Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-522
Total 807 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-11821 1 Rukovoditel 1 Rukovoditel 2021-07-21 5.0 MEDIUM 5.3 MEDIUM
In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them.
CVE-2019-3431 1 Zte 1 Zxcloud Goldendata Vap 2021-07-21 5.0 MEDIUM 9.8 CRITICAL
All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have encryption problems vulnerability. Attackers could sniff unencrypted account and password through the network for front-end system access.
CVE-2019-19898 1 Ixpdata 1 Easyinstall 2021-07-21 5.0 MEDIUM 7.5 HIGH
In IXP EasyInstall 6.2.13723, there are cleartext credentials in network communication on TCP port 20050 when using the Administrator console remotely.
CVE-2019-19890 1 Humaxdigital 2 Hgb10r-02, Hgb10r-02 Firmware 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 devices. Admin credentials are sent over cleartext HTTP.
CVE-2019-19843 1 Ruckuswireless 17 C110, E510, H320 and 14 more 2021-07-21 7.5 HIGH 9.8 CRITICAL
Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache.
CVE-2020-3841 1 Apple 3 Ipados, Iphone Os, Safari 2021-07-21 4.3 MEDIUM 6.5 MEDIUM
The issue was addressed with improved UI handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, Safari 13.0.5. A local user may unknowingly send a password unencrypted over the network.
CVE-2019-19696 1 Trendmicro 1 Password Manager 2021-07-21 2.1 LOW 5.5 MEDIUM
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishing sites.
CVE-2020-11629 1 Primekey 1 Ejbca 2021-07-21 6.5 MEDIUM 7.2 HIGH
An issue was discovered in EJBCA before 6.15.2.6 and 7.x before 7.3.1.2. The External Command Certificate Validator, which allows administrators to upload external linters to validate certificates, is supposed to save uploaded test certificates to the server. An attacker who has gained access to the CA UI could exploit this to upload malicious scripts to the server. (Risks associated with this issue alone are negligible unless a malicious user already has gained access to the CA UI through other means, as a trusted user is already trusted to upload scripts by virtue of having access to the validator.)
CVE-2020-15058 1 Lindy-international 2 42633, 42633 Firmware 2021-07-21 3.3 LOW 8.8 HIGH
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
CVE-2020-11557 1 Castlerock 1 Snmpc Online 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Castle Rock SNMPc Online 12.10.10 before 2020-01-28. It includes the username and password values in cleartext within each request's cookie value.
CVE-2019-19218 1 Bmcsoftware 1 Control-m\/agent 2021-07-21 4.3 MEDIUM 7.5 HIGH
BMC Control-M/Agent 7.0.00.000 has Insecure Password Storage.
CVE-2019-19119 1 Paessler 1 Prtg Network Monitor 2021-07-21 2.1 LOW 5.5 MEDIUM
An issue was discovered in PRTG 7.x through 19.4.53. Due to insufficient access control on local registry keys for the Core Server Service, a non-administrative user on the local machine is able to access administrative credentials.
CVE-2019-18868 1 Blaauwproducts 1 Remote Kiln Control 2021-07-21 5.0 MEDIUM 9.8 CRITICAL
Blaauw Remote Kiln Control through v3.00r4 allows an unauthenticated attacker to access MySQL credentials in cleartext in /engine/db.inc, /lang/nl.bak, or /lang/en.bak.
CVE-2019-18615 1 Arista 1 Cloudvision Portal 2021-07-21 3.5 LOW 4.9 MEDIUM
In CloudVision Portal (CVP) for all releases in the 2018.2 Train, under certain conditions, the application logs user passwords in plain text for certain API calls, potentially leading to user password exposure. This only affects CVP environments where: 1. Devices have enable mode passwords which are different from the user's login password, OR 2. There are configlet builders that use the Device class and specify username and password explicitly Application logs are not accessible or visible from the CVP GUI. Application logs can only be read by authorized users with privileged access to the VM hosting the CVP application.
CVE-2020-4095 1 Hcltech 1 Bigfix Platform 2021-07-21 2.1 LOW 6.0 MEDIUM
"BigFix Platform is storing clear text credentials within the system's memory. An attacker who is able to gain administrative privileges can use a program to create a memory dump and extract the credentials. These credentials can be used to pivot further into the environment. The principle of least privilege should be applied to all BigFix deployments, limiting administrative access."
CVE-2019-17393 1 Tomedo 1 Server 2021-07-21 5.0 MEDIUM 9.8 CRITICAL
The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.
CVE-2019-17356 1 Infinitestudio 1 Infinite Design 2021-07-21 3.3 LOW 6.5 MEDIUM
The Infinite Design application 3.4.12 for Android sends a username and password via TCP without any encryption during login, as demonstrated by sniffing of a public Wi-Fi network.
CVE-2020-10752 1 Redhat 1 Openshift Container Platform 2021-07-21 6.0 MEDIUM 7.5 HIGH
A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
CVE-2020-9306 1 Tesla 1 Solarcity Solar Monitoring Gateway 2021-07-21 5.8 MEDIUM 8.8 HIGH
Tesla SolarCity Solar Monitoring Gateway through 5.46.43 has a "Use of Hard-coded Credentials" issue because Digi ConnectPort X2e uses a .pyc file to store the cleartext password for the python user account.
CVE-2020-5899 1 F5 1 Nginx Controller 2021-07-21 4.6 MEDIUM 7.8 HIGH
In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.