Search Results (7835 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-27774 6 Brocade, Debian, Haxx and 3 more 18 Fabric Operating System, Debian Linux, Curl and 15 more 2024-11-21 5.7 Medium
An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
CVE-2022-27636 2 F5, Microsoft 3 Big-ip Access Policy Manager, Big-ip Access Policy Manager Client, Windows 2024-11-21 5.5 Medium
On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, BIG-IP Edge Client may log sensitive APM session-related information when VPN is launched on a Windows system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVE-2022-27599 1 Qnap 1 Qvr Pro Client 2024-11-21 6.7 Medium
An insertion of sensitive information into Log file vulnerability has been reported to affect product. If exploited, the vulnerability possibly provides local authenticated administrators with an additional, less-protected path to acquiring the information via unspecified vectors. We have already fixed the vulnerability in the following version: Windows 10 SP1, Windows 11, Mac OS, and Mac M1: QVR Pro Client 2.3.0.0420 and later
CVE-2022-27580 1 Sick 1 Safety Designer 2024-11-21 7.8 High
A deserialization vulnerability in a .NET framework class used and not properly checked by Safety Designer all versions up to and including 1.11.0 allows an attacker to craft malicious project files. Opening/importing such a malicious project file would execute arbitrary code with the privileges of the current user when opened or imported by the Safety Designer. This compromises confidentiality integrity and availability. For the attack to succeed a user must manually open a malicious project file.
CVE-2022-27579 1 Sick 1 Flexi Soft Designer 2024-11-21 7.8 High
A deserialization vulnerability in a .NET framework class used and not properly checked by Flexi Soft Designer in all versions up to and including 1.9.4 SP1 allows an attacker to craft malicious project files. Opening/importing such a malicious project file would execute arbitrary code with the privileges of the current user when opened or imported by the Flexi Soft Designer. This compromises confidentiality integrity and availability. For the attack to succeed a user must manually open a malicious project file.
CVE-2022-27560 1 Hcltech 1 Versionvault Express 2024-11-21 6 Medium
HCL VersionVault Express exposes administrator credentials.
CVE-2022-27558 1 Hcltech 2 Domino, Hcl Inotes 2024-11-21 5.9 Medium
HCL iNotes is susceptible to a Broken Password Strength Checks vulnerability. Custom password policies are not enforced on certain iNotes forms which could allow users to set weak passwords, leading to easier cracking.
CVE-2022-27549 1 Hcltechsw 1 Hcl Launch 2024-11-21 4 Medium
HCL Launch may store certain data for recurring activities in a plain text format.
CVE-2022-27548 1 Hcltechsw 1 Hcl Launch 2024-11-21 4.9 Medium
HCL Launch stores user credentials in plain clear text which can be read by a local user.
CVE-2022-27544 1 Hcltech 1 Bigfix Platform 2024-11-21 5 Medium
BigFix Web Reports authorized users may see SMTP credentials in clear text.
CVE-2022-27442 1 Tpcms Project 1 Tpcms 2024-11-21 7.5 High
TPCMS v3.2 allows attackers to access the ThinkPHP log directory and obtain sensitive information such as the administrator's user name and password.
CVE-2022-27218 1 Jenkins 1 Incapptic Connect Uploader 2024-11-21 4.3 Medium
Jenkins incapptic connect uploader Plugin 1.15 and earlier stores tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
CVE-2022-27217 1 Jenkins 1 Vmware Vrealize Codestream 2024-11-21 6.5 Medium
Jenkins Vmware vRealize CodeStream Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
CVE-2022-27216 1 Jenkins 1 Dbcharts 2024-11-21 6.5 Medium
Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2022-27206 1 Jenkins 1 Gitlab Authentication 2024-11-21 6.5 Medium
Jenkins GitLab Authentication Plugin 1.13 and earlier stores the GitLab client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2022-27192 1 Asseco 1 Dvs Avilys 2024-11-21 7.5 High
The Reporting module in Aseco Lietuva document management system DVS Avilys before 3.5.58 allows unauthorized file download. An unauthenticated attacker can impersonate an administrator by reading administrative files.
CVE-2022-27158 1 Php 1 Pearweb 2024-11-21 9.8 Critical
pearweb < 1.32 suffers from Deserialization of Untrusted Data.
CVE-2022-26948 1 Rsa 1 Archer 2024-11-21 5.8 Medium
The Archer RSS feed integration for Archer 6.x through 6.9 SP1 (6.9.1.0) is affected by an insecure credential storage vulnerability. A malicious attacker may obtain access to credential information to use it in further attacks.
CVE-2022-26877 1 Asana 1 Desktop 2024-11-21 6.5 Medium
Asana Desktop before 1.6.0 allows remote attackers to exfiltrate local files if they can trick the Asana desktop app into loading a malicious web page.
CVE-2022-26856 1 Dell 1 Emc Repository Manager 2024-11-21 8.2 High
Dell EMC Repository Manager version 3.4.0 contains a plain-text password storage vulnerability. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application's database with privileges of the compromised account.