Vulnerabilities (CVE)

Filtered by CWE-522
Total 1029 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-33953 1 Ibm 3 Robotic Process Automation, Robotic Process Automation As A Service, Robotic Process Automation For Cloud Pak 2024-02-04 2.1 LOW 4.6 MEDIUM
IBM Robotic Process Automation 21.0.1 and 21.0.2 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected access tokens. IBM X-Force ID: 229198.
CVE-2022-34800 1 Jenkins 1 Build Notifications 2024-02-04 4.0 MEDIUM 4.3 MEDIUM
Jenkins Build Notifications Plugin 1.5.0 and earlier stores tokens unencrypted in its global configuration files on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2022-25184 1 Jenkins 1 Pipeline\ 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Jenkins Pipeline: Build Step Plugin 2.15 and earlier reveals password parameter default values when generating a pipeline script using the Pipeline Snippet Generator, allowing attackers with Item/Read permission to retrieve the default password parameter value from jobs.
CVE-2022-24610 1 Alecto 2 Dvc-215ip, Dvc-215ip Firmware 2024-02-04 5.0 MEDIUM 8.6 HIGH
Settings/network settings/wireless settings on the Alecto DVC-215IP camera version 63.1.1.173 and below shows the Wi-Fi passphrase hidden, but by editing/removing the style of the password field the password becomes visible which grants access to an internal network connected to the camera.
CVE-2022-0738 1 Gitlab 1 Gitlab 2024-02-04 4.3 MEDIUM 7.5 HIGH
An issue has been discovered in GitLab affecting all versions starting from 14.6 before 14.6.5, all versions starting from 14.7 before 14.7.4, all versions starting from 14.8 before 14.8.2. GitLab was leaking user passwords when adding mirrors with SSH credentials under specific conditions.
CVE-2022-24867 1 Glpi-project 1 Glpi 2024-02-04 7.8 HIGH 7.5 HIGH
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.
CVE-2022-34808 1 Jenkins 1 Cisco Spark 2024-02-04 4.0 MEDIUM 4.3 MEDIUM
Jenkins Cisco Spark Plugin 1.1.1 and earlier stores bearer tokens unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2020-25184 3 Rockwellautomation, Schneider-electric, Xylem 31 Aadvance Controller, Isagraf Free Runtime, Isagraf Runtime and 28 more 2024-02-04 2.1 LOW 5.5 MEDIUM
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x stores the password in plaintext in a file that is in the same directory as the executable file. ISaGRAF Runtime reads the file and saves the data in a variable without any additional modification. A local, unauthenticated attacker could compromise the user passwords, resulting in information disclosure.
CVE-2022-28651 1 Jetbrains 1 Intellij Idea 2024-02-04 2.1 LOW 5.5 MEDIUM
In JetBrains IntelliJ IDEA before 2021.3.3 it was possible to get passwords from protected fields
CVE-2022-34806 1 Jenkins 1 Jigomerge 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Jenkins Jigomerge Plugin 0.9 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
CVE-2021-3681 1 Redhat 2 Ansible Automation Platform, Ansible Galaxy 2024-02-04 2.1 LOW 5.5 MEDIUM
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.
CVE-2021-46440 1 Strapi 1 Strapi 2024-02-04 5.0 MEDIUM 7.5 HIGH
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.
CVE-2021-45892 1 Zauner 1 Arc 2024-02-04 4.3 MEDIUM 5.9 MEDIUM
An issue was discovered in Softwarebuero Zauner ARC 4.2.0.4. There is storage of Passwords in a Recoverable Format.
CVE-2022-31887 1 Marvalglobal 1 Marval Msm 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
Marval MSM v14.19.0.12476 has a 0-Click Account Takeover vulnerability which allows an attacker to change any user's password in the organization, this means that the user can also escalate achieve Privilege Escalation by changing the administrator password.
CVE-2022-1342 1 Devolutions 1 Remote Desktop Manager 2024-02-04 2.1 LOW 4.6 MEDIUM
A lack of password masking in Devolutions Remote Desktop Manager allows physically proximate attackers to observe sensitive data. A caching issue can cause sensitive fields to sometimes stay revealed when closing and reopening a panel, which could lead to involuntarily disclosing sensitive information. This issue affects: Devolutions Remote Desktop Manager 2022.1.24 version and prior versions.
CVE-2022-28141 1 Jenkins 1 Proxmox 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Jenkins Proxmox Plugin 0.5.0 and earlier stores the Proxmox Datacenter password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2022-27179 1 Redlion 2 Da50n, Da50n Firmware 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
A malicious actor having access to the exported configuration file may obtain the stored credentials and thereby gain access to the protected resource. If the same passwords were used for other resources, further such assets may be compromised.
CVE-2022-29588 1 Konicaminolta 90 Bizhub 226i, Bizhub 226i Firmware, Bizhub 227 and 87 more 2024-02-04 5.0 MEDIUM 7.5 HIGH
Konica Minolta bizhub MFP devices before 2022-04-14 use cleartext password storage for the /var/log/nginx/html/ADMINPASS and /etc/shadow files.
CVE-2022-28005 1 3cx 1 3cx 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered in the 3CX Phone System Management Console prior to version 18 Update 3 FINAL. An unauthenticated attacker could abuse improperly secured access to arbitrary files on the server (via /Electron/download directory traversal in conjunction with a path component that uses backslash characters), leading to cleartext credential disclosure. Afterwards, the authenticated attacker is able to upload a file that overwrites a 3CX service binary, leading to Remote Code Execution as NT AUTHORITY\SYSTEM on Windows installations. NOTE: this issue exists because of an incomplete fix for CVE-2022-48482.
CVE-2020-28865 1 Powerjob 1 Powerjob 2024-02-04 5.0 MEDIUM 7.5 HIGH
An issue was discovered in PowerJob through 3.2.2, allows attackers to change arbitrary user passwords via the id parameter to /appinfo/save.