Vulnerabilities (CVE)

Filtered by CWE-522
Total 1230 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-12636 2025-11-06 N/A 6.5 MEDIUM
The Ubia camera ecosystem fails to adequately secure API credentials, potentially enabling an attacker to connect to backend services. The attacker would then be able to gain unauthorized access to available cameras, enabling the viewing of live feeds or modification of settings.
CVE-2025-54863 2025-11-06 N/A 10.0 CRITICAL
Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly accessible configuration file. This allows attackers to remotely alter weather data and configurations, automate attacks against multiple instances, and extract sensitive meteorological data, which could potentially compromise airport operations. Additionally, attackers could flood the system with false alerts, leading to a denial-of-service condition and significant disruption to airport operations. Unauthorized remote control over aviation weather monitoring and data manipulation could result in incorrect flight planning and hazardous takeoff and landing conditions.
CVE-2025-34270 1 Nagios 1 Log Server 2025-11-06 N/A 4.9 MEDIUM
Nagios Log Server versions prior to 2024R2.0.2 contain a vulnerability in the AD/LDAP user import functionality as it fails to obfuscate the password field during import. As a result, the plaintext password supplied for imported accounts may be exposed in the user interface, logs, or other diagnostic output. This can leak sensitive credentials to administrators or anyone with access to import results.
CVE-2025-53743 1 Jenkins 1 Applitools Eyes 2025-11-04 N/A 5.3 MEDIUM
Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not mask Applitools API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53671 1 Jenkins 1 Nouvola Divecloud 2025-11-04 N/A 6.5 MEDIUM
Jenkins Nouvola DiveCloud Plugin 1.08 and earlier does not mask DiveCloud API Keys and Credentials Encryption Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53669 1 Jenkins 1 Vaddy 2025-11-04 N/A 4.3 MEDIUM
Jenkins VAddy Plugin 1.2.8 and earlier does not mask Vaddy API Auth Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53667 1 Jenkins 1 Dead Man\'s Snitch 2025-11-04 N/A 5.3 MEDIUM
Jenkins Dead Man's Snitch Plugin 0.1 does not mask Dead Man's Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53661 1 Jenkins 1 Testsigma Test Plan Run 2025-11-04 N/A 4.3 MEDIUM
Jenkins Testsigma Test Plan run Plugin 1.6 and earlier does not mask Testsigma API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53660 1 Jenkins 1 Qmetry Test Management 2025-11-04 N/A 4.3 MEDIUM
Jenkins QMetry Test Management Plugin 1.13 and earlier does not mask Qmetry Automation API Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53657 1 Jenkins 1 Readyapi Functional Testing 2025-11-04 N/A 4.3 MEDIUM
Jenkins ReadyAPI Functional Testing Plugin 1.11 and earlier does not mask SLM License Access Keys, client secrets, and passwords displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53654 1 Jenkins 1 Statistics Gatherer 2025-11-04 N/A 6.5 MEDIUM
Jenkins Statistics Gatherer Plugin 2.0.3 and earlier stores the AWS Secret Key unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.
CVE-2025-53650 1 Jenkins 1 Credentials Binding 2025-11-04 N/A 7.3 HIGH
Jenkins Credentials Binding Plugin 687.v619cb_15e923f and earlier does not properly mask (i.e., replace with asterisks) credentials present in exception error messages that are written to the build log.
CVE-2025-0477 1 Rockwellautomation 1 Factorytalk Assetcentre 2025-11-04 N/A 9.8 CRITICAL
An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to a weak encryption methodology and could allow a threat actor to extract passwords belonging to other users of the application.
CVE-2025-0497 1 Rockwellautomation 1 Factorytalk Assetcentre 2025-11-04 N/A 9.8 CRITICAL
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages.
CVE-2025-0498 1 Rockwellautomation 1 Factorytalk Assetcentre 2025-11-04 N/A 9.8 CRITICAL
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk® Security user tokens, which could allow a threat actor to steal a token and, impersonate another user.
CVE-2023-4328 2 Broadcom, Linux 2 Raid Controller Web Interface, Linux Kernel 2025-11-04 N/A 5.5 MEDIUM
Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Linux
CVE-2023-4327 2 Broadcom, Linux 2 Raid Controller Web Interface, Linux Kernel 2025-11-04 N/A 5.5 MEDIUM
Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Linux
CVE-2024-36460 1 Zabbix 1 Zabbix 2025-11-03 N/A 8.1 HIGH
The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text.
CVE-2024-53832 2025-11-03 N/A 4.6 MEDIUM
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V05.30). The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the secure element authentication, and then use the secure element as an oracle to decrypt all encrypted update files.
CVE-2025-27650 1 Printerlogic 2 Vasion Print, Virtual Appliance 2025-11-03 N/A 9.8 CRITICAL
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Private Keys in Docker Overlay V-2023-013.