Vulnerabilities (CVE)

Filtered by CWE-522
Total 1030 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-20391 1 Teknotel 2 Cbw700n, Cbw700n Firmware 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
TEKNOTEL CBW700N 81.447.392110.729.024 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
CVE-2018-11748 1 Puppet 1 Device Manager 2024-02-04 2.1 LOW 7.8 HIGH
Previous releases of the Puppet device_manager module creates configuration files containing credentials that are world readable. This issue has been resolved as of device_manager 2.7.0.
CVE-2018-9279 1 Eaton 2 9px Ups, 9px Ups Firmware 2024-02-04 4.0 MEDIUM 4.9 MEDIUM
An issue was discovered on Eaton UPS 9PX 8000 SP devices. The appliance discloses the user's password. The web page displayed by the appliance contains the password in cleartext. Passwords could be retrieved by browsing the source code of the webpage.
CVE-2018-16223 1 Qbeecam 1 Qbeecam 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
Insecure Cryptographic Storage of credentials in com.vestiacom.qbeecamera_preferences.xml in the QBee Cam application through 1.0.5 for Android allows an attacker to retrieve the username and password.
CVE-2017-1411 1 Ibm 1 Security Identity Governance And Intelligence 2024-02-04 5.0 MEDIUM 7.5 HIGH
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 127399.
CVE-2018-20394 1 Technicolor 8 Dwg849, Dwg849 Firmware, Dwg850-4 and 5 more 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
Thomson DWG849 STC0.01.16, DWG850-4 ST9C.05.25, DWG855 ST80.20.26, and TWG870 STB2.01.36 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
CVE-2018-16984 1 Djangoproject 1 Django 2024-02-04 4.0 MEDIUM 4.9 MEDIUM
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
CVE-2018-17900 1 Yokogawa 8 Fcj, Fcj Firmware, Fcn-100 and 5 more 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly protects credentials which could allow an attacker to obtain credentials for remote access to controllers.
CVE-2018-20388 1 Comtrend 4 Cm-6200un, Cm-6200un Firmware, Cm-6300n and 1 more 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
Comtrend CM-6200un 123.447.007 and CM-6300n 123.553mp1.005 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
CVE-2017-1231 1 Ibm 1 Bigfix Platform 2024-02-04 2.1 LOW 7.8 HIGH
IBM BigFix Platform 9.5 - 9.5.9 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 123910.
CVE-2019-6549 1 Kunbus 2 Pr100088 Modbus Gateway, Pr100088 Modbus Gateway Firmware 2024-02-04 4.0 MEDIUM 7.2 HIGH
An attacker could retrieve plain-text credentials stored in a XML file on PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) through FTP.
CVE-2017-1000387 1 Jenkins 1 Build-publisher 2024-02-04 2.1 LOW 7.8 HIGH
Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
CVE-2017-5704 1 Intel 3 Core I3, Core I5, Core I7 2024-02-04 2.1 LOW 6.7 MEDIUM
Platform sample code firmware included with 4th Gen Intel Core Processor, 5th Gen Intel Core Processor, 6th Gen Intel Core Processor, and 7th Gen Intel Core Processor potentially exposes password information in memory to a local attacker with administrative privileges.
CVE-2018-10327 1 Printeron 1 Printeron 2024-02-04 1.9 LOW 7.0 HIGH
PrinterOn Enterprise 4.1.3 stores the Active Directory bind credentials using base64 encoding, which allows local users to obtain credentials for a domain user by reading the cps_config.xml file.
CVE-2018-11746 1 Puppet 1 Discovery 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
In Puppet Discovery prior to 1.2.0, when running Discovery against Windows hosts, WinRM connections can fall back to using basic auth over insecure channels if a HTTPS server is not available. This can expose the login credentials being used by Puppet Discovery.
CVE-2018-9031 1 Tnlsoftsolutions 1 Sentry Vision 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
The login interface on TNLSoftSolutions Sentry Vision 3.x devices provides password disclosure by reading an "if(pwd ==" line in the HTML source code. This means, in effect, that authentication occurs only on the client side.
CVE-2018-5708 1 Dlink 2 Dir-601, Dir-601 Firmware 2024-02-04 6.1 MEDIUM 8.0 HIGH
An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML.
CVE-2018-0828 1 Microsoft 2 Windows 10, Windows Server 2016 2024-02-04 4.6 MEDIUM 7.8 HIGH
Windows 10 version 1607 and Windows Server 2016 allow an elevation of privilege vulnerability due to how the MultiPoint management account password is stored, aka "Windows Elevation of Privilege Vulnerability".
CVE-2018-13014 1 Safensoft 3 Enterprise Suite, Syswatch, Tpsecure 2024-02-04 2.1 LOW 7.8 HIGH
Storing password in recoverable format in safensec.com (SysWatch service) in SAFE'N'SEC SoftControl/SafenSoft SysWatch, SoftControl/SafenSoft TPSecure, and SoftControl/SafenSoft Enterprise Suite before 4.4.2 allows the local attacker to restore the SysWatch password from the settings database and modify program settings.
CVE-2017-15656 1 Asus 1 Asuswrt 2024-02-04 4.0 MEDIUM 8.8 HIGH
Password are stored in plaintext in nvram in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt.