CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
1,290 results Clear all
CVE-2019-10225 6.3 MEDIUM EPSS 0.00
OpenShift Container Platform 4.2 - Info Disclosure
A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files.
CWE-522 Mar 19, 2021
CVE-2021-3141 7.8 HIGH EPSS 0.00
Unisys Stealth < 6.0.025.0 - Insufficiently Protected Credentials
In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration.
CWE-522 Mar 18, 2021
CVE-2021-3344 8.8 HIGH EPSS 0.01
Redhat Openshift Builder - Insufficiently Protected Credentials
A privilege escalation flaw was found in OpenShift builder. During build time, credentials outside the build context are automatically mounted into the container image under construction. An OpenShift user, able to execute code during build time inside this container can re-use the credentials to overwrite arbitrary container images in internal registries and/or escalate their privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This affects github.com/openshift/builder v0.0.0-20210125201112-7901cb396121 and before.
CWE-522 Mar 16, 2021
CVE-2021-27935 7.5 HIGH EPSS 0.00
AdGuard <0.105.2 - Info Disclosure
An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie.
CWE-522 Mar 03, 2021
CVE-2021-22681 9.8 CRITICAL KEV EPSS 0.18
Rockwell Automation Studio 5000 <21 - Path Traversal
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
CWE-522 Mar 03, 2021
CVE-2021-25284 4.4 MEDIUM EPSS 0.00
SaltStack Salt <3002.5 - Info Disclosure
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CWE-522 Feb 27, 2021
CVE-2021-1731 5.5 MEDIUM EPSS 0.01
Microsoft Windows 10 - Insufficiently Protected Credentials
PFX Encryption Security Feature Bypass Vulnerability
CWE-522 Feb 25, 2021
CVE-2021-3252 7.5 HIGH EPSS 0.01
KACO New Energy XP100U - Info Disclosure
KACO New Energy XP100U Up to XP-JAVA 2.0 is affected by incorrect access control. Credentials will always be returned in plain-text from the local server during the KACO XP100U authentication process, regardless of whatever passwords have been provided, which leads to an information disclosure vulnerability.
CWE-522 Feb 23, 2021
CVE-2021-20445 6.5 MEDIUM EPSS 0.00
IBM Maximo for Civil Infrastructure <7.6.2 - Info Disclosure
IBM Maximo for Civil Infrastructure 7.6.2 could allow a user to obtain sensitive information due to insecure storeage of authentication credentials. IBM X-Force ID: 196621.
CWE-522 Feb 18, 2021
CVE-2020-9306 8.8 HIGH 1 Writeup EPSS 0.00
Tesla Solarcity Solar Monitoring Gateway < 5.46.43 - Insufficiently Protected Credentials
Tesla SolarCity Solar Monitoring Gateway through 5.46.43 has a "Use of Hard-coded Credentials" issue because Digi ConnectPort X2e uses a .pyc file to store the cleartext password for the python user account.
CWE-522 Feb 18, 2021
CVE-2021-20410 5.3 MEDIUM EPSS 0.00
IBM Security Verify Information Queue <1.0.8 - Info Disclosure
IBM Security Verify Information Queue 1.0.6 and 1.0.7 sends user credentials in plain clear text which can be read by an authenticated user using man in the middle techniques. IBM X-Force ID: 198190.
CWE-522 Feb 12, 2021
CVE-2021-27187 7.5 HIGH 1 PoC Analysis EPSS 0.01
Xn--b1agzlht FX Aggregator Terminal C... - Insufficiently Protected Credentials
The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 stores authentication credentials in cleartext in login.sav when the Save Password box is checked.
CWE-522 Feb 12, 2021
CVE-2020-14391 5.5 MEDIUM EPSS 0.00
Gnome Control Center - Insufficiently Protected Credentials
A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality.
CWE-522 Feb 08, 2021
CVE-2020-10554 7.5 HIGH EPSS 0.00
Psyprax <3.2.2 - Info Disclosure
An issue was discovered in Psyprax beforee 3.2.2. Passwords used to encrypt the data are stored in the database in an obfuscated format, which can be easily reverted. For example, the password AAAAAAAA is stored in the database as MMMMMMMM.
CWE-522 Feb 05, 2021
CVE-2020-29005 7.5 HIGH EPSS 0.00
Mediawiki < 1.35 - Cleartext Transmission
The API in the Push extension for MediaWiki through 1.35 used cleartext for ApiPush credentials, allowing for potential information disclosure.
CWE-319 Jan 29, 2021
CVE-2020-27258 6.5 MEDIUM EPSS 0.00
SOOIL Developments Co., Ltd Diabecare RS - Info Disclosure
In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, an information disclosure vulnerability in the communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows unauthenticated attackers to extract the pump’s keypad lock PIN via Bluetooth Low Energy.
CWE-522 Jan 19, 2021
CVE-2020-27270 5.7 MEDIUM EPSS 0.00
SOOIL Developments CoLtd DiabecareRS - Info Disclosure
SOOIL Developments CoLtd DiabecareRS, AnyDana-i ,AnyDana-A, communication protocol of the insulin pump & AnyDana-i,AnyDana-A mobile apps doesnt use adequate measures to protect encryption keys in transit which allows unauthenticated physically proximate attacker to sniff keys via (BLE).
CWE-522 Jan 19, 2021
CVE-2021-0220 6.8 MEDIUM EPSS 0.00
Junos Space - Info Disclosure
The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.
CWE-522 Jan 15, 2021
CVE-2021-0212 5.0 MEDIUM EPSS 0.00
Juniper Networks Contrail Networking <1911.31 - Info Disclosure
An Information Exposure vulnerability in Juniper Networks Contrail Networking allows a locally authenticated attacker able to read files to retrieve administrator credentials stored in plaintext thereby elevating their privileges over the system. This issue affects: Juniper Networks Contrail Networking versions prior to 1911.31.
CWE-522 Jan 15, 2021
CVE-2021-22132 4.8 MEDIUM EPSS 0.00
Elasticsearch < 7.10.2 - Insufficiently Protected Credentials
Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2
CWE-522 Jan 14, 2021