Vulnerabilities (CVE)

Filtered by CWE-312
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-14017 1 Naviwebs 1 Navigate Cms 2020-06-29 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Navigate CMS 2.9 r1433. Sessions, as well as associated information such as CSRF tokens, are stored in cleartext files in the directory /private/sessions. An unauthenticated user could use a brute-force approach to attempt to identify existing sessions, or view the contents of this file to discover details about a session.
CVE-2020-7513 1 Schneider-electric 2 Easergy T300, Easergy T300 Firmware 2020-06-17 5.0 MEDIUM 7.5 HIGH
A CWE-312: Cleartext Storage of Sensitive Information vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to intercept traffic and read configuration data.
CVE-2017-3214 1 Milwaukeetool 1 One-key 2020-05-21 5.0 MEDIUM 7.5 HIGH
The Milwaukee ONE-KEY Android mobile application stores the master token in plaintext in the apk binary.
CVE-2020-10532 1 Watchguard 1 Ad Helper Firmware 2020-03-20 5.0 MEDIUM 7.5 HIGH
The AD Helper component in WatchGuard Fireware before 5.8.5.10317 allows remote attackers to discover cleartext passwords via the /domains/list URI.
CVE-2019-15023 1 Zingbox 1 Inspector 2020-02-17 5.0 MEDIUM 7.5 HIGH
A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that results in passwords for 3rd party integrations being stored in cleartext in device configuration.
CVE-2008-7272 1 Getfiregpg 1 Firegpg 2020-02-10 5.0 MEDIUM 7.5 HIGH
FireGPG before 0.6 handle user’s passphrase and decrypted cleartext insecurely by writing pre-encrypted cleartext and the user's passphrase to disk which may result in the compromise of secure communication or a users’s private key.
CVE-2013-2680 1 Cisco 2 Linksys E4200, Linksys E4200 Firmware 2020-02-07 5.0 MEDIUM 7.5 HIGH
Cisco Linksys E4200 1.0.05 Build 7 devices store passwords in cleartext allowing remote attackers to obtain sensitive information.
CVE-2020-7213 1 Parallels 1 Parallels 2020-01-29 7.6 HIGH 7.5 HIGH
Parallels 13 uses cleartext HTTP as part of the update process, allowing man-in-the-middle attacks. Users of out-of-date versions are presented with a pop-up window for a parallels_updates.xml file on the http://update.parallels.com web site.
CVE-2009-5068 1 Simplemachines 1 Simple Machines Forum 2020-01-23 3.5 LOW 7.2 HIGH
There is a file disclosure vulnerability in SMF (Simple Machines Forum) affecting versions through v2.0.3. On some configurations a SMF deployment is shared by several "co-admins" that are not trusted beyond the SMF deployment. This vulnerability allows them to read arbitrary files on the filesystem and therefore gain new privileges by reading the settings.php with the database passwords.
CVE-2011-5247 1 Prophecyinternational 1 Snare 2020-01-21 5.0 MEDIUM 7.5 HIGH
Snare for Linux before 1.7.0 has password disclosure because the rendered page contains the field RemotePassword.
CVE-2019-19314 1 Gitlab 1 Gitlab 2020-01-10 5.0 MEDIUM 7.5 HIGH
GitLab EE 8.4 through 12.5, 12.4.3, and 12.3.6 stored several tokens in plaintext.
CVE-2019-14890 1 Redhat 1 Ansible Tower 2019-12-17 2.1 LOW 8.4 HIGH
A vulnerability was found in Ansible Tower before 3.6.1 where an attacker with low privilege could retrieve usernames and passwords credentials from the new RHSM saved in plain text into the database at '/api/v2/config' when applying the Ansible Tower license.
CVE-2019-10440 1 Jenkins 1 Neoload 2019-10-30 4.0 MEDIUM 8.8 HIGH
Jenkins NeoLoad Plugin 2.2.5 and earlier stored credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10443 1 Jenkins 1 Icescrum 2019-10-30 4.0 MEDIUM 8.8 HIGH
Jenkins iceScrum Plugin 1.1.4 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10449 1 Jenkins 1 Fortify On Demand 2019-10-18 4.0 MEDIUM 8.8 HIGH
Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10453 1 Jenkins 1 Delphix 2019-10-18 2.1 LOW 7.8 HIGH
Jenkins Delphix Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-4566 1 Ibm 1 Security Key Lifecycle Manager 2019-10-09 2.1 LOW 7.8 HIGH
IBM Security Key Lifecycle Manager 3.0 and 3.0.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 166627.
CVE-2019-10423 1 Jenkins 1 Codescan 2019-10-09 2.1 LOW 7.8 HIGH
Jenkins CodeScan Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10424 1 Jenkins 1 Eloyente 2019-10-09 2.1 LOW 7.8 HIGH
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10419 1 Jenkins 1 Vfabric Application Director 2019-10-09 2.1 LOW 7.8 HIGH
Jenkins vFabric Application Director Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10420 1 Jenkins 1 Assembla 2019-10-09 2.1 LOW 7.8 HIGH
Jenkins Assembla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2018-1877 1 Ibm 1 Robotic Process Automation With Automation Anywhere 2019-10-09 2.1 LOW 7.8 HIGH
IBM Robotic Process Automation with Automation Anywhere 11 could store highly sensitive information in the form of unencrypted passwords that would be available to a local user. IBM X-Force ID: 151713.
CVE-2018-10871 2 Debian, Fedoraproject 2 Debian Linux, 389 Directory Server 2019-10-09 4.0 MEDIUM 7.2 HIGH
389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.
CVE-2018-0089 1 Cisco 1 Policy Suite 2019-10-09 5.0 MEDIUM 7.5 HIGH
A vulnerability in the Policy and Charging Rules Function (PCRF) of the Cisco Policy Suite (CPS) could allow an unauthenticated, remote attacker to access sensitive data. The attacker could use this information to conduct additional reconnaissance attacks. The attacker would also have to have access to the internal VLAN where CPS is deployed. The vulnerability is due to incorrect permissions of certain system files and not sufficiently protecting sensitive data that is at rest. An attacker could exploit the vulnerability by using certain tools available on the internal network interface to request and view system files. An exploit could allow the attacker to find out sensitive information about the application. Cisco Bug IDs: CSCvf77666.
CVE-2017-9663 1 Gm 1 Shanghai Onstar 2019-10-09 5.0 MEDIUM 7.5 HIGH
An Cleartext Storage of Sensitive Information issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow a remote attacker to access an encryption key that is stored in cleartext in memory.
CVE-2018-8947 1 Laravel Log Viewer Project 1 Laravel Log Viewer 2019-10-03 5.0 MEDIUM 7.5 HIGH
rap2hpoutre Laravel Log Viewer before v0.13.0 relies on Base64 encoding for l, dl, and del requests, which makes it easier for remote attackers to bypass intended access restrictions, as demonstrated by reading arbitrary files via a dl request.
CVE-2017-16835 1 Photo\,video Locker-calculator Project 1 Photo\,video Locker-calculator 2019-10-03 5.0 MEDIUM 7.5 HIGH
The "Photo,Video Locker-Calculator" application 12.0 for Android has android:allowBackup="true" in AndroidManifest.xml, which allows attackers to obtain sensitive cleartext information via an "adb backup '-f smart.calculator.gallerylock'" command.
CVE-2017-13663 1 Ismartalarm 2 Cubeone, Cubeone Firmware 2019-10-03 5.0 MEDIUM 7.5 HIGH
Encryption key exposure in firmware in iSmartAlarm CubeOne version 2.2.4.8 and earlier allows attackers to decrypt log files via an exposed key.
CVE-2017-1309 1 Ibm 1 Infosphere Master Data Management Server 2019-10-03 2.1 LOW 7.8 HIGH
IBM InfoSphere Master Data Management Server 11.0 - 11.6 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 125463.
CVE-2018-16889 1 Redhat 1 Ceph 2019-10-03 5.0 MEDIUM 7.5 HIGH
Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.
CVE-2018-9065 1 Lenovo 1 Xclarity Administrator 2019-10-03 3.5 LOW 7.5 HIGH
In Lenovo xClarity Administrator versions earlier than 2.1.0, an attacker that gains access to the underlying LXCA file system user may be able to retrieve a credential store containing the service processor user names and passwords for servers previously managed by that LXCA instance, and potentially decrypt those credentials more easily than intended.
CVE-2019-10430 1 Jenkins 1 Neuvector Vulnerability Scanner 2019-09-25 2.1 LOW 7.8 HIGH
Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10429 1 Jenkins 1 Gitlab Logo 2019-09-25 2.1 LOW 7.8 HIGH
Jenkins GitLab Logo Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.