Vulnerabilities (CVE)

Filtered by CWE-522
Total 1030 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10420 1 Jenkins 1 Assembla 2024-02-04 2.1 LOW 5.5 MEDIUM
Jenkins Assembla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2014-4659 1 Redhat 1 Ansible 2024-02-04 2.1 LOW 5.5 MEDIUM
Ansible before 1.5.5 sets 0644 permissions for sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by reading a file that uses the "deb http://user:pass@server:port/" format.
CVE-2013-7052 1 Dlink 2 Dir-100, Dir-100 Firmware 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
D-Link DIR-100 4.03B07: security bypass via an error in the cliget.cgi script
CVE-2019-16544 1 Qmetry 1 Jenkins Qmetry For Jira 2024-02-04 4.0 MEDIUM 8.8 HIGH
Jenkins QMetry for JIRA - Test Management Plugin 1.12 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-1871 1 Huawei 2 Usg9500, Usg9500 Firmware 2024-02-04 6.4 MEDIUM 8.2 HIGH
USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.
CVE-2019-10421 1 Jenkins 1 Azure Event Grid Notifier 2024-02-04 4.0 MEDIUM 4.3 MEDIUM
Jenkins Azure Event Grid Build Notifier Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10459 1 Jenkins 1 Mattermost Notification 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Jenkins Mattermost Notification Plugin 2.7.0 and earlier stored webhook URLs containing a secret token unencrypted in its global configuration file and job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10419 1 Jenkins 1 Vfabric Application Director 2024-02-04 2.1 LOW 5.5 MEDIUM
Jenkins vFabric Application Director Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-16556 1 Jenkins 1 Rundeck 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Jenkins Rundeck Plugin 3.6.5 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-6024 1 Rakuten 1 Rakuma 2024-02-04 4.3 MEDIUM 6.5 MEDIUM
Rakuma App for Android version 7.15.0 and earlier, and for iOS version 7.16.4 and earlier allows an attacker to bypass authentication and obtain the user's authentication information via a malicious application created by the third party.
CVE-2020-2126 1 Jenkins 1 Digitalocean 2024-02-04 4.0 MEDIUM 4.3 MEDIUM
Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.
CVE-2014-2581 2 Fedoraproject, Smb4k Project 2 Fedora, Smb4k 2024-02-04 5.0 MEDIUM 7.5 HIGH
Smb4K before 1.1.1 allows remote attackers to obtain credentials via vectors related to the cuid option in the "Additional options" line edit.
CVE-2019-19539 1 Hp 3 Web Viewpoint T0320, Web Viewpoint T0952, Web Viewpoint T0986 2024-02-04 2.1 LOW 5.5 MEDIUM
An issue was discovered in Idelji Web ViewPoint H01ABO-H01BY and L01ABP-L01ABZ, Web ViewPoint Plus H01AAG-H01AAQ and L01AAH-L01AAR, and Web ViewPoint Enterprise H01-H01AAE and L01-L01AAF. By reading ADB or AADB file content within the Installation subvolume, a Guardian user can discover the password of the group.user or alias who acknowledges events from the WVP Events screen.
CVE-2019-11284 1 Pivotal 1 Reactor Netty 2024-02-04 5.0 MEDIUM 8.6 HIGH
Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to.
CVE-2020-8988 1 Voatz 1 Voatz 2024-02-04 4.3 MEDIUM 5.9 MEDIUM
The Voatz application 2020-01-01 for Android allows only 100 million different PINs, which makes it easier for attackers (after using root access to make a copy of the local database) to discover login credentials and voting history via an offline brute-force approach.
CVE-2020-6969 1 Automationdirect 22 C-more Ea9-rhi, C-more Ea9-rhi Firmware, C-more Ea9-t10cl and 19 more 2024-02-04 10.0 HIGH 9.8 CRITICAL
It is possible to unmask credentials and other sensitive information on “unprotected” project files, which may allow an attacker to remotely access the C-More Touch Panels EA9 series: firmware versions prior to 6.53 and manipulate system configurations.
CVE-2019-6700 1 Fortinet 1 Fortisiem 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code.
CVE-2019-5505 1 Netapp 1 Ontap Select Deploy Administration Utility 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
ONTAP Select Deploy administration utility versions 2.2 through 2.12.1 transmit credentials in plaintext.
CVE-2020-2132 1 Jenkins 1 Parasoft Environment Manager 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Jenkins Parasoft Environment Manager Plugin 2.14 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2018-21031 1 Plex 1 Media Server 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Tautulli versions 2.1.38 and below allows remote attackers to bypass intended access control in Plex Media Server because the X-Plex-Token is mishandled and can be retrieved from Tautulli. NOTE: Initially, this id was associated with Plex Media Server 1.18.2.2029-36236cc4c as the affected product and version. Further research indicated that Tautulli is the correct affected product.