CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
1,290 results Clear all
CVE-2018-16984 4.9 MEDIUM EPSS 0.01
Django <2.1.2 - Info Disclosure
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
CWE-522 Oct 02, 2018
CVE-2018-1498 6.2 MEDIUM EPSS 0.00
IBM Security Guardium EcoSystem 10.5 - Info Disclosure
IBM Security Guardium EcoSystem 10.5 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 141223.
CWE-522 Oct 02, 2018
CVE-2018-17613 9.8 CRITICAL EPSS 0.00
Telegram Desktop <1.3.16 - Info Disclosure
Telegram Desktop (aka tdesktop) 1.3.16 alpha, when "Use proxy" is enabled, sends credentials and application data in cleartext over the SOCKS5 protocol.
CWE-522 Sep 28, 2018
CVE-2018-16669 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
CIRCONTROL OCPP <1.5.0 - Info Disclosure
An issue was discovered in CIRCONTROL Open Charge Point Protocol (OCPP) before 1.5.0, as used in CirCarLife, PowerStudio, and other products. Due to storage of credentials in XML files, an unprivileged user can look at /services/config/config.xml for the admin credentials of the ocpp and circarlife panels.
CWE-522 Sep 18, 2018
CVE-2018-10814 7.8 HIGH 1 PoC Analysis EPSS 0.00
Synametrics Synaman - Insufficiently Protected Credentials
Synametrics SynaMan 4.0 build 1488 uses cleartext password storage for SMTP credentials.
CWE-522 Sep 14, 2018
CVE-2018-16987 7.2 HIGH 1 PoC Analysis EPSS 0.01
Squash TM <1.18.0 - Info Disclosure
Squash TM through 1.18.0 presents the cleartext passwords of external services in the administration panel, as demonstrated by a ta-server-password field in the HTML source code.
CWE-522 Sep 13, 2018
CVE-2017-17691 8.1 HIGH EPSS 0.00
Contronics Homeputer CL Studio Fur Ho... - Insufficiently Protected Credentials
Homeputer CL Studio fur HomeMatic 4.0 Rel 160808 and earlier uses cleartext to exchange the username and password between server and client instances, which allows remote attackers to obtain sensitive information via a man in the middle attack.
CWE-522 Sep 07, 2018
CVE-2017-16714 9.8 CRITICAL EPSS 0.02
Ice Qube Thermal Mgmt Ctr <4.13 - Info Disclosure
In Ice Qube Thermal Management Center versions prior to version 4.13, passwords are stored in plaintext in a file that is accessible without authentication.
CWE-522 Sep 06, 2018
CVE-2018-13822 7.5 HIGH EPSS 0.00
Broadcom Project Portfolio Management < 14.3 - Insufficiently Protected Credentials
Unprotected storage of credentials in CA PPM 14.3 and below, 14.4, 15.1, 15.2 CP5 and below, and 15.3 CP2 and below, allows attackers to access sensitive information.
CWE-522 Aug 30, 2018
CVE-2018-1139 8.1 HIGH EPSS 0.02
Samba <4.7.9, 4.8.4 - Info Disclosure
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
CWE-522 Aug 22, 2018
CVE-2018-10622 4.9 MEDIUM EPSS 0.00
Medtronic MyCareLink Patient Monitor - Info Disclosure
Medtronic MyCareLink Patient Monitor uses per-product credentials that are stored in a recoverable format. An attacker can use these credentials for network authentication and encryption of local data at rest.
CWE-522 Aug 10, 2018
CVE-2017-1411 5.9 MEDIUM EPSS 0.00
IBM Security Identity Governance And ... - Insufficiently Protected Credentials
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 127399.
CWE-522 Aug 06, 2018
CVE-2018-11050 8.8 HIGH EPSS 0.01
Dell Emc Networker < 9.0 - Cleartext Transmission
Dell EMC NetWorker versions between 9.0 and 9.1.1.8 through 9.2.1.3, and the version 18.1.0.1 contain a Clear-Text authentication over network vulnerability in the Rabbit MQ Advanced Message Queuing Protocol (AMQP) component. User credentials are sent unencrypted to the remote AMQP service. An unauthenticated attacker in the same network collision domain, could potentially sniff the password from the network and use it to access the component using the privileges of the compromised user.
CWE-319 Aug 01, 2018
CVE-2018-5543 8.8 HIGH EPSS 0.00
F5 BIG-IP Controller <1.5.0 - Info Disclosure
The F5 BIG-IP Controller for Kubernetes 1.0.0-1.5.0 (k8s-bigip-crtl) passes BIG-IP username and password as command line parameters, which may lead to disclosure of the credentials used by the container.
CWE-522 Jul 31, 2018
CVE-2018-8851 9.8 CRITICAL EPSS 0.00
Echelon SmartServer <4.11.007 - Info Disclosure
Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices store passwords in plaintext, which may allow an attacker with access to the configuration file to log into the SmartServer web user interface.
CWE-522 Jul 24, 2018
CVE-2017-5704 6.7 MEDIUM EPSS 0.00
Intel Core I3 - Insufficiently Protected Credentials
Platform sample code firmware included with 4th Gen Intel Core Processor, 5th Gen Intel Core Processor, 6th Gen Intel Core Processor, and 7th Gen Intel Core Processor potentially exposes password information in memory to a local attacker with administrative privileges.
CWE-522 Jul 10, 2018
CVE-2018-1000404 7.8 HIGH EPSS 0.00
Jenkins AWS CodeBuild Plugin <0.27 - Credentials Disclosure
Jenkins project Jenkins AWS CodeBuild Plugin version 0.26 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSClientFactory.java, CodeBuilder.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.27 and later.
CWE-522 Jul 09, 2018
CVE-2018-1000403 7.8 HIGH EPSS 0.00
Jenkins AWS CodeDeploy Plugin <1.19 - Credentials Disclosure
Jenkins project Jenkins AWS CodeDeploy Plugin version 1.19 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSCodeDeployPublisher.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 1.20 and later.
CWE-522 Jul 09, 2018
CVE-2018-1000401 7.8 HIGH EPSS 0.00
Jenkins AWS CodePipeline Plugin <0.36 - Credentials Disclosure
Jenkins project Jenkins AWS CodePipeline Plugin version 0.36 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSCodePipelineSCM.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.37 and later.
CWE-522 Jul 09, 2018
CVE-2017-2665 4.8 MEDIUM EPSS 0.00
Mongodb - Insufficiently Protected Credentials
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
CWE-522 Jul 06, 2018