Vulnerabilities (CVE)

Filtered by CWE-256
Total 113 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-56527 2025-11-19 N/A 7.5 HIGH
Plaintext password storage in Kotaemon 0.11.0 in the client's localStorage.
CVE-2025-13221 2025-11-18 5.0 MEDIUM 5.3 MEDIUM
A weakness has been identified in Intelbras UnniTI 24.07.11. The affected element is an unknown function of the file /xml/sistema/usuarios.xml. Executing manipulation of the argument Usuario/Senha can lead to unprotected storage of credentials. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-13187 2025-11-18 5.0 MEDIUM 5.3 MEDIUM
A security vulnerability has been detected in Intelbras ICIP 2.0.20. Affected is an unknown function of the file /xml/sistema/acessodeusuario.xml. Such manipulation of the argument NomeUsuario/SenhaAcess leads to unprotected storage of credentials. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
CVE-2025-9982 1 Opensolution 1 Quick.cms 2025-11-17 N/A 7.5 HIGH
A vulnerability exists in QuickCMS version 6.8 where sensitive admin credentials are hardcoded in a configuration file and stored in plaintext. This flaw allows attackers with access to the source code or the server file system to retrieve authentication details, potentially leading to privilege escalation. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CVE-2025-46366 1 Dell 1 Cloudlink 2025-11-07 N/A 6.7 MEDIUM
Dell CloudLink, versions prior to 8.1.1, contain a vulnerability where a privileged user may exploit and gain parallel privilege escalation or access to the database to obtain confidential information.
CVE-2025-53677 1 Jenkins 1 Xooa 2025-11-04 N/A 5.3 MEDIUM
Jenkins Xooa Plugin 0.0.7 and earlier does not mask the Xooa Deployment Token on the global configuration form, increasing the potential for attackers to observe and capture it.
CVE-2025-53675 1 Jenkins 1 Warrior Framework 2025-11-04 N/A 6.5 MEDIUM
Jenkins Warrior Framework Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2025-53674 1 Jenkins 1 Sensedia Api Platform Tools 2025-11-04 N/A 5.3 MEDIUM
Jenkins Sensedia Api Platform tools Plugin 1.0 does not mask the Sensedia API Manager integration token on the global configuration form, increasing the potential for attackers to observe and capture it.
CVE-2025-53671 1 Jenkins 1 Nouvola Divecloud 2025-11-04 N/A 6.5 MEDIUM
Jenkins Nouvola DiveCloud Plugin 1.08 and earlier does not mask DiveCloud API Keys and Credentials Encryption Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53669 1 Jenkins 1 Vaddy 2025-11-04 N/A 4.3 MEDIUM
Jenkins VAddy Plugin 1.2.8 and earlier does not mask Vaddy API Auth Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53665 1 Jenkins 1 Apica Loadtest 2025-11-04 N/A 4.3 MEDIUM
Jenkins Apica Loadtest Plugin 1.10 and earlier does not mask Apica Loadtest LTP authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53664 1 Jenkins 1 Apica Loadtest 2025-11-04 N/A 6.5 MEDIUM
Jenkins Apica Loadtest Plugin 1.10 and earlier stores Apica Loadtest LTP authentication tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2025-53662 1 Jenkins 1 Ifttt Build Notifier 2025-11-04 N/A 6.5 MEDIUM
Jenkins IFTTT Build Notifier Plugin 1.2 and earlier stores IFTTT Maker Channel Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2025-53660 1 Jenkins 1 Qmetry Test Management 2025-11-04 N/A 4.3 MEDIUM
Jenkins QMetry Test Management Plugin 1.13 and earlier does not mask Qmetry Automation API Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53656 1 Jenkins 1 Readyapi Functional Testing 2025-11-04 N/A 6.5 MEDIUM
Jenkins ReadyAPI Functional Testing Plugin 1.11 and earlier stores SLM License Access Keys, client secrets, and passwords unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2025-53655 1 Jenkins 1 Statistics Gatherer 2025-11-04 N/A 5.3 MEDIUM
Jenkins Statistics Gatherer Plugin 2.0.3 and earlier does not mask the AWS Secret Key on the global configuration form, increasing the potential for attackers to observe and capture it.
CVE-2024-29978 2025-11-04 N/A 5.9 MEDIUM
User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
CVE-2025-11193 2025-11-04 N/A 5.5 MEDIUM
A potential vulnerability was reported in some Lenovo Tablets that could allow a local authenticated user or application to gain access to sensitive device specific information.
CVE-2024-36464 1 Zabbix 1 Zabbix 2025-11-03 N/A 2.7 LOW
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
CVE-2024-36460 1 Zabbix 1 Zabbix 2025-11-03 N/A 8.1 HIGH
The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text.