CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
1,290 results Clear all
CVE-2021-28496 5.7 MEDIUM EPSS 0.00
Arista Eos < 4.22.7m - Insufficiently Protected Credentials
On systems running Arista EOS and CloudEOS with the affected release version, when using shared secret profiles the password configured for use by BiDirectional Forwarding Detection (BFD) will be leaked when displaying output over eAPI or other JSON outputs to other authenticated users on the device. The affected EOS Versions are: all releases in 4.22.x train, 4.23.9 and below releases in the 4.23.x train, 4.24.7 and below releases in the 4.24.x train, 4.25.4 and below releases in the 4.25.x train, 4.26.1 and below releases in the 4.26.x train
CWE-522 Oct 21, 2021
CVE-2021-40476 7.5 HIGH EPSS 0.00
Windows AppContainer - Privilege Escalation
Windows AppContainer Elevation Of Privilege Vulnerability
CWE-522 Oct 13, 2021
CVE-2021-41125 5.7 MEDIUM 1 Writeup EPSS 0.00
Scrapy <2.5.1 - Info Disclosure
Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the `w3lib.http.basic_auth_header` function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using `HttpAuthMiddleware`.
CWE-522 Oct 06, 2021
CVE-2021-36178 4.3 MEDIUM EPSS 0.00
Fortinet FortiSDNConnector <1.1.7 - Info Disclosure
A insufficiently protected credentials in Fortinet FortiSDNConnector version 1.1.7 and below allows attacker to disclose third-party devices credential information via configuration page lookup.
CWE-522 Oct 06, 2021
CVE-2021-36170 3.2 LOW EPSS 0.00
FortiAnalyzerVM/FortiManagerVM <7.0.0,6.4.6 - Info Disclosure
An information disclosure vulnerability [CWE-200] in FortiAnalyzerVM and FortiManagerVM versions 7.0.0 and 6.4.6 and below may allow an authenticated attacker to read the FortiCloud credentials which were used to activate the trial license in cleartext.
CWE-522 Oct 06, 2021
CVE-2021-41092 5.4 MEDIUM EPSS 0.00
Docker CLI <20.10.9 - Info Disclosure
Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.
CWE-522 Oct 04, 2021
CVE-2021-36309 7.1 HIGH EPSS 0.00
Dell Enterprise SONiC OS <3.3.0 - Info Disclosure
Dell Enterprise SONiC OS, versions 3.3.0 and earlier, contains a sensitive information disclosure vulnerability. An authenticated malicious user with access to the system may use the TACACS\Radius credentials stored to read sensitive information and use it in further attacks.
CWE-522 Oct 01, 2021
CVE-2021-41300 9.8 CRITICAL EPSS 0.00
ECOA BAS - Info Disclosure
ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality.
CWE-522 Sep 30, 2021
CVE-2021-41297 8.8 HIGH EPSS 0.00
ECOA BAS - Privilege Escalation
ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.
CWE-522 Sep 30, 2021
CVE-2021-39342 5.3 MEDIUM EPSS 0.00
Credova Financial < 1.4.9 - Cleartext Transmission
The Credova_Financial WordPress plugin discloses a site's associated Credova API account username and password in plaintext via an AJAX action whenever a site user goes to checkout on a page that has the Credova Financing option enabled. This affects versions up to, and including, 1.4.8.
CWE-319 Sep 29, 2021
CVE-2021-38863 5.5 MEDIUM EPSS 0.00
IBM Security Verify Bridge <1.0.5.0 - Info Disclosure
IBM Security Verify Bridge 1.0.5.0 stores user credentials in plain clear text which can be read by a locally authenticated user. IBM X-Force ID: 208154.
CWE-522 Sep 23, 2021
CVE-2021-20434 4.4 MEDIUM EPSS 0.00
IBM Security Verify Bridge <1.0.5.0 - Info Disclosure
IBM Security Verify Bridge 1.0.5.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 196346.
CWE-522 Sep 23, 2021
CVE-2021-1589 6.5 MEDIUM EPSS 0.00
Cisco SD-WAN vManage Software - Privilege Escalation
A vulnerability in the disaster recovery feature of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain unauthorized access to user credentials. This vulnerability exists because access to API endpoints is not properly restricted. An attacker could exploit this vulnerability by sending a request to an API endpoint. A successful exploit could allow the attacker to gain unauthorized access to administrative credentials that could be used in further attacks.
CWE-522 Sep 23, 2021
CVE-2021-29811 4.9 MEDIUM EPSS 0.00
IBM Tivoli Netcool/omnibus Webgui < 8.1.0.24 - Insufficiently Protected Credentials
IBM Jazz for Service Management and IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 stores user credentials in plain clear text which can be read by an authenticated admin user. IBM X-Force ID: 204329.
CWE-522 Sep 20, 2021
CVE-2021-28813 9.6 CRITICAL EPSS 0.00
QSW-M2116P-2T2S, QNAP switches - Info Disclosure
A vulnerability involving insecure storage of sensitive information has been reported to affect QSW-M2116P-2T2S and QNAP switches running QuNetSwitch. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism.We have already fixed this vulnerability in the following versions: QSW-M2116P-2T2S 1.0.6 build 210713 and later QGD-1600P: QuNetSwitch 1.0.6.1509 and later QGD-1602P: QuNetSwitch 1.0.6.1509 and later QGD-3014PT: QuNetSwitch 1.0.6.1519 and later
CWE-522 Sep 10, 2021
CVE-2021-28499 6.3 MEDIUM EPSS 0.00
Arista Metamako Operating System < 0.18.0 - Insufficiently Protected Credentials
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user account passwords set in clear text could leak to users without any password. This issue affects: Arista Metamako Operating System MOS-0.18 and post releases in the MOS-0.1x train All releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train
CWE-522 Sep 09, 2021
CVE-2021-28498 8.7 HIGH EPSS 0.00
Arista Metamako Operating System < 0.13.0 - Insufficiently Protected Credentials
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user enable passwords set in clear text could result in unprivileged users getting complete access to the systems. This issue affects: Arista Metamako Operating System MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and prior releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train
CWE-522 Sep 09, 2021
CVE-2021-34733 5.5 MEDIUM EPSS 0.00
Cisco Evolved Programmable Network Ma... - Insufficiently Protected Credentials
A vulnerability in the CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, local attacker to access sensitive information stored on the underlying file system of an affected system. This vulnerability exists because sensitive information is not sufficiently secured when it is stored. An attacker could exploit this vulnerability by gaining unauthorized access to sensitive information on an affected system. A successful exploit could allow the attacker to create forged authentication requests and gain unauthorized access to the affected system.
CWE-522 Sep 02, 2021
CVE-2021-39373 7.8 HIGH EPSS 0.00
Samsung Drive Manager - Insufficiently Protected Credentials
Samsung Drive Manager 2.0.104 on Samsung H3 devices allows attackers to bypass intended access controls on disk management. WideCharToMultiByte, WideCharStr, and MultiByteStr can contribute to password exposure.
CWE-522 Sep 01, 2021
CVE-2021-21681 5.5 MEDIUM EPSS 0.00
Jenkins Nomad < 0.7.4 - Insufficiently Protected Credentials
Jenkins Nomad Plugin 0.7.4 and earlier stores Docker passwords unencrypted in the global config.xml file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CWE-522 Aug 31, 2021