Vulnerabilities (CVE)

Filtered by CWE-312
Total 493 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-29471 1 Lightbend 1 Alpakka Kafka 2023-12-10 N/A 5.5 MEDIUM
Lightbend Alpakka Kafka before 5.0.0 logs its configuration as debug information, and thus log files may contain credentials (if plain cleartext login is configured). This occurs in akka.kafka.internal.KafkaConsumerActor.
CVE-2023-30523 1 Jenkins 1 Report Portal 2023-12-10 N/A 4.3 MEDIUM
Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job config.xml files on the Jenkins controller as part of its configuration where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2023-32448 1 Dell 1 Powerpath 2023-12-10 N/A 5.5 MEDIUM
PowerPath for Windows, versions 7.0, 7.1 & 7.2 contains License Key Stored in Cleartext vulnerability. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.
CVE-2023-27243 1 Makves 1 Dcap 2023-12-10 N/A 7.5 HIGH
An access control issue in Makves DCAP v3.0.0.122 allows unauthenticated attackers to obtain cleartext credentials via a crafted web request to the product API.
CVE-2023-0005 1 Paloaltonetworks 1 Pan-os 2023-12-10 N/A 4.9 MEDIUM
A vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to expose the plaintext values of secrets stored in the device configuration and encrypted API keys.
CVE-2023-30531 1 Jenkins 1 Consul Kv Builder 2023-12-10 N/A 6.5 MEDIUM
Jenkins Consul KV Builder Plugin 2.0.13 and earlier does not mask the HashiCorp Consul ACL Token on the global configuration form, increasing the potential for attackers to observe and capture it.
CVE-2023-25263 1 Stimulsoft 1 Designer 2023-12-10 N/A 5.5 MEDIUM
In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.
CVE-2023-31043 1 Enterprisedb 1 Postgres Advanced Server 2023-12-10 N/A 7.5 HIGH
EnterpriseDB EDB Postgres Advanced Server (EPAS) before 14.6.0 logs unredacted passwords in situations where optional parameters are used with CREATE/ALTER USER/GROUP/ROLE, and redacting was configured with edb_filter_log.redact_password_commands. The fixed versions are 10.23.33, 11.18.29, 12.13.17, 13.9.13, and 14.6.0.
CVE-2023-30527 1 Jenkins 1 Wso2 Oauth 2023-12-10 N/A 4.3 MEDIUM
Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2023-28713 1 Contec 1 Conprosys Hmi System 2023-12-10 N/A 8.1 HIGH
Plaintext storage of a password exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. Because account information of the database is saved in a local file in plaintext, a user who can access the PC where the affected product is installed can obtain the information. As a result, information in the database may be obtained and/or altered by the user.
CVE-2023-25596 1 Arubanetworks 1 Clearpass Policy Manager 2023-12-10 N/A 4.9 MEDIUM
A vulnerability exists in ClearPass Policy Manager that allows for an attacker with administrative privileges to access sensitive information in a cleartext format. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.
CVE-2023-0614 1 Samba 1 Samba 2023-12-10 N/A 6.5 MEDIUM
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
CVE-2023-30530 1 Jenkins 1 Consul Kv Builder 2023-12-10 N/A 4.3 MEDIUM
Jenkins Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp Consul ACL Token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2023-22878 3 Ibm, Linux, Microsoft 4 Aix, Infosphere Information Server, Linux Kernel and 1 more 2023-12-10 N/A 5.5 MEDIUM
IBM InfoSphere Information Server 11.7 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 244373.
CVE-2023-22584 1 Danfoss 2 Ak-em100, Ak-em100 Firmware 2023-12-10 N/A 7.5 HIGH
The Danfoss AK-EM100 stores login credentials in cleartext.
CVE-2023-3395 1 Ovarro 10 Tbox Lt2, Tbox Lt2 Firmware, Tbox Ms-cpu32 and 7 more 2023-12-10 N/A 6.5 MEDIUM
?All versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.
CVE-2023-35699 1 Sick 2 Icr890-4, Icr890-4 Firmware 2023-12-10 N/A 4.6 MEDIUM
Cleartext Storage on Disk in the SICK ICR890-4 could allow an unauthenticated attacker with local access to the device to disclose sensitive information by accessing a SD card.
CVE-2023-30528 1 Jenkins 1 Wso2 Oauth 2023-12-10 N/A 6.5 MEDIUM
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not mask the WSO2 Oauth client secret on the global configuration form, increasing the potential for attackers to observe and capture it.
CVE-2023-27706 1 Bitwarden 1 Bitwarden 2023-12-10 N/A 7.1 HIGH
Bitwarden Windows desktop application versions prior to v2023.4.0 store biometric keys in Windows Credential Manager, accessible to other local unprivileged processes.
CVE-2023-22894 1 Strapi 1 Strapi 2023-12-10 N/A 4.9 MEDIUM
Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.