CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
1,290 results Clear all
CVE-2019-1003045 6.5 MEDIUM EPSS 0.01
Jenkins ECS Publisher Plugin <1.0.0 - Info Disclosure
A vulnerability in Jenkins ECS Publisher Plugin 1.0.0 and earlier allows attackers with Item/Extended Read permission, or local file system access to the Jenkins home directory to obtain the API token configured in this plugin's configuration.
CWE-522 Mar 28, 2019
CVE-2018-19466 9.8 CRITICAL 1 PoC Analysis EPSS 0.13
Portainer <1.20.0 - Info Disclosure
A vulnerability was found in Portainer before 1.20.0. Portainer stores LDAP credentials, corresponding to a master password, in cleartext and allows their retrieval via API calls.
CWE-522 Mar 27, 2019
CVE-2017-7510 8.8 HIGH EPSS 0.00
ovirt-engine 4.1 - Info Disclosure
In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.
CWE-522 Mar 25, 2019
CVE-2019-9868 7.2 HIGH EPSS 0.00
Veritas NetBackup Appliance <3.1.2 - Info Disclosure
An issue was discovered in the Web Console in Veritas NetBackup Appliance through 3.1.2. The SMTP password is displayed to an administrator.
CWE-522 Mar 21, 2019
CVE-2019-9867 7.2 HIGH EPSS 0.00
Veritas NetBackup Appliance <3.1.2 - Info Disclosure
An issue was discovered in the Web Console in Veritas NetBackup Appliance through 3.1.2. The proxy server password is displayed to an administrator.
CWE-522 Mar 21, 2019
CVE-2019-5723 9.8 CRITICAL EPSS 0.00
Portier - Insufficiently Protected Credentials
An issue was discovered in portier vision 4.4.4.2 and 4.4.4.6. Passwords are stored using reversible encryption rather than as a hash value, and the used Vigenere algorithm is badly outdated. Moreover, the encryption key is static and too short. Due to this, the passwords stored by the application can be easily decrypted.
CWE-522 Mar 21, 2019
CVE-2018-17500 2.9 LOW EPSS 0.00
Envoy Passport - Info Disclosure
Envoy Passport for Android and Envoy Passport for iPhone could allow a local attacker to obtain sensitive information, caused by the storing of hardcoded OAuth Creds in plaintext. An attacker could exploit this vulnerability to obtain sensitive information.
CWE-522 Mar 21, 2019
CVE-2019-1003039 8.8 HIGH EPSS 0.00
JenkinsAppDynamics Dashboard Plugin <1.0.14 - Info Disclosure
An insufficiently protected credentials vulnerability exists in JenkinsAppDynamics Dashboard Plugin 1.0.14 and earlier in src/main/java/nl/codecentric/jenkins/appd/AppDynamicsResultsPublisher.java that allows attackers without permission to obtain passwords configured in jobs to obtain them.
CWE-522 Mar 08, 2019
CVE-2019-1003038 7.8 HIGH EPSS 0.00
Jenkins Repository Connector Plugin <1.2.4 - Info Disclosure
An insufficiently protected credentials vulnerability exists in Jenkins Repository Connector Plugin 1.2.4 and earlier in src/main/java/org/jvnet/hudson/plugins/repositoryconnector/ArtifactDeployer.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/Repository.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/UserPwd.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the password stored in the plugin configuration.
CWE-522 Mar 08, 2019
CVE-2019-3780 8.8 HIGH EPSS 0.00
Cloudfoundry Container Runtime - Insufficiently Protected Credentials
Cloud Foundry Container Runtime, versions prior to 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS credentials allowing the user to escalate privileges to gain access to the IAAS account.
CWE-260 Mar 08, 2019
CVE-2019-4059 9.8 CRITICAL EPSS 0.00
IBM Rational Clearcase - Insufficiently Protected Credentials
IBM Rational ClearCase 1.0.0.0 GIT connector does not sufficiently protect the document database password. An attacker could obtain the password and gain unauthorized access to the document database. IBM X-Force ID: 156583.
CWE-522 Feb 15, 2019
CVE-2019-3782 7.8 HIGH EPSS 0.00
Cloudfoundry Credhub CLI - Insufficiently Protected Credentials
Cloud Foundry CredHub CLI, versions prior to 2.2.1, inadvertently writes authentication credentials provided via environment variables to its persistent config file. A local authenticated malicious user with access to the CredHub CLI config file can use these credentials to retrieve and modify credentials stored in CredHub that are authorized to the targeted user.
CWE-522 Feb 13, 2019
CVE-2019-6549 7.2 HIGH EPSS 0.00
Kunbus Pr100088 Modbus Gateway Firmware - Insufficiently Protected ...
An attacker could retrieve plain-text credentials stored in a XML file on PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) through FTP.
CWE-522 Feb 12, 2019
CVE-2018-20781 7.8 HIGH 1 Writeup EPSS 0.04
Gnome Keyring < 3.27.2 - Insufficiently Protected Credentials
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
CWE-522 Feb 12, 2019
CVE-2019-6242 7.2 HIGH EPSS 0.00
Kentico Xperience - Insufficiently Protected Credentials
Kentico v10.0.42 allows Global Administrators to read the cleartext SMTP Password by navigating to the SMTP configuration page. NOTE: the vendor considers this a best-practice violation but not a vulnerability. The vendor plans to fix it at a future time
CWE-522 Feb 08, 2019
CVE-2019-1000001 9.8 CRITICAL EPSS 0.00
TeamPass <2.1.27 - Info Disclosure
TeamPass version 2.1.27 and earlier contains a Storing Passwords in a Recoverable Format vulnerability in Shared password vaults that can result in all shared passwords are recoverable server side. This attack appears to be exploitable via any vulnerability that can bypass authentication or role assignment and can lead to shared password leakage.
CWE-522 Feb 04, 2019
CVE-2019-7300 7.2 HIGH 1 Writeup EPSS 0.03
Artica Proxy 3.06.200056 - Command Injection
Artica Proxy 3.06.200056 allows remote attackers to execute arbitrary commands as root by reading the ressources/settings.inc ldap_admin and ldap_password fields, using these credentials at logon.php, and then entering the commands in the admin.index.php command-line field.
CWE-522 Feb 01, 2019
CVE-2018-15456 4.3 MEDIUM EPSS 0.00
Cisco Identity Services Engine - Information Disclosure
A vulnerability in the Admin Portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to view saved passwords in plain text. The vulnerability is due to the incorrect inclusion of saved passwords when loading configuration pages in the Admin Portal. An attacker with read or write access to the Admin Portal could exploit this vulnerability by browsing to a page that contains sensitive data. An exploit could allow the attacker to recover passwords for unauthorized use and expose those accounts to further attack.
CWE-522 Jan 10, 2019
CVE-2018-0474 8.8 HIGH EPSS 0.00
Cisco Unified Communications Manager - Information Disclosure
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view digest credentials in clear text. The vulnerability is due to the incorrect inclusion of saved passwords in configuration pages. An attacker could exploit this vulnerability by logging in to the Cisco Unified Communications Manager web-based management interface and viewing the source code for the configuration page. A successful exploit could allow the attacker to recover passwords and expose those accounts to further attack.
CWE-522 Jan 10, 2019
CVE-2018-1000425 7.8 HIGH EPSS 0.00
Jenkins SonarQube Scanner Plugin <2.8 - Info Disclosure
An insufficiently protected credentials vulnerability exists in Jenkins SonarQube Scanner Plugin 2.8 and earlier in SonarInstallation.java that allows attackers with local file system access to obtain the credentials used to connect to SonarQube.
CWE-522 Jan 09, 2019