Vulnerabilities (CVE)

Filtered by CWE-522
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10366 1 Jenkins 1 Skytap Cloud Ci 2020-10-01 4.0 MEDIUM 6.5 MEDIUM
Jenkins Skytap Cloud CI Plugin 2.06 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10385 1 Jenkins 1 Eggplant 2020-10-01 4.0 MEDIUM 6.5 MEDIUM
Jenkins eggPlant Plugin 2.2 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10378 1 Jenkins 1 Testlink 2020-10-01 2.1 LOW 5.3 MEDIUM
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2020-7945 1 Puppet 1 Continuous Delivery 2020-09-30 2.1 LOW 5.5 MEDIUM
Local registry credentials were included directly in the CD4PE deployment definition, which could expose these credentials to users who should not have access to them. This is resolved in Continuous Delivery for Puppet Enterprise 4.0.1.
CVE-2019-1010241 1 Jenkins 1 Credentials Binding 2020-09-30 4.0 MEDIUM 6.5 MEDIUM
Jenkins Credentials Binding Plugin Jenkins 1.17 is affected by: CWE-257: Storing Passwords in a Recoverable Format. The impact is: Authenticated users can recover credentials. The component is: config-variables.jelly line #30 (passwordVariable). The attack vector is: Attacker creates and executes a Jenkins job.
CVE-2019-1003045 1 Trustsource 1 Ecs Publisher 2020-09-30 4.0 MEDIUM 6.5 MEDIUM
A vulnerability in Jenkins ECS Publisher Plugin 1.0.0 and earlier allows attackers with Item/Extended Read permission, or local file system access to the Jenkins home directory to obtain the API token configured in this plugin's configuration.
CVE-2018-17871 1 Verint 1 Verba Collaboration Compliance And Quality Management Platform 2020-09-29 4.0 MEDIUM 6.5 MEDIUM
Verba Collaboration Compliance and Quality Management Platform before 9.2.1.5545 has Incorrect Access Control.
CVE-2020-3547 1 Cisco 4 Asyncos, Content Security Management Appliance, Email Security Appliance and 1 more 2020-09-16 4.0 MEDIUM 6.5 MEDIUM
A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface.
CVE-2019-4697 1 Ibm 2 Guardium Data Encryption, Guardium For Cloud Key Management 2020-08-27 4.0 MEDIUM 6.5 MEDIUM
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 stores user credentials in plain in clear text which can be read by an authenticated user. IBM X-Force ID: 171938.
CVE-2019-4693 1 Ibm 2 Guardium Data Encryption, Guardium For Cloud Key Management 2020-08-27 2.1 LOW 4.4 MEDIUM
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 stores user credentials in plain in clear text which can be read by a local privileged user. IBM X-Force ID: 171831.
CVE-2020-4593 2 Ibm, Linux 2 Security Guardium Insights, Linux Kernel 2020-08-26 2.1 LOW 4.4 MEDIUM
IBM Security Guardium Insights 2.0.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184747.
CVE-2020-16280 1 Rangee 1 Rangeeos 2020-08-26 2.1 LOW 5.5 MEDIUM
Multiple Rangee GmbH RangeeOS 8.0.4 modules store credentials in plaintext including credentials of users for several external facing administrative services, domain joined users, and local administrators. To exploit the vulnerability a local attacker must have access to the underlying operating system.
CVE-2019-4385 1 Ibm 1 Spectrum Protect Plus 2020-08-24 2.1 LOW 6.5 MEDIUM
IBM Spectrum Protect Plus 10.1.2 may display the vSnap CIFS password in the IBM Spectrum Protect Plus Joblog. This can result in an attacker gaining access to sensitive information as well as vSnap. IBM X-Force ID: 162173.
CVE-2019-11885 1 Eye-disk 1 Eyedisk 2020-08-24 2.1 LOW 6.8 MEDIUM
eyeDisk implements the unlock feature by sending a cleartext password. The password can be discovered by sniffing USB traffic or by sending a 06 05 52 41 01 b0 00 00 00 00 00 00 SCSI command.
CVE-2019-13054 1 Logitech 2 R500, R500 Firmware 2020-08-24 3.3 LOW 6.5 MEDIUM
The Logitech R500 presentation clicker allows attackers to determine the AES key, leading to keystroke injection. On Windows, any text may be injected by using ALT+NUMPAD input to bypass the restriction on the characters A through Z.
CVE-2019-13349 1 Knowage-suite 1 Knowage 2020-08-24 4.0 MEDIUM 4.9 MEDIUM
In Knowage through 6.1.1, an authenticated user that accesses the users page will obtain all user password hashes.
CVE-2018-12038 1 Samsung 2 840 Evo, 840 Evo Firmware 2020-08-24 1.9 LOW 4.2 MEDIUM
An issue was discovered on Samsung 840 EVO devices. Vendor-specific commands may allow access to the disk-encryption key.
CVE-2019-11092 1 Intel 2 Open Cloud Integrity Tehnology, Openattestation 2020-08-24 3.6 LOW 4.4 MEDIUM
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2019-0120 1 Intel 56 Atom 230, Atom 230 Firmware, Atom 330 and 53 more 2020-08-24 2.1 LOW 4.4 MEDIUM
Insufficient key protection vulnerability in silicon reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow a privileged user to potentially enable denial of service via local access.
CVE-2019-0175 1 Intel 2 Open Cloud Integrity Tehnology, Openattestation 2020-08-24 3.6 LOW 4.4 MEDIUM
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2019-0179 1 Intel 2 Open Cloud Integrity Tehnology, Openattestation 2020-08-24 3.6 LOW 4.4 MEDIUM
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2019-0180 1 Intel 2 Open Cloud Integrity Tehnology, Openattestation 2020-08-24 3.6 LOW 4.4 MEDIUM
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2019-4138 1 Ibm 1 Spectrum Control 2020-08-24 4.3 MEDIUM 5.9 MEDIUM
IBM Tivoli Storage Productivity Center 5.2.13 through 5.3.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. X-Force ID: 158334.
CVE-2019-4335 1 Ibm 1 Watson Studio Local 2020-08-24 2.1 LOW 5.5 MEDIUM
IBM Watson Studio Local 1.2.3 stores key files in the user's home directory which could be obtained by another local user. IBM X-Force ID: 161413.
CVE-2019-8350 1 Simple 1 Better Banking 2020-08-24 2.1 LOW 6.8 MEDIUM
The Simple - Better Banking application 2.45.0 through 2.45.3 (fixed in 2.46.0) for Android was affected by an information disclosure vulnerability that leaked the user's password to the keyboard autocomplete functionality. Third-party Android keyboards that capture the password may store this password in cleartext, or transmit the password to third-party services for keyboard customization purposes. A compromise of any datastore that contains keyboard autocompletion caches would result in the disclosure of the user's Simple Bank password.
CVE-2020-9403 1 Pactware 1 Pactware 2020-08-19 2.1 LOW 5.5 MEDIUM
In PACTware before 4.1 SP6 and 5.x before 5.0.5.31, passwords are stored in a recoverable format, and may be retrieved by any user with access to the PACTware workstation.
CVE-2020-15661 1 Mozilla 1 Firefox 2020-08-14 4.3 MEDIUM 6.5 MEDIUM
A rogue webpage could override the injected WKUserScript used by the logins autofill, this exploit could result in leaking a password for the current domain. This vulnerability affects Firefox for iOS < 28.
CVE-2020-2078 1 Sick 1 Package Analytics 2020-08-03 4.0 MEDIUM 6.5 MEDIUM
Passwords are stored in plain text within the configuration of SICK Package Analytics software up to and including V04.1.1. An authorized attacker could access these stored plaintext credentials and gain access to the ftp service. Storing a password in plaintext allows attackers to easily gain access to systems, potentially compromising personal information or other sensitive information.
CVE-2020-4408 1 Ibm 1 Qradar Advisory 2020-07-28 2.1 LOW 4.6 MEDIUM
The IBM QRadar Advisor 1.1 through 2.5.2 with Watson App for IBM QRadar SIEM does not adequately mask all passwords during input, which could be obtained by a physical attacker nearby. IBM X-Force ID: 179536.
CVE-2020-2208 1 Jenkins 1 Slack Upload 2020-07-15 4.0 MEDIUM 4.3 MEDIUM
Jenkins Slack Upload Plugin 1.7 and earlier stores a secret unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-1003097 1 Jenkins 1 Crowd Integration 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
Jenkins Crowd Integration Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-1003096 1 Jenkins 1 Testfairy 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
Jenkins TestFairy Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2209 1 Jenkins 1 Testcomplete Support 2020-07-09 4.0 MEDIUM 4.3 MEDIUM
Jenkins TestComplete support Plugin 2.4.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2212 1 Jenkins 1 Github Coverage Reporter 2020-07-08 4.0 MEDIUM 4.3 MEDIUM
Jenkins GitHub Coverage Reporter Plugin 1.8 and earlier stores secrets unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system or read permissions on the system configuration.
CVE-2020-2213 1 Jenkins 1 White Source 2020-07-08 4.0 MEDIUM 4.3 MEDIUM
Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.
CVE-2018-21237 1 Foxitsoftware 1 Phantompdf 2020-06-09 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows NTLM credential theft via a GoToE or GoToR action.
CVE-2018-21239 1 Foxitsoftware 2 Phantompdf, Reader 2020-06-09 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Foxit Reader and PhantomPDF before 9.2. It allows NTLM credential theft via a GoToE or GoToR action.
CVE-2020-2198 1 Jenkins 1 Project Inheritance 2020-06-03 4.0 MEDIUM 6.5 MEDIUM
Jenkins Project Inheritance Plugin 19.08.02 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure.
CVE-2014-1423 2 Signond Project, Ubports 2 Signond, Ubuntu Touch 2020-05-12 4.3 MEDIUM 5.5 MEDIUM
signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.
CVE-2020-2181 1 Jenkins 1 Credentials Binding 2020-05-11 4.0 MEDIUM 6.5 MEDIUM
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets in the build log when the build contains no build steps.
CVE-2020-2182 1 Jenkins 1 Credentials Binding 2020-05-11 4.0 MEDIUM 4.3 MEDIUM
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets containing a `$` character in some circumstances.
CVE-2018-11752 1 Puppet 1 Cisco Ios 2020-05-01 2.1 LOW 5.5 MEDIUM
Previous releases of the Puppet cisco_ios module output SSH session debug information including login credentials to a world readable file on every run. These issues have been resolved in the 0.4.0 release.
CVE-2019-19105 2 Abb, Busch-jaeger 4 Tg\/s3.2, Tg\/s3.2 Firmware, 6186\/11 and 1 more 2020-04-29 2.1 LOW 5.5 MEDIUM
The backup function in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway saves the current settings and configuration of the application, including credentials of existing user accounts and other configuration's credentials in plaintext.
CVE-2020-5721 1 Mikrotik 1 Winbox 2020-04-28 2.1 LOW 5.5 MEDIUM
MikroTik WinBox 3.22 and below stores the user's cleartext password in the settings.cfg.viw configuration file when the Keep Password field is set and no Master Password is set. Keep Password is set by default and, by default Master Password is not set. An attacker with access to the configuration file can extract a username and password to gain access to the router.
CVE-2019-4668 1 Ibm 1 Urbancode Deploy 2020-04-27 2.1 LOW 5.5 MEDIUM
IBM UrbanCode Deploy (UCD) 7.0.4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 171250.
CVE-2020-5406 1 Vmware 1 Tanzu Application Service For Vms 2020-04-13 4.0 MEDIUM 6.5 MEDIUM
VMware Tanzu Application Service for VMs, 2.6.x versions prior to 2.6.18, 2.7.x versions prior to 2.7.11, and 2.8.x versions prior to 2.8.5, includes a version of PCF Autoscaling that writes database connection properties to its log, including database username and password. A malicious user with access to those logs may gain unauthorized access to the database being used by Autoscaling.
CVE-2020-1978 1 Paloaltonetworks 2 Pan-os, Vm-series 2020-04-10 1.9 LOW 4.4 MEDIUM
TechSupport files generated on Palo Alto Networks VM Series firewalls for Microsoft Azure platform configured with high availability (HA) inadvertently collect Azure dashboard service account credentials. These credentials are equivalent to the credentials associated with the Contributor role in Azure. A user with the credentials will be able to manage all the Azure resources in the subscription except for granting access to other resources. These credentials do not allow login access to the VMs themselves. This issue affects VM Series Plugin versions before 1.0.9 for PAN-OS 9.0. This issue does not affect VM Series in non-HA configurations or on other cloud platforms. It does not affect hardware firewall appliances. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the tech support files with the credentials. We now filter and remove these credentials from all TechSupport files sent to us. The TechSupport files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials.
CVE-2020-5263 1 Auth0 1 Auth0.js 2020-04-10 4.0 MEDIUM 4.9 MEDIUM
auth0.js (NPM package auth0-js) greater than version 8.0.0 and before version 9.12.3 has a vulnerability. In the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered. If the error object is exposed or logged without modification, the application risks password exposure. This is fixed in version 9.12.3
CVE-2017-18695 1 Google 1 Android 2020-04-08 3.5 LOW 6.5 MEDIUM
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), M(6.0), and N(7.0) software. Attackers (who control a certain subdomain) can discover a user's credentials, during an email account login, via an EAS autodiscover packet. The Samsung ID is SVE-2016-7654 (January 2017).
CVE-2019-19096 1 Abb 1 Esoms 2020-04-03 3.6 LOW 6.1 MEDIUM
The Redis data structure component used in ABB eSOMS versions 6.0 to 6.0.2 stores credentials in clear text. If an attacker has file system access, this can potentially compromise the credentials' confidentiality.