CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
1,290 results Clear all
CVE-2020-2213 4.3 MEDIUM EPSS 0.00
Jenkins White Source Plugin <19.1.1 - Info Disclosure
Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.
CWE-522 Jul 02, 2020
CVE-2020-2212 4.3 MEDIUM EPSS 0.00
Jenkins GitHub Coverage Reporter Plugin <1.8 - Info Disclosure
Jenkins GitHub Coverage Reporter Plugin 1.8 and earlier stores secrets unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system or read permissions on the system configuration.
CWE-522 Jul 02, 2020
CVE-2020-2209 4.3 MEDIUM EPSS 0.00
Jenkins TestComplete support Plugin <2.4.1 - Info Disclosure
Jenkins TestComplete support Plugin 2.4.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
CWE-522 Jul 02, 2020
CVE-2020-2208 4.3 MEDIUM EPSS 0.00
Jenkins Slack Upload Plugin <1.7 - Info Disclosure
Jenkins Slack Upload Plugin 1.7 and earlier stores a secret unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
CWE-522 Jul 02, 2020
CVE-2020-3391 6.5 MEDIUM EPSS 0.00
Cisco DNA Center - Info Disclosure
A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to insecure storage of certain unencrypted credentials on an affected device. An attacker could exploit this vulnerability by viewing the network device configuration and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.
CWE-522 Jul 02, 2020
CVE-2020-5899 7.8 HIGH EPSS 0.00
NGINX Controller 3.0.0-3.4.0 - Info Disclosure
In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.
CWE-319 Jul 01, 2020
CVE-2019-18256 4.6 MEDIUM EPSS 0.00
BIOTRONIK CardioMessenger II - Info Disclosure
BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.
CWE-522 Jun 29, 2020
CVE-2020-10727 5.5 MEDIUM EPSS 0.00
ActiveMQ Artemis <2.12.0 - Info Disclosure
A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.
CWE-522 Jun 26, 2020
CVE-2020-14930 8.1 HIGH 1 PoC Analysis EPSS 0.06
BT CTROMS Terminal OS Port Portal CT-464 - Info Disclosure
An issue was discovered in BT CTROMS Terminal OS Port Portal CT-464. Account takeover can occur because the password-reset feature discloses the verification token. Upon a getverificationcode.jsp request, this token is transmitted not only to the registered phone number of the user account, but is also transmitted to the unauthenticated HTTP client.
CWE-319 Jun 19, 2020
CVE-2018-21248 7.5 HIGH EPSS 0.00
Mattermost Server < 5.4.0 - Insufficiently Protected Credentials
An issue was discovered in Mattermost Server before 5.4.0. It mishandles possession of superfluous authentication credentials.
CWE-522 Jun 19, 2020
CVE-2020-0540 7.5 HIGH EPSS 0.02
Intel Active Management Technology Fi... - Insufficiently Protected Credentials
Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
CWE-522 Jun 15, 2020
CVE-2020-10752 7.5 HIGH EPSS 0.00
OpenShift API Server - Info Disclosure
A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
CWE-522 Jun 12, 2020
CVE-2020-10755 6.5 MEDIUM EPSS 0.00
OpenStack Cinder <14.1.0-16.1.0 - Info Disclosure
An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project
CWE-522 Jun 10, 2020
CVE-2020-6239 4.4 MEDIUM EPSS 0.00
SAP Business One <10.0 - Info Disclosure
Under certain conditions SAP Business One (Backup service), versions 9.3, 10.0, allows an attacker with admin permissions to view SYSTEM user password in clear text, leading to Information Disclosure.
CWE-522 Jun 10, 2020
CVE-2020-11681 8.1 HIGH EPSS 0.00
Castel Nextgen Dvr Firmware - Insufficiently Protected Credentials
Castel NextGen DVR v1.0.0 stores and displays credentials for the associated SMTP server in cleartext. Low privileged users can exploit this to create an administrator user and obtain the SMTP credentials.
CWE-522 Jun 04, 2020
CVE-2018-21239 5.3 MEDIUM EPSS 0.00
Foxitsoftware Phantompdf < 9.2 - Insufficiently Protected Credentials
An issue was discovered in Foxit Reader and PhantomPDF before 9.2. It allows NTLM credential theft via a GoToE or GoToR action.
CWE-522 Jun 04, 2020
CVE-2018-21237 5.3 MEDIUM EPSS 0.00
Foxitsoftware Phantompdf - Insufficiently Protected Credentials
An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows NTLM credential theft via a GoToE or GoToR action.
CWE-522 Jun 04, 2020
CVE-2020-7030 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
Avaya IP Office < 10.1.0.7 - Information Disclosure
A sensitive information disclosure vulnerability was discovered in the web interface component of IP Office that may potentially allow a local user to gain unauthorized access to the component. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 though 11.0.4.3.
CWE-522 Jun 04, 2020
CVE-2020-2198 6.5 MEDIUM EPSS 0.00
Jenkins Project Inheritance - Insufficiently Protected Credentials
Jenkins Project Inheritance Plugin 19.08.02 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure.
CWE-522 Jun 03, 2020
CVE-2014-9702 7.5 HIGH EPSS 0.00
Cmfive <2015-03-15 - Info Disclosure
system/classes/DbPDO.php in Cmfive through 2015-03-15, when database connectivity malfunctions, allows remote attackers to obtain sensitive information (username and password) via any request, such as a password reset request.
CWE-522 Jun 01, 2020