4 results (0.007 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier does not mask extra variables displayed on the configuration form, increasing the potential for attackers to observe and capture them. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3017 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier stores extra variables unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3017 • CWE-311: Missing Encryption of Sensitive Data •

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 0

Confluent Ansible (cp-ansible) version 5.5.0, 5.5.1, 5.5.2 and 6.0.0 is vulnerable to Incorrect Access Control via its auxiliary component that allows remote attackers to access sensitive information. Confluent Ansible (cp-ansible) versiones 5.5.0, 5.5.1, 5.5.2 y 6.0.0, es vulnerable a un Control de Acceso Incorrecto por medio del componente auxiliary que permite a atacantes remotos acceder a información confidencial • https://confluent.io https://www.detack.de/en/cve-2021-33924 • CWE-862: Missing Authorization •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

Insecure permissions in Confluent Ansible (cp-ansible) 5.5.0, 5.5.1, 5.5.2 and 6.0.0 allows local attackers to access some sensitive information (private keys, state database). Unos permisos no seguros en Confluent Ansible (cp-ansible) versiones 5.5.0, 5.5.1, 5.5.2 y 6.0.0, permiten a atacantes locales acceder a determinada información confidencial (claves privadas, base de datos de estado) • https://confluent.io https://www.detack.de/en/cve-2021-33923 • CWE-276: Incorrect Default Permissions •