CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
1,290 results Clear all
CVE-2019-0120 4.4 MEDIUM EPSS 0.00
Intel J5005 Firmware - Insufficiently Protected Credentials
Insufficient key protection vulnerability in silicon reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow a privileged user to potentially enable denial of service via local access.
CWE-522 May 17, 2019
CVE-2019-0881 7.8 HIGH 1 PoC Analysis EPSS 0.04
Windows Kernel - Privilege Escalation
An elevation of privilege vulnerability exists when the Windows Kernel improperly handles key enumeration, aka 'Windows Kernel Elevation of Privilege Vulnerability'.
CWE-522 May 16, 2019
CVE-2019-10921 7.5 HIGH EPSS 0.01
LOGO! 8 BM <V8.3 - Info Disclosure
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Unencrypted storage of passwords in the project could allow an attacker with access to port 10005/tcp to obtain passwords of the device. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known
CWE-522 May 14, 2019
CVE-2019-8350 6.6 MEDIUM EPSS 0.00
Simple Better Banking < 2.45.3 - Insufficiently Protected Credentials
The Simple - Better Banking application 2.45.0 through 2.45.3 (fixed in 2.46.0) for Android was affected by an information disclosure vulnerability that leaked the user's password to the keyboard autocomplete functionality. Third-party Android keyboards that capture the password may store this password in cleartext, or transmit the password to third-party services for keyboard customization purposes. A compromise of any datastore that contains keyboard autocompletion caches would result in the disclosure of the user's Simple Bank password.
CWE-522 May 13, 2019
CVE-2019-11885 6.8 MEDIUM EPSS 0.00
eyeDisk - Info Disclosure
eyeDisk implements the unlock feature by sending a cleartext password. The password can be discovered by sniffing USB traffic or by sending a 06 05 52 41 01 b0 00 00 00 00 00 00 SCSI command.
CWE-522 May 12, 2019
CVE-2019-11820 5.5 MEDIUM EPSS 0.00
Synology Calendar <2.3.3-0620 - Info Disclosure
Information exposure through process environment vulnerability in Synology Calendar before 2.3.3-0620 allows local users to obtain credentials via cmdline.
CWE-522 May 09, 2019
CVE-2019-3938 7.8 HIGH EPSS 0.00
Crestron Am-100 Firmware - Insufficiently Protected Credentials
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 stores usernames, passwords, and other configuration options in the file generated via the "export configuration" feature. The configuration file is encrypted using the awenc binary. The same binary can be used to decrypt any configuration file since all the encryption logic is hard coded. A local attacker can use this vulnerability to gain access to devices username and passwords.
CWE-522 Apr 30, 2019
CVE-2019-10318 8.8 HIGH EPSS 0.00
Jenkins Azure AD < 0.3.3 - Insufficiently Protected Credentials
Jenkins Azure AD Plugin 0.3.3 and earlier stored the client secret unencrypted in the global config.xml configuration file on the Jenkins master where it could be viewed by users with access to the master file system.
CWE-522 Apr 30, 2019
CVE-2019-10316 8.8 HIGH EPSS 0.00
Jenkins Aqua Microscanner - Insufficiently Protected Credentials
Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CWE-522 Apr 30, 2019
CVE-2019-10313 8.8 HIGH EPSS 0.00
Jenkins Twitter < 0.7 - Insufficiently Protected Credentials
Jenkins Twitter Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CWE-522 Apr 30, 2019
CVE-2019-10239 7.8 HIGH EPSS 0.00
Robotronic Runasspc - Insufficiently Protected Credentials
Robotronic RunAsSpc 3.7.0.0 protects stored credentials insufficiently, which allows locally authenticated attackers (under the same user context) to obtain cleartext credentials of the stored account.
CWE-269 Apr 24, 2019
CVE-2019-11402 9.8 CRITICAL EPSS 0.00
Gradle Enterprise <2018.5.3 - Info Disclosure
In Gradle Enterprise before 2018.5.3, Build Cache Nodes did not store the credentials at rest in an encrypted format.
CWE-522 Apr 22, 2019
CVE-2019-11350 9.8 CRITICAL 1 Writeup EPSS 0.00
CloudBees Jenkins Operations Center <2.150.2.3 - Info Disclosure
CloudBees Jenkins Operations Center 2.150.2.3, when an expired trial license exists, allows Cleartext Password Storage and Retrieval via the proxy configuration page.
CWE-522 Apr 19, 2019
CVE-2019-10303 8.8 HIGH EPSS 0.00
Jenkins Azure Publishersettings Crede... - Insufficiently Protected Credentials
Jenkins Azure PublisherSettings Credentials Plugin 1.2 and earlier stored credentials unencrypted in the credentials.xml file on the Jenkins master where they could be viewed by users with access to the master file system.
CWE-522 Apr 18, 2019
CVE-2019-10302 8.8 HIGH EPSS 0.00
Jenkins Jira-ext < 0.8 - Insufficiently Protected Credentials
Jenkins jira-ext Plugin 0.8 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CWE-522 Apr 18, 2019
CVE-2019-6609 9.8 CRITICAL EPSS 0.00
F5 Big-ip Local Traffic Manager - Insufficiently Protected Credentials
Platform dependent weakness. This issue only impacts iSeries platforms. On these platforms, in BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) versions 14.0.0-14.1.0.1, 13.0.0-13.1.1.3, and 12.1.1 HF2-12.1.4, the secureKeyCapable attribute was not set which causes secure vault to not use the F5 hardware support to store the unit key. Instead the unit key is stored in plaintext on disk as would be the case for Z100 systems. Additionally this causes the unit key to be stored in UCS files taken on these platforms.
CWE-522 Apr 15, 2019
CVE-2019-6525 8.8 HIGH EPSS 0.00
Aveva Wonderware System Platform - Insufficiently Protected Credent...
AVEVA Wonderware System Platform 2017 Update 2 and prior uses an ArchestrA network user account for authentication of system processes and inter-node communications. A user with low privileges could make use of an API to obtain the credentials for this account.
CWE-269 Apr 11, 2019
CVE-2019-0035 6.8 MEDIUM EPSS 0.00
Junos OS - Privilege Escalation
When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administration, and Maintenance) volume, leading to a possible administrative bypass with physical access to the console. OAM volumes (e.g. flash drives) are typically instantiated as /dev/gpt/oam, or /oam for short. Password recovery, changing the root password from a console, should not have been allowed from an insecure console. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496, 15.1X53-D68; 16.1 versions prior to 16.1R3-S10, 16.1R6-S6, 16.1R7-S3; 16.1X65 versions prior to 16.1X65-D49; 16.2 versions prior to 16.2R2-S8; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S3; 17.4 versions prior to 17.4R1-S6, 17.4R2-S2; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2. This issue does not affect Junos OS releases prior to 15.1.
CWE-522 Apr 10, 2019
CVE-2019-0032 7.8 HIGH EPSS 0.00
Juniper Networks Service Insight <18.1R1 - Info Disclosure
A password management issue exists where the Organization authentication username and password were stored in plaintext in log files. A locally authenticated attacker who is able to access these stored plaintext credentials can use them to login to the Organization. Affected products are: Juniper Networks Service Insight versions from 15.1R1, prior to 18.1R1. Service Now versions from 15.1R1, prior to 18.1R1.
CWE-522 Apr 10, 2019
CVE-2019-5615 6.5 MEDIUM EPSS 0.00
Rapid7 InsightVM <6.5.49 - Info Disclosure
Users with Site-level permissions can access files containing the username-encrypted passwords of Security Console Global Administrators and clear-text passwords for restoring backups, as well as the salt for those passwords. Valid credentials are required to access these files and malicious users would still need to perform additional work to decrypt the credentials and escalate privileges. This issue affects: Rapid7 InsightVM versions 6.5.11 through 6.5.49.
CWE-522 Apr 09, 2019