Total
1020 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-10288 | 1 Jenkins | 1 Jabber Server | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Jabber Server Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10287 | 1 Jenkins | 1 Youtrack-plugin | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins youtrack-plugin Plugin 0.7.1 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2019-10286 | 1 Jenkins | 1 Deployhub | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins DeployHub Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10285 | 1 Jenkins | 1 Minio Storage | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Minio Storage Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10284 | 1 Jenkins | 1 Diawi Upload | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Diawi Upload Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10283 | 1 Jenkins | 1 Mabl | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins mabl Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10282 | 1 Jenkins | 1 Klaros-testmanagement | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10281 | 1 Jenkins | 1 Relution Enterprise Appstore Publisher | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Relution Enterprise Appstore Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10280 | 1 Jenkins | 1 Assembla Auth | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Assembla Auth Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10277 | 1 Jenkins | 1 Starteam | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins StarTeam Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-1003097 | 1 Jenkins | 1 Crowd Integration | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Crowd Integration Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003096 | 1 Jenkins | 1 Testfairy | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins TestFairy Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-1003045 | 1 Trustsource | 1 Ecs Publisher | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
A vulnerability in Jenkins ECS Publisher Plugin 1.0.0 and earlier allows attackers with Item/Extended Read permission, or local file system access to the Jenkins home directory to obtain the API token configured in this plugin's configuration. | |||||
CVE-2019-1003039 | 1 Jenkins | 1 Appdynamics | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
An insufficiently protected credentials vulnerability exists in JenkinsAppDynamics Dashboard Plugin 1.0.14 and earlier in src/main/java/nl/codecentric/jenkins/appd/AppDynamicsResultsPublisher.java that allows attackers without permission to obtain passwords configured in jobs to obtain them. | |||||
CVE-2019-1003038 | 1 Jenkins | 1 Repository Connector | 2023-10-25 | 2.1 LOW | 7.8 HIGH |
An insufficiently protected credentials vulnerability exists in Jenkins Repository Connector Plugin 1.2.4 and earlier in src/main/java/org/jvnet/hudson/plugins/repositoryconnector/ArtifactDeployer.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/Repository.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/UserPwd.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the password stored in the plugin configuration. | |||||
CVE-2023-27132 | 1 Tsplus | 1 Tsplus Remote Work | 2023-10-25 | N/A | 9.8 CRITICAL |
TSplus Remote Work 16.0.0.0 places a cleartext password on the "var pass" line of the HTML source code for the secure single sign-on web portal. NOTE: CVE-2023-31069 is only about the TSplus Remote Access product, not the TSplus Remote Work product. | |||||
CVE-2023-43777 | 1 Eaton | 1 Easysoft | 2023-10-25 | N/A | 6.5 MEDIUM |
Eaton easySoft software is used to program easy controllers and displays for configuring, programming and defining parameters for all the intelligent relays. This software has a password protection functionality to secure the project file from unauthorized access. This password was being stored insecurely and could be retrieved by skilled adversaries. | |||||
CVE-2023-5552 | 1 Sophos | 1 Firewall | 2023-10-25 | N/A | 7.5 HIGH |
A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to “Specified by sender”. | |||||
CVE-2022-42451 | 1 Hcltech | 1 Bigfix Patch Management | 2023-10-23 | N/A | 4.4 MEDIUM |
Certain credentials within the BigFix Patch Management Download Plug-ins are stored insecurely and could be exposed to a local privileged user. | |||||
CVE-2022-44757 | 1 Hcltech | 1 Bigfix Insights For Vulnerability Remediation | 2023-10-23 | N/A | 8.2 HIGH |
BigFix Insights for Vulnerability Remediation (IVR) uses weak cryptography that can lead to credential exposure. An attacker could gain access to sensitive information, modify data in unexpected ways, etc. |