Total
1013 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-11560 | 1 Nchsoftware | 1 Express Invoice | 2023-06-27 | 7.8 High |
NCH Express Invoice 7.25 allows local users to discover the cleartext password by reading the configuration file. | ||||
CVE-2022-1794 | 2 Codesys, Microsoft | 2 Opc Da Server, Windows | 2023-06-27 | 5.5 Medium |
The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system. | ||||
CVE-2023-35789 | 1 Rabbitmq-c Project | 1 Rabbitmq-c | 2023-06-26 | 5.5 Medium |
An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments. | ||||
CVE-2022-47376 | 1 Bd | 1 Alaris Infusion Central | 2023-06-24 | 7.3 High |
The Alaris Infusion Central software, versions 1.1 to 1.3.2, may contain a recoverable password after the installation. No patient health data is stored in the database, although some site installations may choose to store personal data. | ||||
CVE-2023-33620 | 1 Gl-inet | 2 Gl-ar750s, Gl-ar750s Firmware | 2023-06-23 | 5.9 Medium |
GL.iNET GL-AR750S-Ext firmware v3.215 uses an insecure protocol in its communications which allows attackers to eavesdrop via a man-in-the-middle attack. | ||||
CVE-2023-0457 | 1 Mitsubishielectric | 76 Fx5-enet, Fx5-enet\/ip, Fx5-enet\/ip Firmware and 73 more | 2023-06-21 | 7.5 High |
Plaintext Storage of a Password vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series, MELSEC iQ-R Series, MELSEC-Q Series and MELSEC-L Series allows a remote unauthenticated attacker to disclose plaintext credentials stored in project files and login into FTP server or Web server. | ||||
CVE-2023-29168 | 1 Ptc | 1 Vuforia Studio | 2023-06-16 | 7.5 High |
The local Vuforia web application does not support HTTPS, and federated credentials are passed via basic authentication. | ||||
CVE-2023-30776 | 1 Apache | 1 Superset | 2023-06-15 | 6.5 Medium |
An authenticated user with specific data permissions could access database connections stored passwords by requesting a specific REST API. This issue affects Apache Superset version 1.3.0 up to 2.0.1. | ||||
CVE-2023-27126 | 1 Tp-link | 2 Tapo C200, Tapo C200 Firmware | 2023-06-12 | 4.6 Medium |
The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim. | ||||
CVE-2023-22862 | 1 Ibm | 2 Aspera Cargo, Aspera Connect | 2023-06-09 | 7.5 High |
IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 transmits authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM X-Force ID: 244107. | ||||
CVE-2023-32687 | 1 Tgstation13 | 1 Tgstation-server | 2023-06-06 | 6.5 Medium |
tgstation-server is a toolset to manage production BYOND servers. Starting in version 4.7.0 and prior to 5.12.1, instance users with the list chat bots permission can read chat bot connections strings without the associated permission. This issue is patched in version 5.12.1. As a workaround, remove the list chat bots permission from users that should not have the ability to view connection strings. Invalidate any credentials previously stored for safety. | ||||
CVE-2023-31187 | 1 Avaya | 1 Ix Workforce Engagement | 2023-06-02 | 6.5 Medium |
Avaya IX Workforce Engagement v15.2.7.1195 - CWE-522: Insufficiently Protected Credentials | ||||
CVE-2023-33264 | 1 Hazelcast | 1 Hazelcast | 2023-06-02 | 4.3 Medium |
In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, configuration routines don't mask passwords in the member configuration properly. This allows Hazelcast Management Center users to view some of the secrets. | ||||
CVE-2023-33263 | 1 Wftpd Project | 1 Wftpd | 2023-06-01 | 7.5 High |
In WFTPD 3.25, usernames and password hashes are stored in an openly viewable wftpd.ini configuration file within the WFTPD directory. NOTE: this is a product from 2006. | ||||
CVE-2023-30846 | 1 Microsoft | 1 Typed-rest-client | 2023-06-01 | 7.5 High |
typed-rest-client is a library for Node Rest and Http Clients with typings for use with TypeScript. Users of the typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. The flow of the vulnerability is as follows: First, send any request with `BasicCredentialHandler`, `BearerCredentialHandler` or `PersonalAccessTokenCredentialHandler`. Second, the target host may return a redirection (3xx), with a link to a second host. Third, the next request will use the credentials to authenticate with the second host, by setting the `Authorization` header. The expected behavior is that the next request will *NOT* set the `Authorization` header. The problem was fixed in version 1.8.0. There are no known workarounds. | ||||
CVE-2023-2881 | 1 Pimcore | 1 Customer-data-framework | 2023-05-31 | 4.9 Medium |
Storing Passwords in a Recoverable Format in GitHub repository pimcore/customer-data-framework prior to 3.3.10. | ||||
CVE-2022-29833 | 1 Mitsubishielectric | 1 Gx Works3 | 2023-05-31 | 6.5 Medium |
Insufficiently Protected Credentials vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users could access to MELSEC safety CPU modules illgally. | ||||
CVE-2023-28131 | 1 Expo | 1 Expo Software Development Kit | 2023-05-25 | 9.6 Critical |
A vulnerability in the expo.io framework allows an attacker to take over accounts and steal credentials on an application/website that configured the "Expo AuthSession Redirect Proxy" for social sign-in. This can be achieved once a victim clicks a malicious link. The link itself may be sent to the victim in various ways (including email, text message, an attacker-controlled website, etc). | ||||
CVE-2023-2633 | 1 Jenkins | 1 Code Dx | 2023-05-25 | 4.3 Medium |
Jenkins Code Dx Plugin 3.1.0 and earlier does not mask Code Dx server API keys displayed on the configuration form, increasing the potential for attackers to observe and capture them. | ||||
CVE-2023-2632 | 1 Jenkins | 1 Code Dx | 2023-05-25 | 4.3 Medium |
Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. |