CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
1,290 results Clear all
CVE-2021-21590 6.4 MEDIUM EPSS 0.00
Dell Emc Unity Operating Environment - Information Disclosure
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 contain a plain-text password storage vulnerability. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.
CWE-522 Jul 12, 2021
CVE-2021-36382 2.6 LOW EPSS 0.00
Devolutions Server <2021.1.18-2020.3.20 - Man In The Middle
Devolutions Server before 2021.1.18, and LTS before 2020.3.20, allows attackers to intercept private keys via a man-in-the-middle attack against the connections/partial endpoint (which accepts cleartext).
CWE-319 Jul 12, 2021
CVE-2021-30116 10.0 CRITICAL KEV RANSOMWARE NUCLEI EPSS 0.53
Kaseya VSA <9.5.7 - Info Disclosure
Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021. By default Kaseya VSA on premise offers a download page where the clients for the installation can be downloaded. The default URL for this page is https://x.x.x.x/dl.asp When an attacker download a client for Windows and installs it, the file KaseyaD.ini is generated (C:\Program Files (x86)\Kaseya\XXXXXXXXXX\KaseyaD.ini) which contains an Agent_Guid and AgentPassword This Agent_Guid and AgentPassword can be used to log in on dl.asp (https://x.x.x.x/dl.asp?un=840997037507813&pw=113cc622839a4077a84837485ced6b93e440bf66d44057713cb2f95e503a06d9) This request authenticates the client and returns a sessionId cookie that can be used in subsequent attacks to bypass authentication. Security issues discovered --- * Unauthenticated download page leaks credentials * Credentials of agent software can be used to obtain a sessionId (cookie) that can be used for services not intended for use by agents * dl.asp accepts credentials via a GET request * Access to KaseyaD.ini gives an attacker access to sufficient information to penetrate the Kaseya installation and its clients. Impact --- Via the page /dl.asp enough information can be obtained to give an attacker a sessionId that can be used to execute further (semi-authenticated) attacks against the system.
CWE-522 Jul 09, 2021
CVE-2021-34075 5.9 MEDIUM EPSS 0.00
Artica Pandora Fms < 754 - Insufficiently Protected Credentials
In Artica Pandora FMS <=754 in the File Manager component, there is sensitive information exposed on the client side which attackers can access.
CWE-522 Jun 30, 2021
CVE-2021-35050 6.5 MEDIUM EPSS 0.00
Fidelis Network & Deception <9.3.3 - Info Disclosure
User credentials stored in a recoverable format within Fidelis Network and Deception CommandPost. In the event that an attacker gains access to the CommandPost, these values could be decoded and used to login to the application. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.3. This vulnerability has been addressed in version 9.3.3 and subsequent versions.
CWE-522 Jun 25, 2021
CVE-2021-34204 6.8 MEDIUM EPSS 0.00
Dlink Dir-2640-us Firmware - Insufficiently Protected Credentials
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.
CWE-522 Jun 16, 2021
CVE-2021-28857 7.5 HIGH EPSS 0.00
Tp-link Tl-wpa4220 Firmware - Insufficiently Protected Credentials
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 username and password are sent via the cookie.
CWE-522 Jun 15, 2021
CVE-2020-15381 7.5 HIGH EPSS 0.00
Brocade SANnav <2.1.1 - Auth Bypass
Brocade SANnav before version 2.1.1 contains an Improper Authentication vulnerability that allows cleartext transmission of authentication credentials of the jmx server.
CWE-522 Jun 09, 2021
CVE-2020-26515 7.5 HIGH EPSS 0.00
Intland codeBeamer ALM <10.1.SP4 - Info Disclosure
An insufficiently protected credentials issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. The remember-me cookie (CB_LOGIN) issued by the application contains the encrypted user's credentials. However, due to a bug in the application code, those credentials are encrypted using a NULL encryption key.
CWE-522 Jun 08, 2021
CVE-2020-29323 7.5 HIGH EPSS 0.01
D-link DIR-885L-MFC - Info Disclosure
The D-link router DIR-885L-MFC 1.15b02, v1.21b05 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
CWE-522 Jun 04, 2021
CVE-2020-29322 7.5 HIGH EPSS 0.01
D-Link DIR-880L 1.07 - Info Disclosure
The D-Link router DIR-880L 1.07 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
CWE-522 Jun 04, 2021
CVE-2020-29321 7.5 HIGH EPSS 0.01
D-Link DIR-868L 3.01 - Info Disclosure
The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
CWE-522 Jun 04, 2021
CVE-2021-1537 6.2 MEDIUM EPSS 0.00
Cisco Thousandeyes Recorder - Insufficiently Protected Credentials
A vulnerability in the installer software of Cisco ThousandEyes Recorder could allow an unauthenticated, local attacker to access sensitive information that is contained in the ThousandEyes Recorder installer software. This vulnerability exists because sensitive information is included in the application installer. An attacker could exploit this vulnerability by downloading the installer and extracting its contents. A successful exploit could allow the attacker to access sensitive information that is included in the application installer.
CWE-522 Jun 04, 2021
CVE-2019-4724 7.5 HIGH EPSS 0.00
IBM Cognos Analytics <11.1 - Info Disclosure
IBM Cognos Analytics 11.0 and 11.1 could allow a remote attacker to obtain credentials from a user's browser via incorrect autocomplete settings in New Content Backup page. IBM X-Force ID: 172130.
CWE-522 Jun 01, 2021
CVE-2019-4723 7.5 HIGH EPSS 0.00
IBM Cognos Analytics <11.2 - Info Disclosure
IBM Cognos Analytics 11.0 and 11.1 could allow a remote attacker to obtain credentials from a user's browser via incorrect autocomplete settings in New Data Server Connection page. IBM X-Force ID: 172129.
CWE-522 Jun 01, 2021
CVE-2021-23019 7.8 HIGH EPSS 0.00
NGINX Controller <3.15.0 - Info Disclosure
The NGINX Controller 2.0.0 thru 2.9.0 and 3.x before 3.15.0 Administrator password may be exposed in the systemd.txt file that is included in the NGINX support package.
CWE-201 Jun 01, 2021
CVE-2020-27831 4.3 MEDIUM EPSS 0.00
Redhat Quay < 3.3.3 - Improper Access Control
A flaw was found in Red Hat Quay, where it does not properly protect the authorization token when authorizing email addresses for repository email notifications. This flaw allows an attacker to add email addresses they do not own to repository notifications.
CWE-284 May 27, 2021
CVE-2020-27839 5.4 MEDIUM EPSS 0.00
Redhat Ceph < 14.2.17 - Insufficiently Protected Credentials
A flaw was found in ceph-dashboard. The JSON Web Token (JWT) used for user authentication is stored by the frontend application in the browser’s localStorage which is potentially vulnerable to attackers via XSS attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
CWE-522 May 26, 2021
CVE-2019-25030 5.5 MEDIUM EPSS 0.00
Versa Director, Versa Analytics, VOS < - Info Disclosure
In Versa Director, Versa Analytics and VOS, Passwords are not hashed using an adaptive cryptographic hash function or key derivation function prior to storage. Popular hashing algorithms based on the Merkle-Damgardconstruction (such as MD5 and SHA-1) alone are insufficient in thwarting password cracking. Attackers can generate and use precomputed hashes for all possible password character combinations (commonly referred to as "rainbow tables") relatively quickly. The use of adaptive hashing algorithms such asscryptorbcryptor Key-Derivation Functions (i.e.PBKDF2) to hash passwords make generation of such rainbow tables computationally infeasible.
CWE-522 May 26, 2021
CVE-2021-29253 5.1 MEDIUM EPSS 0.00
RSA Archer < 6.6.0.8 - Insufficiently Protected Credentials
The Tableau integration in RSA Archer 6.4 P1 (6.4.0.1) through 6.9 P2 (6.9.0.2) is affected by an insecure credential storage vulnerability. An malicious attacker with access to the Tableau workbook file may obtain access to credential information to use it in further attacks.
CWE-522 May 26, 2021