CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
110 results Clear all
CVE-2022-40258 5.3 MEDIUM EPSS 0.00
AMI Megarac - Info Disclosure
AMI Megarac Weak password hashes for Redfish & API
CWE-916 Jan 31, 2023
CVE-2022-47732 7.5 HIGH EPSS 0.00
Yeastar N412/N824 Config Pnl 42.x/45.x - Info Disclosure
In Yeastar N412 and N824 Configuration Panel 42.x and 45.x, an unauthenticated attacker can create backup file and download it, revealing admin hash, allowing, once cracked, to login inside the Configuration Panel, otherwise, replacing the hash in the archive and restoring it on the device which will change admin password granting access to the device.
CWE-916 Jan 20, 2023
CVE-2020-12069 7.8 HIGH EPSS 0.00
CODESYS V3 <V3.5.16.0 - Privilege Escalation
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
CWE-916 Dec 26, 2022
CVE-2022-40295 4.9 MEDIUM EPSS 0.00
Phppointofsale Php Point OF Sale - Information Disclosure
The application was vulnerable to an authenticated information disclosure, allowing administrators to view unsalted user passwords, which could lead to the compromise of plaintext passwords via offline attacks.
CWE-916 Oct 31, 2022
CVE-2022-37164 9.8 CRITICAL EPSS 0.00
Inoda OnTrack <3.4 - Privilege Escalation
Inoda OnTrack v3.4 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
CWE-287 Sep 08, 2022
CVE-2022-37163 9.8 CRITICAL EPSS 0.00
Bminusl IHateToBudget v1.5.7 - Info Disclosure
Bminusl IHateToBudget v1.5.7 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
CWE-287 Sep 08, 2022
CVE-2022-36071 8.3 HIGH EPSS 0.00
SFTPGo <2.3.3 - Info Disclosure
SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used instead of the TOTP. In SFTPGo versions from version 2.2.0 to 2.3.3 recovery codes can be generated before enabling two-factor authentication. An attacker who knows the user's password could potentially generate some recovery codes and then bypass two-factor authentication after it is enabled on the account at a later time. This issue has been fixed in version 2.3.4. Recovery codes can now only be generated after enabling two-factor authentication and are deleted after disabling it.
CWE-287 Sep 02, 2022
CVE-2022-29731 4.3 MEDIUM EPSS 0.00
ICT Protege GX/WX <2.08 - Info Disclosure
An access control issue in ICT Protege GX/WX 2.08 allows attackers to leak SHA1 password hashes of other users.
CWE-916 Jun 02, 2022
CVE-2021-32997 8.2 HIGH EPSS 0.00
Baker Hughes Bentley Nevada - Info Disclosure
The affected Baker Hughes Bentley Nevada products (3500 System 1 6.x, Part No. 3060/00 versions 6.98 and prior, 3500 System 1, Part No. 3071/xx & 3072/xx versions 21.1 HF1 and prior, 3500 Rack Configuration, Part No. 129133-01 versions 6.4 and prior, and 3500/22M Firmware, Part No. 288055-01 versions 5.05 and prior) utilize a weak encryption algorithm for storage and transmission of sensitive data, which may allow an attacker to more easily obtain credentials used for access.
CWE-916 May 25, 2022
CVE-2020-16231 7.2 HIGH EPSS 0.00
Bachmann Electronic M-Base Controllers MSYS v1.06.14+ - Info Disclo...
The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.
CWE-916 May 19, 2022
CVE-2022-24041 6.5 MEDIUM EPSS 0.00
Desigo DXR2, PXC3, PXC4, PXC5 < V01.21.142.5-22, V02.20.142.10-1088...
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application stores the PBKDF2 derived key of users passwords with a low iteration count. An attacker with user profile access privilege can retrieve the stored password hashes of other accounts and then successfully perform an offline cracking attack and recover the plaintext passwords of other users.
CWE-916 May 10, 2022
CVE-2021-26113 6.2 MEDIUM EPSS 0.00
FortiWAN <4.5.9 - Info Disclosure
A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN before 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored.
CWE-916 Apr 06, 2022
CVE-2022-1235 8.2 HIGH 1 Writeup EPSS 0.00
GitHub livehelperchat/livehelperchat <3.96 - Info Disclosure
Weak secrethash can be brute-forced in GitHub repository livehelperchat/livehelperchat prior to 3.96.
CWE-916 Apr 05, 2022
CVE-2022-23348 5.3 MEDIUM 1 Writeup NUCLEI EPSS 0.01
BigAnt Server <5.6.06 - Info Disclosure
BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes.
CWE-916 Mar 21, 2022
CVE-2022-0022 4.1 MEDIUM EPSS 0.00
Palo Alto Networks PAN-OS - Password Cracking
Usage of a weak cryptographic algorithm in Palo Alto Networks PAN-OS software where the password hashes of administrator and local user accounts are not created with a sufficient level of computational effort, which allows for password cracking attacks on accounts in normal (non-FIPS-CC) operational mode. An attacker must have access to the account password hashes to take advantage of this weakness and can acquire those hashes if they are able to gain access to the PAN-OS software configuration. Fixed versions of PAN-OS software use a secure cryptographic algorithm for account password hashes. This issue does not impact Prisma Access firewalls. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.21; All versions of PAN-OS 9.0; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11; PAN-OS 10.0 versions earlier than PAN-OS 10.0.7.
CWE-916 Mar 09, 2022
CVE-2021-43989 7.5 HIGH EPSS 0.00
mySCADA myPRO <8.20.0 - Info Disclosure
mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes.
CWE-327 Dec 23, 2021
CVE-2021-38979 7.5 HIGH EPSS 0.00
IBM Tivoli Key Lifecycle Manager <4.1 - Info Disclosure
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785.
CWE-916 Nov 15, 2021
CVE-2021-39182 7.5 HIGH 1 Writeup EPSS 0.00
EnroCrypt <1.1.4 - Info Disclosure
EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`.
CWE-327 Nov 08, 2021
CVE-2021-36767 9.8 CRITICAL EPSS 0.00
Digi RealPort <4.10.490 - Info Disclosure
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
CWE-916 Oct 08, 2021
CVE-2021-38400 6.9 MEDIUM EPSS 0.00
Boston Scientific Zoom Latitude Model 3120 - Info Disclosure
An attacker with physical access to Boston Scientific Zoom Latitude Model 3120 can remove the hard disk drive or create a specially crafted USB to extract the password hash for brute force reverse engineering of the system password.
CWE-916 Oct 04, 2021