Show filters
570 Total Results
Displaying 171-180 of 570
Sort by:
Attacker Value
Unknown
CVE-2022-34799
Disclosure Date: June 30, 2022 (last updated February 24, 2025)
Jenkins Deployment Dashboard Plugin 1.0.10 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2022-31887
Disclosure Date: June 28, 2022 (last updated February 24, 2025)
Marval MSM v14.19.0.12476 has a 0-Click Account Takeover vulnerability which allows an attacker to change any user's password in the organization, this means that the user can also escalate achieve Privilege Escalation by changing the administrator password.
0
Attacker Value
Unknown
CVE-2022-31085
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the session files include the LDAP user name and password in clear text if the PHP OpenSSL extension is not installed or encryption is disabled by configuration. This issue has been fixed in version 8.0. Users unable to upgrade should install the PHP OpenSSL extension and make sure session encryption is enabled in LAM main configuration.
0
Attacker Value
Unknown
CVE-2022-2221
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
Information Exposure vulnerability in My Account Settings of Devolutions Remote Desktop Manager before 2022.1.8 allows authenticated users to access credentials of other users. This issue affects: Devolutions Remote Desktop Manager versions prior to 2022.1.8.
0
Attacker Value
Unknown
CVE-2022-28167
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
Brocade SANnav before Brocade SANvav v. 2.2.0.2 and Brocade SANanv v.2.1.1.8 logs the Brocade Fabric OS switch password in plain text in asyncjobscheduler-manager.log
0
Attacker Value
Unknown
CVE-2022-34213
Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2022-34202
Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2022-34199
Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2022-1666
Disclosure Date: June 23, 2022 (last updated February 24, 2025)
The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
0
Attacker Value
Unknown
CVE-2022-2103
Disclosure Date: June 23, 2022 (last updated February 24, 2025)
An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories.
0