Vulnerabilities (CVE)

Filtered by CWE-522
Total 1012 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-43905 1 Writercms 1 Writercms 2023-11-03 N/A 7.5 HIGH
Incorrect access control in writercms v1.1.0 allows attackers to directly obtain backend account passwords via unspecified vectors.
CVE-2022-25184 1 Jenkins 1 Pipeline\ 2023-11-03 4.0 MEDIUM 6.5 MEDIUM
Jenkins Pipeline: Build Step Plugin 2.15 and earlier reveals password parameter default values when generating a pipeline script using the Pipeline Snippet Generator, allowing attackers with Item/Read permission to retrieve the default password parameter value from jobs.
CVE-2022-36901 1 Jenkins 1 Http Request 2023-11-02 N/A 6.5 MEDIUM
Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2022-38665 1 Jenkins 1 Collabnet 2023-11-02 N/A 6.5 MEDIUM
Jenkins CollabNet Plugins Plugin 2.0.8 and earlier stores a RabbitMQ password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2022-38663 1 Jenkins 1 Git 2023-11-02 N/A 6.5 MEDIUM
Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding.
CVE-2021-39289 1 Netmodule 16 Nb1600, Nb1601, Nb1800 and 13 more 2023-11-02 5.0 MEDIUM 7.5 HIGH
Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
CVE-2022-41255 1 Jenkins 1 Cons3rt 2023-11-01 N/A 6.5 MEDIUM
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2022-45392 1 Jenkins 1 Ns-nd Integration Performance Publisher 2023-11-01 N/A 6.5 MEDIUM
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
CVE-2023-46651 1 Jenkins 1 Warnings 2023-11-01 N/A 6.5 MEDIUM
Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. This fix has been backported to 10.4.1.
CVE-2023-46115 1 Tauri 1 Tauri 2023-10-26 N/A 5.5 MEDIUM
Tauri is a framework for building binaries for all major desktop platforms. This advisory is not describing a vulnerability in the Tauri code base itself but a commonly used misconfiguration which could lead to leaking of the private key and updater key password into bundled Tauri applications using the Vite frontend in a specific configuration. The Tauri documentation used an insecure example configuration in the `Vite guide` to showcase how to use Tauri together with Vite. Copying the following snippet `envPrefix: ['VITE_', 'TAURI_'],` from this guide into the `vite.config.ts` of a Tauri project leads to bundling the `TAURI_PRIVATE_KEY` and `TAURI_KEY_PASSWORD` into the Vite frontend code and therefore leaking this value to the released Tauri application. Using the `envPrefix: ['VITE_'],` or any other framework than Vite means you are not impacted by this advisory. Users are advised to rotate their updater private key if they are affected by this (requires Tauri CLI >=1.5.5). After updating the envPrefix configuration, generate a new private key with `tauri signer generate`, saving the new private key and updating the updater's `pubkey` value on `tauri.conf.json` with the new public key. To update your existing application, the next application build must be signed with the older private key in order to be accepted by the existing application.
CVE-2021-21634 1 Jenkins 1 Jabber \(xmpp\) Notifier And Control 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2021-21614 1 Jenkins 1 Bumblebee Hp Alm 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins Bumblebee HP ALM Plugin 4.1.5 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2021-21612 1 Jenkins 1 Tracetronic Ecu-test 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2020-2319 1 Jenkins 1 Vmware Lab Manager Slaves 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier stores a password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2020-2318 1 Jenkins 1 Mail Commander 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Mail Commander Plugin for Jenkins-ci Plugin 1.0.0 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
CVE-2020-2314 1 Jenkins 1 Appspider 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2020-2297 1 Jenkins 1 Sms Notification 2023-10-25 2.1 LOW 3.3 LOW
Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2020-2291 1 Jenkins 1 Couchdb-statistics 2023-10-25 2.1 LOW 3.3 LOW
Jenkins couchdb-statistics Plugin 0.3 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2020-2218 1 Hp Application Lifecycle Management Quality Center Project 1 Hp Application Lifecycle Management Quality Center 2023-10-25 2.1 LOW 3.3 LOW
Jenkins HP ALM Quality Center Plugin 1.6 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.
CVE-2020-2213 1 Jenkins 1 White Source 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.