Vulnerabilities (CVE)

Filtered by CWE-522
Total 986 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10378 1 Jenkins 1 Testlink 2024-02-28 2.1 LOW 5.3 MEDIUM
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10282 1 Jenkins 1 Klaros-testmanagement 2024-02-28 4.0 MEDIUM 8.8 HIGH
Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-5534 1 Vmware 1 Vcenter Server 2024-02-28 4.0 MEDIUM 7.7 HIGH
VMware vCenter Server (6.7.x prior to 6.7 U3, 6.5 prior to 6.5 U3 and 6.0 prior to 6.0 U3j) contains an information disclosure vulnerability where Virtual Machines deployed from an OVF could expose login information via the virtual machine's vAppConfig properties. A malicious actor with access to query the vAppConfig properties of a virtual machine deployed from an OVF may be able to view the credentials used to deploy the OVF (typically the root account of the virtual machine).
CVE-2019-6567 1 Siemens 8 Scalance X-200, Scalance X-200 Firmware, Scalance X-200irt and 5 more 2024-02-28 2.1 LOW 5.5 MEDIUM
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions < V5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X-414-3E (All versions). The affected devices store passwords in a recoverable format. An attacker may extract and recover device passwords from the device configuration. Successful exploitation requires access to a device configuration backup and impacts confidentiality of the stored passwords.
CVE-2019-1020009 1 Kolide 1 Fleet 2024-02-28 5.0 MEDIUM 7.5 HIGH
Fleet before 2.1.2 allows exposure of SMTP credentials.
CVE-2019-11885 1 Eye-disk 1 Eyedisk 2024-02-28 2.1 LOW 6.8 MEDIUM
eyeDisk implements the unlock feature by sending a cleartext password. The password can be discovered by sniffing USB traffic or by sending a 06 05 52 41 01 b0 00 00 00 00 00 00 SCSI command.
CVE-2019-10303 1 Jenkins 1 Azure Publishersettings Credentials 2024-02-28 4.0 MEDIUM 8.8 HIGH
Jenkins Azure PublisherSettings Credentials Plugin 1.2 and earlier stored credentials unencrypted in the credentials.xml file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-9823 1 Jetbrains 1 Intellij Idea 2024-02-28 5.0 MEDIUM 9.8 CRITICAL
In several JetBrains IntelliJ IDEA versions, creating remote run configurations of JavaEE application servers leads to saving a cleartext record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2018.3.5, 2018.2.8, 2018.1.8.
CVE-2019-10313 1 Jenkins 1 Twitter 2024-02-28 4.0 MEDIUM 8.8 HIGH
Jenkins Twitter Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-4138 1 Ibm 1 Spectrum Control 2024-02-28 4.3 MEDIUM 5.9 MEDIUM
IBM Tivoli Storage Productivity Center 5.2.13 through 5.3.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. X-Force ID: 158334.
CVE-2019-5627 1 Bluecats 1 Bc Reveal 2024-02-28 2.1 LOW 7.8 HIGH
The iOS mobile application BlueCats Reveal before 5.14 stores the username and password in the app cache as base64 encoded strings, i.e. clear text. These persist in the cache even if the user logs out. This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the iOS device or compromise it with a malicious app.
CVE-2019-0183 1 Intel 2 Open Cloud Integrity Tehnology, Openattestation 2024-02-28 2.1 LOW 3.3 LOW
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2019-1003097 1 Jenkins 1 Crowd Integration 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
Jenkins Crowd Integration Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10316 1 Jenkins 1 Aqua Microscanner 2024-02-28 4.0 MEDIUM 8.8 HIGH
Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10277 1 Jenkins 1 Starteam 2024-02-28 4.0 MEDIUM 8.8 HIGH
Jenkins StarTeam Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-0179 1 Intel 2 Open Cloud Integrity Tehnology, Openattestation 2024-02-28 3.6 LOW 4.4 MEDIUM
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2019-0182 1 Intel 2 Open Cloud Integrity Tehnology, Openattestation 2024-02-28 2.1 LOW 3.3 LOW
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2019-11350 1 Cloudbees 1 Jenkins Operations Center 2024-02-28 5.0 MEDIUM 9.8 CRITICAL
CloudBees Jenkins Operations Center 2.150.2.3, when an expired trial license exists, allows Cleartext Password Storage and Retrieval via the proxy configuration page.
CVE-2019-10960 1 Zebra 16 220xi4, 220xi4 Firmware, Zt220 and 13 more 2024-02-28 5.0 MEDIUM 7.5 HIGH
Zebra Industrial Printers All Versions, Zebra printers are shipped with unrestricted end-user access to front panel options. If the option to use a passcode to limit the functionality of the front panel is applied, specially crafted packets could be sent over the same network to a port on the printer and the printer will respond with an array of information that includes the front panel passcode for the printer. Once the passcode is retrieved, an attacker must have physical access to the front panel of the printer to enter the passcode to access the full functionality of the front panel.
CVE-2018-7820 1 Schneider-electric 8 Ap9630, Ap9630 Firmware, Ap9631 and 5 more 2024-02-28 5.0 MEDIUM 9.8 CRITICAL
A Credentials Management CWE-255 vulnerability exists in the APC UPS Network Management Card 2 AOS v6.5.6, which could cause Remote Monitoring Credentials to be viewed in plaintext when Remote Monitoring is enabled, and then disabled.