Total
1030 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-20391 | 1 Teknotel | 2 Cbw700n, Cbw700n Firmware | 2024-02-04 | 5.0 MEDIUM | 9.8 CRITICAL |
TEKNOTEL CBW700N 81.447.392110.729.024 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests. | |||||
CVE-2018-11748 | 1 Puppet | 1 Device Manager | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
Previous releases of the Puppet device_manager module creates configuration files containing credentials that are world readable. This issue has been resolved as of device_manager 2.7.0. | |||||
CVE-2018-9279 | 1 Eaton | 2 9px Ups, 9px Ups Firmware | 2024-02-04 | 4.0 MEDIUM | 4.9 MEDIUM |
An issue was discovered on Eaton UPS 9PX 8000 SP devices. The appliance discloses the user's password. The web page displayed by the appliance contains the password in cleartext. Passwords could be retrieved by browsing the source code of the webpage. | |||||
CVE-2018-16223 | 1 Qbeecam | 1 Qbeecam | 2024-02-04 | 5.0 MEDIUM | 9.8 CRITICAL |
Insecure Cryptographic Storage of credentials in com.vestiacom.qbeecamera_preferences.xml in the QBee Cam application through 1.0.5 for Android allows an attacker to retrieve the username and password. | |||||
CVE-2017-1411 | 1 Ibm | 1 Security Identity Governance And Intelligence | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 127399. | |||||
CVE-2018-20394 | 1 Technicolor | 8 Dwg849, Dwg849 Firmware, Dwg850-4 and 5 more | 2024-02-04 | 5.0 MEDIUM | 9.8 CRITICAL |
Thomson DWG849 STC0.01.16, DWG850-4 ST9C.05.25, DWG855 ST80.20.26, and TWG870 STB2.01.36 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests. | |||||
CVE-2018-16984 | 1 Djangoproject | 1 Django | 2024-02-04 | 4.0 MEDIUM | 4.9 MEDIUM |
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes. | |||||
CVE-2018-17900 | 1 Yokogawa | 8 Fcj, Fcj Firmware, Fcn-100 and 5 more | 2024-02-04 | 5.0 MEDIUM | 9.8 CRITICAL |
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly protects credentials which could allow an attacker to obtain credentials for remote access to controllers. | |||||
CVE-2018-20388 | 1 Comtrend | 4 Cm-6200un, Cm-6200un Firmware, Cm-6300n and 1 more | 2024-02-04 | 5.0 MEDIUM | 9.8 CRITICAL |
Comtrend CM-6200un 123.447.007 and CM-6300n 123.553mp1.005 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests. | |||||
CVE-2017-1231 | 1 Ibm | 1 Bigfix Platform | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
IBM BigFix Platform 9.5 - 9.5.9 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 123910. | |||||
CVE-2019-6549 | 1 Kunbus | 2 Pr100088 Modbus Gateway, Pr100088 Modbus Gateway Firmware | 2024-02-04 | 4.0 MEDIUM | 7.2 HIGH |
An attacker could retrieve plain-text credentials stored in a XML file on PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) through FTP. | |||||
CVE-2017-1000387 | 1 Jenkins | 1 Build-publisher | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations. | |||||
CVE-2017-5704 | 1 Intel | 3 Core I3, Core I5, Core I7 | 2024-02-04 | 2.1 LOW | 6.7 MEDIUM |
Platform sample code firmware included with 4th Gen Intel Core Processor, 5th Gen Intel Core Processor, 6th Gen Intel Core Processor, and 7th Gen Intel Core Processor potentially exposes password information in memory to a local attacker with administrative privileges. | |||||
CVE-2018-10327 | 1 Printeron | 1 Printeron | 2024-02-04 | 1.9 LOW | 7.0 HIGH |
PrinterOn Enterprise 4.1.3 stores the Active Directory bind credentials using base64 encoding, which allows local users to obtain credentials for a domain user by reading the cps_config.xml file. | |||||
CVE-2018-11746 | 1 Puppet | 1 Discovery | 2024-02-04 | 5.0 MEDIUM | 9.8 CRITICAL |
In Puppet Discovery prior to 1.2.0, when running Discovery against Windows hosts, WinRM connections can fall back to using basic auth over insecure channels if a HTTPS server is not available. This can expose the login credentials being used by Puppet Discovery. | |||||
CVE-2018-9031 | 1 Tnlsoftsolutions | 1 Sentry Vision | 2024-02-04 | 5.0 MEDIUM | 9.8 CRITICAL |
The login interface on TNLSoftSolutions Sentry Vision 3.x devices provides password disclosure by reading an "if(pwd ==" line in the HTML source code. This means, in effect, that authentication occurs only on the client side. | |||||
CVE-2018-5708 | 1 Dlink | 2 Dir-601, Dir-601 Firmware | 2024-02-04 | 6.1 MEDIUM | 8.0 HIGH |
An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML. | |||||
CVE-2018-0828 | 1 Microsoft | 2 Windows 10, Windows Server 2016 | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
Windows 10 version 1607 and Windows Server 2016 allow an elevation of privilege vulnerability due to how the MultiPoint management account password is stored, aka "Windows Elevation of Privilege Vulnerability". | |||||
CVE-2018-13014 | 1 Safensoft | 3 Enterprise Suite, Syswatch, Tpsecure | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
Storing password in recoverable format in safensec.com (SysWatch service) in SAFE'N'SEC SoftControl/SafenSoft SysWatch, SoftControl/SafenSoft TPSecure, and SoftControl/SafenSoft Enterprise Suite before 4.4.2 allows the local attacker to restore the SysWatch password from the settings database and modify program settings. | |||||
CVE-2017-15656 | 1 Asus | 1 Asuswrt | 2024-02-04 | 4.0 MEDIUM | 8.8 HIGH |
Password are stored in plaintext in nvram in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt. |