, contain an Unprotected Storage of Credentials vulnerability. A local attacker with user privleges could potentially exploit this vulnerability leading to the disclosure of user passwords.
CWE-522 Jan 24, 2022
CVE-2021-23207 6.5 MEDIUM EPSS 0.00
Fresenius Kabi Vigilant MasterMed <2.0.1.3 - Info Disclosure
An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
CWE-522 Jan 21, 2022
CVE-2021-23196 7.3 HIGH EPSS 0.00
Agilia Link+ <3.0 - Info Disclosure
The web application on Agilia Link+ version 3.0 implements authentication and session management mechanisms exclusively on the client-side and does not protect authentication attributes sufficiently.
CWE-522 Jan 21, 2022
CVE-2021-32039 5.5 MEDIUM EPSS 0.00
Mongodb < 0.7.0 - Insufficiently Protected Credentials
Users with appropriate file access may be able to access unencrypted user credentials saved by MongoDB Extension for VS Code in a binary file. These credentials may be used by malicious attackers to perform unauthorized actions. This vulnerability affects all MongoDB Extension for VS Code including and prior to version 0.7.0
CWE-522 Jan 20, 2022
CVE-2022-0184 4.3 MEDIUM EPSS 0.00
TEPRA PRO SR5900P <1.080-1.030 - Info Disclosure
Insufficiently protected credentials vulnerability in 'TEPRA' PRO SR5900P Ver.1.080 and earlier and 'TEPRA' PRO SR-R7900P Ver.1.030 and earlier allows an attacker on the adjacent network to obtain credentials for connecting to the Wi-Fi access point with the infrastructure mode.
CWE-522 Jan 17, 2022
CVE-2022-23117 7.5 HIGH EPSS 0.00
Jenkins Conjur Secrets < 1.0.9 - Insufficiently Protected Credentials
Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to retrieve all username/password credentials stored on the Jenkins controller.
CWE-522 Jan 12, 2022
CVE-2022-23114 3.3 LOW EPSS 0.00
Jenkins Publish Over SSH < 1.22 - Insufficiently Protected Credentials
Jenkins Publish Over SSH Plugin 1.22 and earlier stores password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CWE-522 Jan 12, 2022
CVE-2022-23109 6.5 MEDIUM EPSS 0.00
Jenkins Hashicorp Vault < 3.7.0 - Insufficiently Protected Credentials
Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed.
CWE-522 Jan 12, 2022
CVE-2022-20621 5.5 MEDIUM EPSS 0.00
Jenkins Metrics Plugin <4.0.2.8 - Info Disclosure
Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CWE-522 Jan 12, 2022
CVE-2021-20164 4.9 MEDIUM EPSS 0.00
Trendnet Tew-827dru Firmware - Insufficiently Protected Credentials
Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses credentials for the smb functionality of the device. Usernames and passwords for all smb users are revealed in plaintext on the smbserver.asp page.
CWE-522 Dec 30, 2021
CVE-2021-20163 4.9 MEDIUM EPSS 0.00
Trendnet Tew-827dru Firmware - Insufficiently Protected Credentials
Trendnet AC2600 TEW-827DRU version 2.08B01 leaks information via the ftp web page. Usernames and passwords for all ftp users are revealed in plaintext on the ftpserver.asp page.
CWE-522 Dec 30, 2021
CVE-2021-37401 9.8 CRITICAL EPSS 0.01
Idec Data File Manager < 2.12.1 - Insufficiently Protected Credentials
An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
CWE-522 Dec 28, 2021
CVE-2021-37400 9.8 CRITICAL EPSS 0.01
Idec Data File Manager < 2.12.1 - Insufficiently Protected Credentials
An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
CWE-522 Dec 28, 2021
CVE-2021-20826 7.6 HIGH EPSS 0.00
IDEC PLCs <v2.32 - Info Disclosure
Unprotected transport of credentials vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from the communication between the PLC and the software. As a result, the complete access privileges to the PLC Web server may be obtained, and manipulation of the PLC output and/or suspension of the PLC may be conducted.
CWE-522 Dec 24, 2021