CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,271 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,547 researchers
1,290 results Clear all
CVE-2017-8837 9.8 CRITICAL 1 PoC Analysis EPSS 0.11
Peplink B305hw2 Firmware - Insufficiently Protected Credentials
Cleartext password storage exists on Peplink Balance 305, 380, 580, 710, 1350, and 2500 devices with firmware before fw-b305hw2_380hw6_580hw2_710hw3_1350hw2_2500-7.0.1-build2093. The files in question are /etc/waipass and /etc/roapass. In case one of these devices is compromised, the attacker can gain access to passwords and abuse them to compromise further systems.
CWE-522 Jun 05, 2017
CVE-2017-7913 9.8 CRITICAL EPSS 0.00
Moxa OnCell - Info Disclosure
A Plaintext Storage of a Password issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. The application's configuration file contains parameters that represent passwords in plaintext.
CWE-522 May 29, 2017
CVE-2017-9136 7.5 HIGH EPSS 0.00
Mimosa Client Radios <2.2.3 - Code Injection
An issue was discovered on Mimosa Client Radios before 2.2.3. In the device's web interface, there is a page that allows an attacker to use an unsanitized GET parameter to download files from the device as the root user. The attacker can download any file from the device's filesystem. This can be used to view unsalted, MD5-hashed administrator passwords, which can then be cracked, giving the attacker full admin access to the device's web interface. This vulnerability can also be used to view the plaintext pre-shared key (PSK) for encrypted wireless connections, or to view the device's serial number (which allows an attacker to factory reset the device).
CWE-522 May 21, 2017
CVE-2017-7486 7.5 HIGH EPSS 0.04
PostgreSQL <9.7 - Info Disclosure
PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.
CWE-522 May 12, 2017
CVE-2017-7925 9.8 CRITICAL NUCLEI EPSS 0.80
Dahuasecurity Dh-ipc-hdbw23a0rn-zs Fi... - Insufficiently Protected Credentials
A Password in Configuration File issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The password in configuration file vulnerability was identified, which could lead to a malicious user assuming the identity of a privileged user and gaining access to sensitive information.
CWE-260 May 06, 2017
CVE-2017-8371 6.8 MEDIUM EPSS 0.00
Schneider-electric Struxureware Data ... - Insufficiently Protected Credentials
Schneider Electric StruxureWare Data Center Expert before 7.4.0 uses cleartext RAM storage for passwords, which might allow remote attackers to obtain sensitive information via unspecified vectors.
CWE-522 Apr 30, 2017
CVE-2017-8296 7.5 HIGH EPSS 0.00
Ked Password Manager - Insufficiently Protected Credentials
kedpm 0.5 and 1.0 creates a history file in ~/.kedpm/history that is written in cleartext. All of the commands performed in the password manager are written there. This can lead to the disclosure of the master password if the "password" command is used with an argument. The names of the password entries created and consulted are also accessible in cleartext.
CWE-522 Apr 27, 2017
CVE-2017-8225 9.8 CRITICAL EXPLOITED 4 PoCs Analysis EPSS 0.71
Wificam Wireless IP Camera (p2p) Firm... - Insufficiently Protected Credentials
On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
CWE-522 Apr 25, 2017
CVE-2017-8222 7.5 HIGH EXPLOITED 1 PoC Analysis EPSS 0.07
Wificam Wireless IP Camera (p2p) Firm... - Insufficiently Protected Credentials
Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.
CWE-522 Apr 25, 2017
CVE-2017-6528 8.1 HIGH 1 PoC Analysis EPSS 0.07
Dnatools Dnalims - Insufficiently Protected Credentials
An issue was discovered in dnaTools dnaLIMS 4-2015s13. dnaLIMS is affected by plaintext password storage (the /home/dna/spool/.pfile file).
CWE-522 Mar 09, 2017
CVE-2017-5140 9.8 CRITICAL EPSS 0.00
Honeywell XL Web II - Info Disclosure
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. Password is stored in clear text.
CWE-522 Feb 13, 2017
CVE-2017-5139 9.8 CRITICAL EPSS 0.00
Honeywell XL Web II controller <XL1000C500 - Info Disclosure
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. Any user is able to disclose a password by accessing a specific URL, because of Plaintext Storage of a Password.
CWE-522 Feb 13, 2017
CVE-2016-9360 6.7 MEDIUM EPSS 0.00
GE Proficy <5.8 SIM 13 - Info Disclosure
An issue was discovered in General Electric (GE) Proficy HMI/SCADA iFIX Version 5.8 SIM 13 and prior versions, Proficy HMI/SCADA CIMPLICITY Version 9.0 and prior versions, and Proficy Historian Version 6.0 and prior versions. An attacker may be able to retrieve user passwords if he or she has access to an authenticated session.
CWE-522 Feb 13, 2017
CVE-2015-5013 5.5 MEDIUM EPSS 0.00
IBM Security Access Manager For Web 8... - Insufficiently Protected Credentials
The IBM Security Access Manager appliance includes configuration files that contain obfuscated plaintext-passwords which authenticated users can access.
CWE-522 Feb 08, 2017
CVE-2015-7546 7.5 HIGH EPSS 0.00
OpenStack Identity <2015.1.3-8.0.2 - Privilege Escalation
The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token.
CWE-522 Feb 03, 2016
CVE-2015-5955 EPSS 0.00
ownCloud iOS <3.4.4 - Info Disclosure
ownCloud iOS app before 3.4.4 does not properly switch state between multiple instances, which might allow remote instance administrators to obtain sensitive credential and cookie information by reading authentication headers.
CWE-522 Oct 29, 2015
CVE-2015-3962 EPSS 0.00
Schneider Electric StruxureWare Building Expert MPM <2.15 - Info Di...
Schneider Electric StruxureWare Building Expert MPM before 2.15 does not use encryption for the client-server data stream, which allows remote attackers to discover credentials by sniffing the network.
CWE-522 Sep 18, 2015
CVE-2014-4806 5.5 MEDIUM EPSS 0.00
IBM Security AppScan Enterprise <9.0.0.1 - Info Disclosure
The installation process in IBM Security AppScan Enterprise 8.x before 8.6.0.2 iFix 003, 8.7.x before 8.7.0.1 iFix 003, 8.8.x before 8.8.0.1 iFix 002, and 9.0.x before 9.0.0.1 iFix 001 on Linux places a cleartext password in a temporary file, which allows local users to obtain sensitive information by reading this file.
CWE-522 Aug 29, 2014
CVE-2014-1812 8.8 HIGH KEV RANSOMWARE 2 PoCs Analysis EPSS 0.80
Microsoft Windows - Privilege Escalation
The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability."
CWE-522 May 14, 2014
CVE-2014-0755 EPSS 0.00
Rockwellautomation Rslogix 5000 Desig... - Insufficiently Protected Credentials
Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors.
CWE-522 Feb 05, 2014